SCHEME FOR DEVICE AND USER AUTHENTICATION WITH KEY DISTRIBUTION IN A WIRELESS NETWORK
First Claim
1. In a network comprising a first electronic device and a second electronic device, a method for authenticating access to a controlled network, said method comprising:
- a) authenticating said second electronic device to said first electronic device, said first electronic device communicatively coupled to said second electronic device;
b) authenticating said first electronic device to said second electronic device;
c) determining a key at said first electronic device and at said second electronic device; and
d) authenticating a user to a central authentication server.
2 Assignments
0 Petitions
Accused Products
Abstract
In a computer network, a method of mutually authenticating a client device and a network interface, authenticating a user to the network and exchanging encryption keys. In one embodiment, the method comprises authenticating the client device at the local network device point, with which the client device exchanges an encryption key and then the user is authenticated by a central authentication server. In another embodiment, the method comprises authenticating the client device at the central authentication server, with which the client device exchanges a key which is passed to the network device with a secret shared between the central authentication server and the network device. In this embodiment, the user is also authenticated at the central authentication server.
23 Citations
24 Claims
-
1. In a network comprising a first electronic device and a second electronic device, a method for authenticating access to a controlled network, said method comprising:
-
a) authenticating said second electronic device to said first electronic device, said first electronic device communicatively coupled to said second electronic device;
b) authenticating said first electronic device to said second electronic device;
c) determining a key at said first electronic device and at said second electronic device; and
d) authenticating a user to a central authentication server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system network comprising:
-
a central authentication server for authenticating a user to send or receive information over a computer system network;
a first electronic device coupled to said network device; and
a second electronic device coupled to said central authentication server;
said central authentication server, said first electronic device and said second electronic device operating in conjunction to perform a method of authenticating access to a controlled network, said method comprising;
a) authenticating said second electronic device to said first electronic device, said first electronic device communicatively coupled to said second electronic device;
b) authenticating said first electronic device to said second electronic device;
c) determining a key at said first electronic device and at said second electronic device; and
d) authenticating a user to a central authentication server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. In a computer-usable medium having computer-readable program code embodied therein, a computer-implemented method for authenticating a first electronic device and a second electronic device, said method comprising:
-
a) authenticating said second electronic device to said first electronic device, said first electronic device communicatively coupled to said second electronic device;
b) authenticating said first electronic device to said second electronic device;
c) Determining a key at said first electronic device and at said second electronic device; and
d) authenticating a user to a central authentication server. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification