System and method for controlling access to multiple public networks and for controlling access to multiple private networks
First Claim
1. A method for controlling access to a network, the method comprising the following steps:
- (a) coupling a user device to a network;
(b) transmitting a first response to the network;
(c) generating a second response upon receipt of the first response by the network;
(d) comparing the first response and second response; and
(e) authenticating the user device if the first response and second response match, and not authenticating the user device if the first response and second do not match.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for controlling access to multiple public networks and for controlling access to multiple private networks is provided. Authentication is used with unique public shared secrets and unique private shared secrets to control access to the networks. The invention includes a user device for communicating with at least a public network and/or a private network. The device may be capable of accessing multiple networks through one or more private networks with multiple access control servers. The user device must provide a correct response to each access control server, before access to the network may be granted. The device generates a one-time password, or response, to gain access to a controlled network server. The response generated by the device is matched to a response generated by an access control server that may have generated a challenge that prompted the response. If the two responses match, the device is authenticated and a user of the device is granted access to the network server.
73 Citations
23 Claims
-
1. A method for controlling access to a network, the method comprising the following steps:
-
(a) coupling a user device to a network;
(b) transmitting a first response to the network;
(c) generating a second response upon receipt of the first response by the network;
(d) comparing the first response and second response; and
(e) authenticating the user device if the first response and second response match, and not authenticating the user device if the first response and second do not match. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for controlling access to a network, the method comprising the following steps:
-
(a) coupling a user device to a network;
(b) transmitting a request to the network;
(c) transmitting a challenge to the user device;
(d) generating a first response;
(e) transmitting the first response to the network;
(f) generating a second response upon receipt of the first response by the network;
(g) comparing the first response and second response; and
(h) authenticating the user device if the first response and second response match, and not authenticating the user device if the first response and second do not match. - View Dependent Claims (9, 10, 11, 12, 13, 14, 18)
-
-
15. A method for controlling access to a public network, the method comprising the following steps:
-
(a) coupling a user device to a public network, the network including a server;
(b) transmitting an access request from the user device to the server;
(c) transmitting a challenge from the server to the user device;
(d) processing the challenge to ascertain a selected public shared secret stored on the user device;
(e) generating a first response using at least the selected public shared secret;
(f) transmitting the first response to the server;
(g) generating a second response upon receipt of the first response by the server;
(h) comparing the first response and second response; and
(i) authenticating the user device to grant access to the public network if the first response and second response match, and not authenticating the user device if the first response and second do not match. - View Dependent Claims (16, 17)
-
-
19. A method for controlling access to a private network, the method comprising the following steps:
-
(a) coupling a user device to a private network, the network including a server;
(b) transmitting an access request from the user device to the server;
(c) transmitting a challenge from the server to the user device;
(d) processing the challenge to ascertain at least a selected private shared secret stored on the user device;
(e) generating a first response using at least the selected private shared secret;
(g) transmitting the first response to the server;
(h) generating a second response upon receipt of the first response by the server;
(i) comparing the first response and second response; and
(j) authenticating the user device to grant access to the private network if the first response and second response match, and not authenticating the user device if the first response and second do not match.
-
-
20. A method for controlling access to a private network, the method comprising the following steps:
-
(a) coupling a user device to a private network, the network including an access control server;
(b) transmitting an access request from the user device to the server, the access request comprising a first response that includes a selected public shared secret and a selected private shared secret stored on the user device;
(c) invoking the server to generate a second response upon receipt of the first response, the server generating the second response by means of the following steps, (i) processing the challenge transmitted to the user device to retrieve the selected public shared secret and the selected private shared secret, and (ii) processing the selected public shared secret and selected private shared secret to generate the second response;
(h) comparing the first response and second response; and
(i) authenticating the user device to grant access to the private network if the first response and second response match, and not authenticating the user device if the first response and second do not match. - View Dependent Claims (21, 22)
-
-
23. A method for controlling access to a private network, the method comprising the following steps:
-
(a) coupling a user device to a private network, the network including an access control server;
(b) transmitting an access request from the user device to the server;
(c) transmitting a challenge from the server to the user device;
(d) processing the challenge to retrieve a selected public shared secret and a selected private shared secret stored on the user device;
(e) processing the selected public shared secret and selected private shared secret to generate a first response;
(f) transmitting the first response to the server;
(g) invoking the server to generate a second response upon receipt of the first response by the server, the server generating the second response by means of the following steps, (i) processing the challenge transmitted to the user device to retrieve the selected public shared secret and the selected private shared secret, and (ii) processing the selected public shared secret and selected private shared secret to generate the second response;
(h) comparing the first response and second response; and
(i) authenticating the user device to grant access to the private network if the first response and second response match, and not authenticating the user device if the first response and second do not match.
-
Specification