System and methods for providing multi-hop access in a communications network
First Claim
1. A method of providing a supplicant access to a wireless communications network the method comprising:
- receiving an authentication request at an authenticator from the supplicant;
creating a state based on the authentication request at the authenticator;
relaying the authentication request towards a prime authenticator, wherein the prime authenticator is connected to an authentication server;
relaying authentication information from the prime authenticator to the authenticator, wherein the authentication information is generated at an authentication server;
receiving the authentication information from the authenticator, and fulfilling the authentication request.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and methods for providing a supplicant access to a communications network are disclosed. An authenticator receives an authentication request at an authenticator (210) from the supplicant. A state is created based on the authentication request at the authenticator (210). The authentication request is relayed towards a prime authenticator (215) where the prime authenticator is connected to an authentication server. Finally, the authenticator (215) receives authentication information from the prime authenticator and fulfills the authentication request using the authentication information.
42 Citations
20 Claims
-
1. A method of providing a supplicant access to a wireless communications network the method comprising:
-
receiving an authentication request at an authenticator from the supplicant;
creating a state based on the authentication request at the authenticator;
relaying the authentication request towards a prime authenticator, wherein the prime authenticator is connected to an authentication server;
relaying authentication information from the prime authenticator to the authenticator, wherein the authentication information is generated at an authentication server;
receiving the authentication information from the authenticator, and fulfilling the authentication request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for providing multi-hop access to a supplicant in a wireless communications network, the system comprising:
-
a supplicant seeking authentication by sending an authentication request;
an authenticator to receive the authentication request from the supplicant, the authenticator creating a state on receiving the authentication request;
a prime authenticator to receive the authentication request by way of a relay from the authenticator; and
,an authentication server connected to the prime authenticator to receive the authentication request from the authenticator, wherein the authenticator fulfills the authentication request in conjunction with the authentication server. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method of providing mobility to a trusted supplicant authenticated via an authenticator in a wireless communications network, the method comprising:
-
identifying a second authenticator, wherein the second authenticator and the first authenticator communicate with a prime authenticator via a third authenticator;
sending to the second authenticator a unique key corresponding to the trusted supplicant from the third authenticator; and
authenticating by the second authenticator the trusted supplicant using the unique key, wherein the unique key has been generated by an authentication server while authenticating the trusted supplicant via the first authenticator, and wherein the unique key is stored at least in the first authenticator and the prime authenticator. - View Dependent Claims (19, 20)
-
Specification