Extensible access control architecture
First Claim
1. A computer-readable medium having computer-executable components comprising:
- (a) a first interface for receiving messages in a standardized format;
(b) a plurality of authentication components, each of the authentication components having an interface in a predetermined form; and
(c) a component for receiving messages through the first interface and selectively calling an authentication component of the plurality of authentication components through the interface of the authentication component.
2 Assignments
0 Petitions
Accused Products
Abstract
Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
-
Citations
20 Claims
-
1. A computer-readable medium having computer-executable components comprising:
-
(a) a first interface for receiving messages in a standardized format;
(b) a plurality of authentication components, each of the authentication components having an interface in a predetermined form; and
(c) a component for receiving messages through the first interface and selectively calling an authentication component of the plurality of authentication components through the interface of the authentication component. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of operating access control software, comprising the acts:
-
(a) receiving a message forming a portion of an access control interaction with host software executing from within a first process;
(b) communicating between the host software and a method across an inter-process interface; and
(c) executing a function of the access control interaction with the method in a second process. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method of operating a peer in a network, comprising acts:
-
a) from within a supplicant, accessing a host through an host interface;
b) with the host, accessing a method through a method interface to obtain access control information; and
c) transmitting the access control information over the network. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification