PUBLIC KEY GENERATION UTILIZING MEDIA ACCESS CONTROL ADDRESS
First Claim
Patent Images
1. An apparatus, comprising:
- a memory, storing a set of instructions; and
a processor, to execute the stored set of instructions, toin a registration process of a user device in a network, generate a public/private key pair based on a media access control (MAC) address of a user device;
transmit the generated public/private key pair to the user device, wherein the public/private key is to facilitate network access by the user device; and
provide the MAC address of the user device, associated with the user, to a storage device.
2 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, in a registration process where a user device is registering for access to a network, a public/private key pair may be generated based on a media access control (MAC) address of a user device. The generated public/private key pair may be transmitted to the user device for future access to the network. In some embodiments, where a user device is requesting access to a network, a MAC address embedded in a public key may be utilized to determine whether access to the network should be granted.
35 Citations
15 Claims
-
1. An apparatus, comprising:
-
a memory, storing a set of instructions; and a processor, to execute the stored set of instructions, to in a registration process of a user device in a network, generate a public/private key pair based on a media access control (MAC) address of a user device; transmit the generated public/private key pair to the user device, wherein the public/private key is to facilitate network access by the user device; and provide the MAC address of the user device, associated with the user, to a storage device. - View Dependent Claims (2, 3, 4)
-
-
5. A method of managing access to a network, the method comprising:
-
implementing a media access control based authentication operation in determining whether to grant a user device of a user access to the network; enabling the user to self-register the user device into a database of authorized users to access the network in response to the user being denied access to the network through the MAC based authentication operation and being listed as a valid user in a directory of active network users; receiving a MAC address of the user device; generating a public/private key pair for the user, the MAC address of the user device being embedded in the public certificate extension; and transmitting the generated public/private key pair to the user device. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A non-transitory computer readable storage medium on which is embedded a computer program, said computer program implementing a method, said computer program comprising computer readable code to:
-
receive, from a user device requesting access to a network, a public key and a digital signature, the public key including a media access control (MAC) address; verify if the digital signature is valid; determine the MAC address from the public key; compare the determined MAC address with a MAC address of the user device requesting access to the network; and provide network access to the user device if the MAC address determined from the public key is the same as the MAC address of the user device requesting access to the network and if the digital signature is valid. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification