METHOD AND APPARATUS FOR ASSIGNING NETWORK ADDRESSES BASED ON CONNECTION AUTHENTICATION
First Claim
1. A method of assigning a network address to a host based on authentication for a physical connection between the host and an intermediate device, the method comprising the computer-implemented steps of:
- receiving, at a configuration server, from the intermediate device, a first message for discovering a logical network address for the host,receiving, at the configuration server, first data that indicates at least some of authentication and authorization information associated with the host, wherein a first server that provides authentication and authorization in response to a request for authentication for the physical connection generated the first data,selecting, based at least in part on the first data, a particular pool of one or more logical network addresses from among a plurality of pools of one or more logical network addresses; and
sending, to the host, a second message including second data indicating a particular network address from the particular pool.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for assigning a network address to a host are based on authentication for a physical connection between the host and an intermediate device. One approach involves receiving first data at the intermediate device from an authentication and authorization server in response to a request for authentication for the physical connection. The first data indicates at least some of authentication and authorization information. A configuration request message from the host is also received at the intermediate device. The configuration request message is for discovering a logical network address for the host. A second message is generated based on the configuration request message and the first data. The second message is sent to a configuration server that provides the logical network address for the host. The configuration server is then able to provide the logical network address based on authorization and authentication information. The logical network address is thus based on the user, as is desirable to determine accounting information for billing purposes, to provide a minimum quality of service (QoS) according to a contract with the user, or to limit access by the user to the Internet and other services.
136 Citations
26 Claims
-
1. A method of assigning a network address to a host based on authentication for a physical connection between the host and an intermediate device, the method comprising the computer-implemented steps of:
-
receiving, at a configuration server, from the intermediate device, a first message for discovering a logical network address for the host, receiving, at the configuration server, first data that indicates at least some of authentication and authorization information associated with the host, wherein a first server that provides authentication and authorization in response to a request for authentication for the physical connection generated the first data, selecting, based at least in part on the first data, a particular pool of one or more logical network addresses from among a plurality of pools of one or more logical network addresses; and sending, to the host, a second message including second data indicating a particular network address from the particular pool. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of assigning a network address to a host based on authentication for a physical connection between the host and an intermediate device, the method comprising the computer-implemented steps of:
-
receiving, from the intermediate device, at an authorization server on a network connected to the intermediate device, a request for authenticating the host, the request including information provided from the host; determining, at the authorization server, whether the host is authentic and authorized to connect to the network based, at least in part, on the request and user profile data; in response to determining that the host is authentic and authorized to connect to the network, sending, from the authorization server, to the intermediate device, a response indicating that the host is authentic and authorized; and sending, from the authorization server, to a configuration server, first data that indicates at least some of authentication and authorization information associated with the host, wherein the configuration server provides a logical network address for the host. - View Dependent Claims (12, 13)
-
-
14. An apparatus for assigning a network address to a host based on authentication for a physical connection between the host and an intermediate device, comprising:
-
a network interface that is coupled to a data network for receiving one or more packet flows therefrom; a physical connection that is coupled to the host; one or more processors; instructions which, when executed by the one or more processors, cause the one or more processors to perform the steps of; receiving, at a configuration server, from the intermediate device, a first message for discovering a logical network address for the host, receiving, at the configuration server, first data that indicates at least some of authentication and authorization information associated with the host, wherein a first server that provides authentication and authorization in response to a request for authentication for the physical connection generated the first data, selecting, based at least in part on the first data, a particular pool of one or more logical network addresses from among a plurality of pools of one or more logical network addresses; and sending, to the host, a second message including second data indicating a particular network address from the particular pool. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. An apparatus for assigning a network address to a host based on authentication for a physical connection between the host and an intermediate device, comprising:
-
a network interface that is coupled to a data network for receiving one or more packet flows therefrom; a physical connection that is coupled to the host; one or more processors; one or more instructions which, when executed by the one or more processors, cause the one or more processors to perform the steps of; receiving, from the intermediate device, at an authorization server on a network connected to the intermediate device, a request for authenticating the host, the request including information provided from the host; determining, at the authorization server, whether the host is authentic and authorized to connect to the network based, at least in part, on the request and user profile data; in response to determining that the host is authentic and authorized to connect to the network, sending, from the authorization server, to the intermediate device, a response indicating that the host is authentic and authorized; and sending, from the authorization server, to a configuration server, first data that indicates at least some of authentication and authorization information associated with the host, wherein the configuration server provides a logical network address for the host. - View Dependent Claims (25, 26)
-
Specification