Systems and methods for adaptive authentication
An authentication method and network authentication technology, applied in the field of device authentication, can solve the problem of consuming a considerable amount of time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] figure 2 is a simplified diagram of a networking environment 200 in which the disclosed systems and methods can be implemented to authenticate both wired and wireless network devices, according to an exemplary embodiment. As shown, networked environment 200 includes a plurality of exemplary wireless and wired devices that may be configured to communicate with each other via wireless or wired communications, respectively. While both wireless and wired devices are shown, it will be understood that the disclosed systems and methods may be implemented in any type of networking environment, such as a networking environment that includes only wireless devices or a networking environment that includes only wired devices, with Used to authenticate devices for networked communication. Furthermore, the disclosed systems and methods can be implemented for authenticating network communications in a variety of networking environment types (eg, home networking environments, office n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 