发明名称 Automatic access to network devices using various authentication schemes
摘要 An access discovery method and system discovers and stores the proper access protocol for each device on a network. The discovery process includes progressively sequencing through state transitions until a successful access protocol sequence is determined, and an access script corresponding to this sequence is stored for subsequent access to the device. Preferably, the protocol-discovery algorithm is modeled as a state table that includes a start state and two possible terminal states: success and failure. A state machine executes the state table until a terminal state is reached; if the terminal state is a failure, the system backtracks to attempt an alternative sequence. The process continues until the success state is reached or until all possible sequences are executed without success. An exemplary state model is provided that has been shown to be effective for modeling network devices from a variety of vendor devices.
申请公布号 US8826412(B2) 申请公布日期 2014.09.02
申请号 US201213556174 申请日期 2012.07.23
申请人 Riverbed Technology, Inc. 发明人 Sivaramakrishna Iyer Krishnan
分类号 H04L29/06;H04L12/24;H04L29/08 主分类号 H04L29/06
代理机构 Park, Vaughan, Fleming & Dowler LLP 代理人 Park, Vaughan, Fleming & Dowler LLP
主权项 1. A method of discovering, by a first device, an authentication protocol used by a second device in a network, wherein the authentication protocol defines a sequence of actions required to successfully authenticate with the second device, said method comprising: establishing, by the first device, a connection with the second device; accessing, by the first device, a model of a plurality of authentication protocols; executing, by the first device, a plurality of actions based on the model until the first device successfully authenticates with the second device; and recording, by the first device, a sequence of the actions that resulted in successful authentication with the second device; wherein: the model comprises a plurality of states and the model transitions from one state to another state when initiated by a transition; and each authentication protocol is defined by a sequence of transitions between select states in the model.
地址 San Francisco CA US