Network access using hardware-based security
Summary
USPTO granted patent US12598078B2 to Sophos Limited covering hardware-based security for network authentication. The patent describes endpoint devices using hardware-bound security systems to authenticate to enterprise networks, with cryptographically validated challenge-response protocols. The patent was applied for on February 15, 2023, under application number 18110051, with 20 claims granted.
What changed
USPTO issued patent grant US12598078B2 to Sophos Limited for network access authentication using hardware-based security. The patent covers endpoint devices that sign authentication challenge payloads with hardware-bound security modules established at manufacture, enabling cryptographically validated authentication to enterprise networks managed by threat management platforms.
Manufacturers developing hardware security modules, network authentication systems, or endpoint security solutions should conduct freedom-to-operate analyses before commercializing similar technologies. The patent's 20 claims cover the challenge-response mechanism, hardware binding procedures, and token generation for enterprise network access, establishing intellectual property barriers in the hardware-based network security space.
What to do next
- Monitor for potential licensing opportunities if developing similar network authentication technology
- Review patent claims for freedom-to-operate analysis if deploying hardware-based network security solutions
- Track Sophos Limited patent portfolio for additional related intellectual property
Archived snapshot
Apr 8, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Network access using hardware-based security
Grant US12598078B2 Kind: B2 Apr 07, 2026
Assignee
Sophos Limited
Inventors
Dipak Kr. Das, Avni Bhupendrakumar Wala, John Frederick Dawson, Hariprasad Nekkare Gururaj, Anirban Debnath
Abstract
An endpoint device uses hardware-based security to authenticate to an enterprise network. For example, an endpoint device such as network hardware or an end user device can request authentication in order to join an enterprise network that is managed by a computing platform such as a threat management facility. In one aspect, an authenticator at the computing platform sends a challenge payload in response to the request from the endpoint device. The endpoint device may then sign the challenge payload with a hardware-based security system that was bound to the endpoint device at manufacture, and return a response to the authenticator that includes the signed challenge payload. The authenticator can cryptographically validate the response and generate an authentication token for use by the endpoint device when joining the enterprise network.
CPC Classifications
H04L 9/3247 H04L 9/3213
Filing Date
2023-02-15
Application No.
18110051
Claims
20
Related changes
Get daily alerts for USPTO Patent Grants - Networking (H04L)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from USPTO.
The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when USPTO Patent Grants - Networking (H04L) publishes new changes.