Methods and systems of remote authentication for computer networks
First Claim
1. A method, comprising exchanging, as part of a network node authentication process, access control parameters that define the network node'"'"'s ability to access other resources accessible through a computer network, wherein exchanging access control parameters includes transmitting a MAC address of an access point through which the network node will access the computer network in an authentication message to an authentication server to uniquely identify the access point to the authentication server.
11 Assignments
0 Petitions
Accused Products
Abstract
As part of a network node authentication process, a MAC address or other globally unique identifier of an access point through which the network node will access a computer network is transmitted in an EAP or other authentication message to an authentication server to uniquely identify the access point to the authentication server.
101 Citations
24 Claims
- 1. A method, comprising exchanging, as part of a network node authentication process, access control parameters that define the network node'"'"'s ability to access other resources accessible through a computer network, wherein exchanging access control parameters includes transmitting a MAC address of an access point through which the network node will access the computer network in an authentication message to an authentication server to uniquely identify the access point to the authentication server.
-
24. A method, comprising exchanging, as part of a network node authentication process, a unique identifier other than an Internet protocol address of an access point through which the network node will access a computer network in an authentication message to an authentication server to uniquely identify the access point to the authentication server.
Specification