US 12,294,591 B2
System and method for device authentication in a distributed environment without user intervention
Ofir Ezrielev, Be'er Sheva (IL); Jehuda Shemer, Kfar Saba (IL); and Ronen Rabani, Kibuts Telalim (IL)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Mar. 22, 2023, as Appl. No. 18/187,969.
Prior Publication US 2024/0323200 A1, Sep. 26, 2024
Int. Cl. H04L 9/00 (2022.01); H04L 9/40 (2022.01)
CPC H04L 63/1416 (2013.01) [H04L 63/08 (2013.01); H04L 63/1433 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of authenticating a data processing system by a network core throughout a distributed environment, the method comprising:
identifying an occurrence of an event indicating that the data processing system is to be authenticated;
based on the occurrence of the event:
obtaining a security questionnaire using a first activity log based on historic activities performed by the data processing system and a security risk level of the data processing system;
providing the security questionnaire to the data processing system;
obtaining a response from the data processing system, the response comprising answers that are responsive to security questions of the security questionnaire without user intervention;
making a determination regarding whether each answer of the answers matches a pre-determined answer from a set of possible answers; and
in an instance of the determination in which each answer of the answers matches the pre-determined answer:
concluding that the data processing system is authentic.