Trustworthiness evaluation of network devices

    公开(公告)号:US11652824B2

    公开(公告)日:2023-05-16

    申请号:US17669123

    申请日:2022-02-10

    CPC classification number: H04L63/108 H04L41/0803 H04L63/0876 H04L63/20

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    TRUSTWORTHINESS EVALUATION OF NETWORK DEVICES

    公开(公告)号:US20220166779A1

    公开(公告)日:2022-05-26

    申请号:US17669123

    申请日:2022-02-10

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    Authentication of network devices using access control protocols

    公开(公告)号:US11343091B2

    公开(公告)日:2022-05-24

    申请号:US16784025

    申请日:2020-02-06

    Abstract: Systems, methods, and computer-readable media for authenticating access control messages include receiving, at a first node, access control messages from a second node. The first node and the second node including network devices and the access control messages can be based on RADIUS or TACACS+ protocols among others. The first node can obtain attestation information from one or more fields of the access control messages determine whether the second node is authentic and trustworthy based on the attestation information. The first node can also determine reliability or freshness of the access control messages based on the attestation information. The first node can be a server and the second node can be a client, or the first node can be a client and the second node can be a server. The attestation information can include Proof of Integrity based on a hardware fingerprint, device identifier, or Canary Stamp.

Patent Agency Ranking