18623817. TOKEN-BASED DEVICE TRACKING simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

TOKEN-BASED DEVICE TRACKING

Organization Name

Cisco Technology, Inc.

Inventor(s)

Carlos M. Pignataro of Cary NC (US)

Nagendra Kumar Nainar of Morrisville NC (US)

Jerome Henry of Pittsboro NC (US)

Robert E. Barton of Richmond (CA)

Bart A. Brinckman of Nevele (BE)

TOKEN-BASED DEVICE TRACKING - A simplified explanation of the abstract

This abstract first appeared for US patent application 18623817 titled 'TOKEN-BASED DEVICE TRACKING

Simplified Explanation

The patent application describes a method for an access node to disconnect a device from a network due to a violation and then verify the identity of a second device trying to connect.

  • The access node disconnects a device with a MAC address due to a network violation.
  • Information about a second device with a different MAC address is received.
  • The access node verifies the identity of the second device before allowing a connection.

Key Features and Innovation

  • Disconnecting a device with a MAC address due to a network violation.
  • Verifying the identity of a second device with a different MAC address.
  • Preventing unauthorized connections to the network.

Potential Applications

This technology can be used in network security systems to prevent unauthorized access and protect sensitive information.

Problems Solved

  • Unauthorized access to the network.
  • Ensuring the security and integrity of the network.
  • Preventing potential cyber threats.

Benefits

  • Enhanced network security.
  • Protection of sensitive data.
  • Prevention of unauthorized access.

Commercial Applications

Title: Network Security Verification System This technology can be applied in industries where data security is crucial, such as banking, healthcare, and government agencies. It can also be used in home networks to protect personal information.

Prior Art

Readers can explore prior art related to network security systems, MAC address verification, and access control technologies.

Frequently Updated Research

Stay updated on the latest advancements in network security, access control systems, and identity verification technologies.

Questions about Network Security Verification System

1. How does this technology improve network security? This technology enhances network security by verifying the identity of devices before allowing them to connect, preventing unauthorized access. 2. What are the potential risks of not implementing such a system? Without this system, networks are vulnerable to unauthorized access, data breaches, and cyber attacks.


Original Abstract Submitted

Embodiments herein describe disconnecting, by an access node, a first device having a first media access control (MAC) address due to a network violation and receiving, by the access node, information about a second device having a second MAC address different from the first MAC address. In one embodiment, the information is generated by a certificate server based on a token generated by the second device. Further, when the access node determines, based on the information, that the second device is the first device, the access node denies a connection request from the second device.