METHOD FOR IMPLEMENTING EAP AUTHENTICATION RELAY IN A WIRELESS ACCESS SYSTEM
First Claim
1. A method for implementing EAP authentication relay in a wireless access system, characterized by comprising:
- During an EAP authentication process, running an authentication protocol of EAP over a wireless medium between a Supplicant and an Authentication Relay, running an authentication protocol of EAPoL between the Authentication Relay and an Authenticator, and the Authentication Relay performing a transformation between the authentication protocol of EAP over the wireless medium and the authentication protocol of EAPoL over the Ethernet.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is related to a method for implementing EAP authentication relay in a wireless access system. During the EAP authentication process, an authentication protocol of the EAP over a wireless medium runs between the Supplicant and the Authentication Relay, the EAPoL protocol runs between the Authentication Relay and the Authenticator, and the Authentication Relay performs the transformation between the authentication protocol of EAP over wireless medium and EAPoL. The method in this present invention may facilitate the interoperability between the Authentication Relays and the Supplicants from various vendors, as well as make better use of the current Ethernet access and aggregation network. The present invention can work under the current framework of a fixed access network without much modification.
29 Citations
18 Claims
-
1. A method for implementing EAP authentication relay in a wireless access system, characterized by comprising:
- During an EAP authentication process, running an authentication protocol of EAP over a wireless medium between a Supplicant and an Authentication Relay, running an authentication protocol of EAPoL between the Authentication Relay and an Authenticator, and the Authentication Relay performing a transformation between the authentication protocol of EAP over the wireless medium and the authentication protocol of EAPoL over the Ethernet.
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
Specification