Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for providing enhanced network access control to a network

A technology for network access control and media access control, which is applied in the field of providing enhanced network access control and systems to the network, and can solve problems such as the growth trend of MAC spoofing

Active Publication Date: 2022-04-15
GM GLOBAL TECH OPERATIONS LLC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while MAC addresses are unique identifiers, in practice this is often not the case due to the growing trend of MAC spoofing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for providing enhanced network access control to a network
  • Method and system for providing enhanced network access control to a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Reference will now be made in detail to several embodiments of the present disclosure which are illustrated in the accompanying drawings. In the drawings and the description, the same or similar reference numerals are used as far as possible to refer to the same or similar parts or steps. These and similar directional terms should not be construed as limiting the scope of the present disclosure.

[0029] Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those who are skilled in the art. Numerous specific details are set forth, such as examples of specific components, devices, and methods, to provide a thorough understanding of embodiments of the present disclosure. It will be apparent to those skilled in the art that specific details need not be employed, that example embodiments may be embodied in many different forms and that neither should be construed to limit the scope of the disclosure. In some example ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a method for providing enhanced network access control to a network, the method comprising: utilizing a database with a plurality of MAB entries set to a default disabled state; An X-capable device connects to the network; challenges the device with a network switch; sends the MAC address of the device to a RADIUS client to authenticate against a known record; processes a connection request from the device ; upon authenticating the connection request, granting access to the device; utilizing a MAB rescue application to temporarily change the account status of the device to an enabled state; upon enabling the account, allowing access to the device performing endpoint authentication; and preventing malicious endpoints from accessing the network by disabling all MAB entries and new accounts on the network.

Description

technical field [0001] The present application relates to methods and systems for providing enhanced network access control to a network. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and may not constitute prior art. [0003] The present disclosure relates to network access control, and more particularly to security issues surrounding IEEE 802.1X authentication. Typically, organizations large and small will register a device's media access control (MAC) address as a network access control mechanism, since the MAC address operates as a unique identifier for each device's network interface controller (NIC). Thus, MAC addresses provide some control over which devices can and cannot authenticate to and / or access resources on a given network. However, while MAC addresses are unique identifiers, in practice this is often not the case due to the growing trend of MAC spoofing. That is, the MAC...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/0876H04W12/08H04W84/12H04W12/71H04W12/122H04W12/069H04L63/108H04L63/101
Inventor A·D·波尔顿S·凯勒利J·B·卡里尔S·T·瑟尔C·弗雷
Owner GM GLOBAL TECH OPERATIONS LLC