Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless device authentication and service access

A technology for service access and authenticator, applied in the direction of user identity/authority verification, electrical components, transmission systems, etc.

Active Publication Date: 2018-04-27
EXTREME NETWORKS INC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, problems associated with multiple authentications may continue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless device authentication and service access
  • Wireless device authentication and service access
  • Wireless device authentication and service access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] figure 1 Diagram 100 illustrates an example of a system for single sign-on authentication of a client device to a network and access by the client device to services provided by the network. figure 1 The example system shown includes a computer readable medium 102 , a client device 104 , an authenticator network device 106 , a network authentication system 108 , and a device service management system 110 .

[0015] exist figure 1 In the example system shown, authenticator network device 106 , network authentication system 108 , and device service management system 110 are connected to each other via computer-readable medium 102 . As used herein, "computer-readable media" is intended to include all media that are legal (e.g., in the United States under 35 U.S.C. A claim to a computer-readable medium is required to the extent of this exclusion. Known statutory computer readable media include hardware (eg, registers, random access memory (RAM), nonvolatile (NV) memory, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Authenticating a client device coupled to an authenticator network device for a network. A service request is received from the client device at the authenticator network device. User credentials, including a user ID, a user key, and a nonce for a user are received at the authenticator network device. A token is generated using the received user credentials. The service request is modified to include the token and a user ID parameter that is the user ID to generate a modified service request. The modified service request is used to provide single sign-on access to a service that is the subject of the service request.

Description

Background technique [0001] Improving the performance of communications via networks, especially wireless networks, is an area of ​​ongoing research and development. Wireless networks are often managed using the 802.11 standard. Although not all networks are required to use all standards associated with 802.11, at least in part because the standards are well known and documented, a discussion of standards such as so-called 802.11n provides a useful background for describing issues related to wireless systems. [0002] Ensuring that the proper devices receive the proper services (eg, services to which a system administrator has granted permission) is an important aspect of providing wireless services. Often, receiving services requires authenticating the device. Especially in the case of utilizing a third party (relative to the party granting wireless access), two authentications may be required: one when authenticating according to e.g. 802.11 protocol and another when authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L63/0807H04L63/0815H04L63/0892H04L63/102H04L63/062H04L63/10
Inventor P·范X·邹W·宋
Owner EXTREME NETWORKS INC