RADIUS SECURITY ORIGIN CHECK
First Claim
Patent Images
1. A computer implemented method for authenticating a user to a network, the computer implemented method comprising:
- responsive to receiving a request from the user to access a protected resource, sending a unique bit sequence into a network connection utilized by the user; and
responsive to receiving a verification that the unique bit sequence has been received by an access point that authenticated the user when the user logged on to the network, authenticating the user to access the protected resource.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method, apparatus, and computer program product for authenticating a user to a network. In response to receiving a request from a user to access a protected resource, the process sends a unique bit sequence into a network connection utilized by the user. Next, the process authenticates the user to access the protected resource in response to receiving a verification that the unique bit sequence was received by an access point that authenticated the user when the user logged on to the network.
35 Citations
20 Claims
-
1. A computer implemented method for authenticating a user to a network, the computer implemented method comprising:
-
responsive to receiving a request from the user to access a protected resource, sending a unique bit sequence into a network connection utilized by the user; and responsive to receiving a verification that the unique bit sequence has been received by an access point that authenticated the user when the user logged on to the network, authenticating the user to access the protected resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer implemented method for authenticating a user to a network, the computer implemented method comprising:
-
responsive to receiving a request from the user to access a protected resource, sending an Internet protocol address used by the user to an authentication server; and responsive to receiving login information for the user from the authentication server, authenticating the user using the login information. - View Dependent Claims (12, 13)
-
-
14. A computer program product comprising:
-
a computer usable medium including computer usable program code for authenticating a user to a network, said computer program product comprising; computer usable program code for sending a unique bit sequence into a network connection utilized by the user in response to receiving a request from the user to access a protected resource; and computer usable program code for authenticating the user to access the protected resource in response to receiving a verification that an origin security check package was received by an access point that authenticated the user when the user logged on to the network. - View Dependent Claims (15, 16)
-
-
17. A system for authenticating a user to a network, the system comprising:
a protected resource, wherein the protected resource sends a unique bit sequence into a network connection utilized by the user to determine if the user is an authorized user, and wherein the protected resource notifies an authentication server that the unique bit sequence has been sent. - View Dependent Claims (18, 19, 20)
Specification