Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

474 results about "Web authentication" patented technology

Web service authentication is the verification of a user’s identity before allowing access to a network or website. Certificates verify the identity of a Web server to users.

Authenticated access to internet based research and data services

Access to a database is provided via the Internet using a World Wide Web server including a search engine, a CGI gateway and user selectable data queries for extracting data, generating reports, and the like. Access by the user is authenticated by querying the user's central machine for authentication. The authentication process operates by sending a page request from the web browser through three checkpoints before the requested page can be served to the web browser. The first checkpoint determines if the requested page is protected. If not, the requested page is served to the web browser. However, if the requested page is protected, the authentication process on the web server checks the host name of the system where the page request is coming from. If the domain of the requesting host is the same domain specified in the web authentication configuration, then the requested page is served to the web browser. However, if the page request is determined to come from outside of the domain of the web server, then the authentication process checks a "cookie" from the web browser to determine if the requesting user has been authenticated as an authorized user earlier in the same session. If the cookie has been "set" during the login procedure, then the requested page is served to the web browser. Otherwise, the user is prompted with a login page. After the user ends the web browser session, the cookie is cleared. Data Query software at the web server permits queries initiated via a web browser to be completed off-line and the results e-mailed to the initiator of the request.
Owner:THE TRUSTEES OF THE UNIV OF PENNSYLVANIA

Fast authentication and access control system for mobile networking

A fast authentication and access control method of authenticating a network access device to a communications network having an access point communicating with a remote authentication (home AAA) server for the network access device. The method includes the step of receiving an access request having an authentication credential from the network access device at the access point. The authentication credential includes a security certificate having a public key for the network access device and an expiration time. The security certificate is signed with a private key for the remote authentication server. The access point locally validates the authentication credential by accessing the public key of the remote authentication server from a local database, and checking the signature and expiration time of the security certificate. If the authentication credential is validated at the access point, the access point grants the network access device conditional access to the network by sending an access granted message to the network access device. The access granted message includes a session key encrypted with a public key for the network access device. The session key is stored in a database associated with the access point. The access point contacts the remote authentication server to check a revocation status of the security certificate for the network access device. If the access point receives a message from the remote authentication server that the authentication credential for the network access device has been revoked, it suspends network access for the network access device.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO

Perception-free WLAN (Wireless Local Area Network) authentication method fusing Portal/Web authentication and MAC (Media Access Control) authentication

The invention discloses a perception-free WLAN (Wireless Local Area Network) authentication method fusing Portal / Web authentication and MAC (Media Access Control) authentication. In the method, the characteristics and advantages of Portal / Web authentication and MAC authentication are fused. The method comprises the following steps: when a user terminal accesses a WLAN network for the first time, a user authenticates via a mobile phone number, and an AP (Access Point) or AC (Access Controller) serving as network access equipment transmits the MAC address information of the user terminal to an authentication server by controlling an HTTP (Hyper Text Transport Protocol) redirecting request of the user, so that the authentication server can correlatively bind user information with the unique identification MAC of the user terminal; when the user accesses the network once again or roams, the AP or AC of a WLAN infrastructure extracts the MAC address of the user terminal while the user terminal is correlating with the network, and network access authentication is completed for the user by using the MAC without perception of the user. The perception-free authentication method does not have any additional software installation requirement on a wireless terminal of the user, so that the user can obtain excellent authentication experience while accessing the WLAN network, and the identity-traceable network security requirement can be met.
Owner:SUZHOU HANMING TECH

Fast authentication and access control method for mobile networking

A fast authentication and access control method of authenticating a network access device to a communications network having an access point communicating with a remote authentication (home AAA) server for the network access device. The method includes the step of receiving an access request having an authentication credential from the network access device at the access point. The authentication credential includes a security certificate having a public key for the network access device and an expiration time. The security certificate is signed with a private key for the remote authentication server. The access point locally validates the authentication credential by accessing the public key of the remote authentication server from a local database, and checking the signature and expiration time of the security certificate. If the authentication credential is validated at the access point, the access point grants the network access device conditional access to the network by sending an access granted message to the network access device. The access granted message includes a session key encrypted with a public key for the network access device. The session key is stored in a database associated with the access point. The access point contacts the remote authentication server to check a revocation status of the security certificate for the network access device. If the access point receives a message from the remote authentication server that the authentication credential for the network access device has been revoked, it suspends network access for the network access device.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO

Control method, device and system for identifying login on basis of voiceprint

The invention provides a control method, a device and a system for identifying login on the basis of voiceprint. The control method includes steps of enabling a mobile terminal to acquire voiceprint features and login passwords of users and store the voiceprint features and the login passwords, acquiring login information of a plurality of application programs and/or a plurality of websites and binding the login information of the multiple application programs and/or the multiple websites to the voiceprint features and the login passwords; enabling the mobile terminal to display login interfaces of current application programs or current websites to current users, and starting a voice acquisition function; enabling the mobile terminal to acquire information of the current application programs or the current websites, and acquiring voice information inputted by the current users; enabling the mobile terminal to authenticate the voice information according to the voiceprint features and the login passwords; acquiring the corresponding login information according to the information of the current application programs or the current websites if the current users are authenticated; adding the login information to the login interfaces to perform login operation. The control method, the device and the system have the advantage that the network authentication safety and the network authentication convenience can be improved.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products