-
公开(公告)号:US20070011725A1
公开(公告)日:2007-01-11
申请号:US11320603
申请日:2005-12-30
申请人: Vasant Sahay , Biju Kunjukunju , Nirmalendu Das , Subhasree Mandal , David Levi , Manoj Guglani , Philippe Michelet , Ravi Kumar
发明人: Vasant Sahay , Biju Kunjukunju , Nirmalendu Das , Subhasree Mandal , David Levi , Manoj Guglani , Philippe Michelet , Ravi Kumar
IPC分类号: H04L9/32
CPC分类号: G06F21/00 , H04L63/0227 , H04L63/0272 , H04L63/08 , H04L63/102 , H04L63/105 , H04L63/145 , H04W12/06 , H04W12/08 , H04W12/12
摘要: A technique for providing secure network access is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for providing secure network access. The method may comprise establishing a plurality of access zones in a network, wherein client devices assigned to different access zones have different access privileges and are isolated from one another. The method may also comprise assigning a client device to one of the plurality of access zones based on an assessment of a security context associated with the client device and a connection of the client device to the network.
摘要翻译: 公开了一种用于提供安全网络访问的技术。 在一个特定的示例性实施例中,该技术可以被实现为用于提供安全网络访问的方法。 该方法可以包括在网络中建立多个接入区域,其中分配给不同接入区域的客户端设备具有不同的访问特权并且彼此隔离。 该方法还可以包括基于与客户端设备相关联的安全上下文的评估和客户端设备到网络的连接来将客户端设备分配给多个接入区域中的一个。
-
公开(公告)号:US20070169171A1
公开(公告)日:2007-07-19
申请号:US11320593
申请日:2005-12-30
申请人: Ravi Kumar , Tal Lavian , Vasant Sahay , Nirmalendu Das , Biju Kunjukunju , David Levi , Philippe Michelet
发明人: Ravi Kumar , Tal Lavian , Vasant Sahay , Nirmalendu Das , Biju Kunjukunju , David Levi , Philippe Michelet
IPC分类号: H04L9/32
CPC分类号: H04L63/08 , H04L63/102 , H04L63/105
摘要: A technique for authenticating network users is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for authenticating network users. The method may comprise receiving, from a client device, a request for connection to a network. The method may also comprise evaluating a security context associated with the requested connection. The method may further comprise assigning the client device one or more access privileges based at least in part on the evaluation of the security context.
摘要翻译: 公开了一种用于认证网络用户的技术。 在一个特定的示例性实施例中,该技术可以被实现为用于认证网络用户的方法。 该方法可以包括从客户端设备接收到连接到网络的请求。 该方法还可以包括评估与请求的连接相关联的安全上下文。 该方法还可以包括至少部分地基于对安全上下文的评估来分配客户端设备一个或多个访问权限。
-
公开(公告)号:US08707395B2
公开(公告)日:2014-04-22
申请号:US11320603
申请日:2005-12-30
申请人: Vasant Sahay , Biju Sajibhavan , Nirmalendu Das , Subhasree Mandal , David Burton Levi , Manoj Kumar Guglani , Philippe Michelet , Ravi Chakravarthi Kumar
发明人: Vasant Sahay , Biju Sajibhavan , Nirmalendu Das , Subhasree Mandal , David Burton Levi , Manoj Kumar Guglani , Philippe Michelet , Ravi Chakravarthi Kumar
CPC分类号: G06F21/00 , H04L63/0227 , H04L63/0272 , H04L63/08 , H04L63/102 , H04L63/105 , H04L63/145 , H04W12/06 , H04W12/08 , H04W12/12
摘要: A technique for providing secure network access is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for providing secure network access. The method may comprise establishing a plurality of access zones in a network, wherein client devices assigned to different access zones have different access privileges and are isolated from one another. The method may also comprise assigning a client device to one of the plurality of access zones based on an assessment of a security context associated with the client device and a connection of the client device to the network.
摘要翻译: 公开了一种用于提供安全网络访问的技术。 在一个特定的示例性实施例中,该技术可以被实现为用于提供安全网络访问的方法。 该方法可以包括在网络中建立多个接入区域,其中分配给不同接入区域的客户端设备具有不同的访问特权并且彼此隔离。 该方法还可以包括基于与客户端设备相关联的安全上下文的评估和客户端设备到网络的连接来将客户端设备分配给多个接入区域中的一个。
-
公开(公告)号:US10764264B2
公开(公告)日:2020-09-01
申请号:US11320593
申请日:2005-12-30
申请人: Ravi Chakravarthi Kumar , Tal I. Lavian , Vasant Sahay , Nirmalendu Das , Biju Sajibhavan Kunjukunju , David Burton Levi , Philippe Michelet , Shmuel Nehama
发明人: Ravi Chakravarthi Kumar , Tal I. Lavian , Vasant Sahay , Nirmalendu Das , Biju Sajibhavan Kunjukunju , David Burton Levi , Philippe Michelet , Shmuel Nehama
摘要: A technique for authenticating network users is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for authenticating network users. The method may comprise receiving, from a client device, a request for connection to a network. The method may also comprise evaluating a security context associated with the requested connection. The method may further comprise assigning the client device one or more access privileges based at least in part on the evaluation of the security context.
-
-
-