Flexible wlan access point architecture capable of accommodating different user devices
First Claim
1. A method for controlling access by a user terminal to a communications network comprising the steps of:
- receiving from the user terminal a request to access the communications network;
transmitting to the user terminal an identity request message;
receiving from the user terminal, if the user terminal utilizes a predetermined authentication protocol, a response to the identity request message;
determining whether the user terminal uses the predetermined authentication protocol in response to the response to the identity request message;
selecting an authentication mechanism compatible with the user terminal upon determining the user terminal is not compatible with the predetermined authentication protocol, for allowing user terminal access to the communications.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention provides an apparatus and a method for improving the control of access by a terminal device in a WLAN environment having an access point for determining whether the device utilizes an IEEE 802.1x protocol by the access point communicating to the device, a packet, whereby if the devices utilizes a IEEE 802.1x protocol the device appropriately responds and otherwise the access point determines that the terminal device protocol does not employ a IEEE 802.1x protocol and selects an authentication mechanism compatible with the terminal device. If the device is not an IEEE 802.1x client, an IP packet filtering is configured to redirect a user HTTP request to a local server, and when the HTTP requests are thereby redirected, the HTTP server presents the terminal device with information specifically related to the browser based authentication.
-
Citations
27 Claims
-
1. A method for controlling access by a user terminal to a communications network comprising the steps of:
-
receiving from the user terminal a request to access the communications network;
transmitting to the user terminal an identity request message;
receiving from the user terminal, if the user terminal utilizes a predetermined authentication protocol, a response to the identity request message;
determining whether the user terminal uses the predetermined authentication protocol in response to the response to the identity request message;
selecting an authentication mechanism compatible with the user terminal upon determining the user terminal is not compatible with the predetermined authentication protocol, for allowing user terminal access to the communications. - View Dependent Claims (2, 3)
-
-
4. A method for controlling mobile terminal access to a wireless local area network, comprising the steps of:
-
receiving from the mobile terminal a request to access the wireless local area network;
transmitting to the mobile terminal an identity request message;
receiving from the mobile terminal, if the mobile terminal utilizes an IEEE 802.1x protocol, a response to the identity request message;
determining whether the mobile terminal is IEEE 802.1x compliant in response to the response to the identity request message; and
selecting an authentication mechanism, compatible with the mobile terminal in response to the determination, for allowing user mobile terminal access to the wireless local area network. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
10. An access point in communication with a terminal device in a wireless local area network, comprising:
a means to determine whether the terminal device utilizes an IEEE 802.1x protocol and, if the terminal does not utilize said protocol, then the access point employing an authentication means compatible with the terminal device otherwise the access point employing an IEEE 802.1x protocol. - View Dependent Claims (11, 12, 13)
-
14. A method for controlling access by a terminal device in a wireless local area network by determining whether the terminal device utilizes an IEEE 802.1x protocol comprising the steps of:
an access point communicating to the mobile terminal a request to identify, and if the terminal device utilizes an IEEE 802.1x protocol, acknowledging the request to identify, otherwise the access point determining that the terminal is not IEEE 802.1x compliant and selecting an authentication mechanism compatible with the mobile terminal. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
21. A method for controlling access of a terminal device in a wireless local area network by determining whether the terminal device utilizes an IEEE 802.1x protocol comprising the steps of:
communicating through the an access point to the mobile terminal a request to identify, and if the terminal device utilizes an IEEE 802.1x protocol, acknowledging the request to identify, otherwise determining by the access point that the terminal is not IEEE 802.1x compliant and selecting an authentication mechanism compatible with the terminal. - View Dependent Claims (22, 23, 24, 25, 26, 27)
Specification