Supercharge Your Innovation With Domain-Expert AI Agents!

Password and policy based device independent authentication

A password and policy technology, applied in encryption devices with shift registers/memory, instruments, televisions, etc., can solve the problems of cumbersome loading of electronic devices, complicated registration process, time-consuming and other problems

Pending Publication Date: 2022-06-24
ARRIS ENTERPRISES LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, this approach poses other challenges, such as how to distribute and use encrypted information (such as a password, sometimes called a dynamic pre-shared key or DPSK) to a given electronic device in a given PAN, enabling the establishment of secure connection
For example, in some existing approaches, a given electronic device in a PAN has a separate password associated with the given electronic device, which can make the onboarding of the electronic device cumbersome and time-consuming, or may require Complex registration process for electronic devices in
Also, password management can be complicated in these methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password and policy based device independent authentication
  • Password and policy based device independent authentication
  • Password and policy based device independent authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] An electronic device (eg, an AAA server) that selectively authorizes secure access to a network by a second electronic device is described. Such an electronic device may receive an access request associated with a computer, wherein the access request includes a password parameter associated with the user, and the password parameter includes the input and output of the encryption computation. In response, the electronic device may compute one or more second outputs of the encrypted computation based at least in part on the input and the one or more stored passwords. Furthermore, when there is a match between one of the one or more second outputs and the output, the electronic device can access the policy associated with the user. Then, when one or more criteria associated with the policy are satisfied, the electronic device may optionally provide an access accept message to the computer, the access accept message including information for establishing secure access for t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An electronic device is described that selectively grants secure access to a network by a second electronic device. The electronic device receives an access request associated with a computer, where the access request includes password parameters associated with a user, and the password parameters include inputs and outputs of cryptographic calculations. In response, the electronic device computes one or more second outputs that encrypt the computation based at least in part on the input and the one or more stored passwords. Further, when there is a match between one of the one or more second outputs and the output, the electronic device accesses a policy associated with the user. Then, when one or more criteria associated with the policy are satisfied, the electronic device selectively provides an access acceptance message to the computer, the access acceptance message including information for establishing secure access to the second electronic device.

Description

[0001] background technical field [0002] The described embodiments relate to techniques for authenticating one or more devices to a dynamic personal area network (PAN) in a network based on a password and a policy associated with the network, such as a policy for a location associated with the one or more devices . Background technique [0003] Many electronic devices are capable of wirelessly communicating with other electronic devices. Specifically, these electronic devices may include network subsystems that implement network interfaces for cellular networks (UMTS, LTE, etc.), wireless local area networks (eg, as described in the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard) Wireless network or Bluetooth from the Bluetooth Special Interest Group in Kirkland, Washington), and / or another type of wireless network. For example, many electronic devices communicate with each other via a wireless local area network (WLAN) using an IEEE 802.11 comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F7/04H04L9/06H04L9/08H04L9/40H04N7/167
CPCH04L9/3226H04L2209/80H04L9/0833H04L63/0892H04L63/108H04L63/107H04L63/0846G06F21/44G06F2221/2111H04L9/0869
Inventor 戴维·谢尔顿·斯蒂芬森许銘杰伦·西迪
Owner ARRIS ENTERPRISES LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More