US 12,363,119 B2
Access enforcement through authentication verification entity (AVE)
Claudio Desanti, Santa Cruz, CA (US); and David Black, Acton, MA (US)
Assigned to DELL PRODUCTS L.P., Round Rock, TX (US)
Filed by DELL PRODUCTS L.P., Round Rock, TX (US)
Filed on Oct. 17, 2022, as Appl. No. 17/967,416.
Prior Publication US 2024/0129314 A1, Apr. 18, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/101 (2013.01) [H04L 63/102 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
responsive to a subsystem receiving a connect command from a host via a connection, sending a response to the host instructing the host to initiate an authentication transaction, in which, as part of the authentication transaction, the host is challenged to prove its identity;
responsive to receiving a host response to a challenge, requesting an authentication verification entity (AVE) to verify the host response; and
responsive to receiving from the AVE an authentication failure response that facilitates enforcement of zoning because the authentication failure response was generated as a result of the AVE determining, based upon zoning-related information, that the host is not authorized or allowed to connect to the subsystem, terminating the connection with the host.