Authenticating an endpoint using a stun server
First Claim
1. A method for authenticating an endpoint in a network, comprising:
- facilitating a communication session between a first endpoint and a second endpoint over a network;
sending a challenge request to the second endpoint, the challenge request attempting to authenticate the second endpoint, the challenge request comprising an identification, the identification associated with an expected response identification;
receiving a response from the second endpoint to the challenge request, the response comprising an actual response identification; and
verifying the received response to establish whether the second endpoint is legitimate, the second endpoint being legitimate if the actual response identification comprises the expected response identification.
1 Assignment
0 Petitions
Accused Products
Abstract
Authenticating an endpoint using a STUN server includes facilitating a communication session between a first endpoint and a second endpoint over a network. A challenge request is sent to the second endpoint. The challenge request attempts to authenticate the second endpoint and includes an identification. The identification is associated with an expected response identification. A response to the challenge request is received from the second endpoint. The response has an actual response identification. The received response is verified to establish whether the second endpoint is legitimate. The second endpoint is legitimate if the actual response identification includes the expected response identification.
29 Citations
25 Claims
-
1. A method for authenticating an endpoint in a network, comprising:
-
facilitating a communication session between a first endpoint and a second endpoint over a network;
sending a challenge request to the second endpoint, the challenge request attempting to authenticate the second endpoint, the challenge request comprising an identification, the identification associated with an expected response identification;
receiving a response from the second endpoint to the challenge request, the response comprising an actual response identification; and
verifying the received response to establish whether the second endpoint is legitimate, the second endpoint being legitimate if the actual response identification comprises the expected response identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authenticating an endpoint in a network, comprising:
-
a server coupled to a plurality of endpoints and operable to facilitate a communication session between a first endpoint and a second endpoint over a network; and
a protection device coupled to the plurality of endpoints and operable to;
send a challenge request to the second endpoint, the challenge request attempting to authenticate the second endpoint, the challenge request comprising an identification, the identification associated with an expected response identification;
receive a response from the second endpoint to the challenge request, the response comprising an actual response identification; and
verify the received response to establish whether the second endpoint is legitimate, the second endpoint being legitimate if the actual response identification comprises the expected response identification. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. Logic for authenticating an endpoint in a network, the logic embodied in a medium and operable to:
-
facilitate a communication session between a first endpoint and a second endpoint over a network;
send a challenge request to the second endpoint, the challenge request attempting to authenticate the second endpoint, the challenge request comprising an identification, the identification associated with an expected response identification;
receive a response from the second endpoint to the challenge request, the response comprising an actual response identification; and
verify the received response to establish whether the second endpoint is legitimate, the second endpoint being legitimate if the actual response identification comprises the expected response identification. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A protection device, comprising:
-
a challenge module operable to send a challenge request to an endpoint, the challenge request attempting to authenticate the endpoint, the challenge request comprising an identification, the identification associated with an expected response identification; and
a response module coupled to the challenge module operable to;
receive a response from the endpoint to the challenge request, the response comprising an actual response identification; and
verify the received response to establish whether the endpoint is legitimate, the endpoint being legitimate if the actual response identification comprises the expected response identification. - View Dependent Claims (24)
-
-
25. A system for authenticating an endpoint in a network, comprising:
-
means for facilitating a communication session between a first endpoint and a second endpoint over a network;
means for sending a challenge request to the second endpoint, the challenge request attempting to authenticate the second endpoint, the challenge request comprising an identification, the identification associated with an expected response identification;
means for receiving a response from the second endpoint to the challenge request, the response comprising an actual response identification; and
means for verifying the received response to establish whether the second endpoint is legitimate, the second endpoint being legitimate if the actual response identification comprises the expected response identification.
-
Specification