Authentication method without credential duplication for users belonging to different organizations
A user and certificate technology, applied in the transmission system, electrical components, etc., can solve the problems of increased complexity of system management, difficult identification of connected users, and system scalability limitations, and achieve the effect of easy scaling
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] now refer to figure 1 , shows a federation of organizations (E1, E2, E3) connected to the Internet 1 .
[0040] For the purposes of this description, the term 'organization' refers to any entity that may grant users access to the Internet or operate a structured user management system.
[0041] exist figure 1 In the example of , institutions E1 and E2 are equipped with computer systems, in particular network nodes, which include a gateway GW, an authentication server AS, and a database DB containing information required by users of the authentication institutions.
[0042] The gateway GW performs all firewall functions and filters any unauthorized traffic, while the authentication server AS verifies the user's credentials in a database DB (MySQL or LDAP database, or a password file) or via standard protocols such as RADIUS.
[0043] exist figure 1 In the example of , organization E2 is equipped with access point 3, which provides users with wireless access through ac...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com