NETWORK USER IDENTIFICATION AND AUTHENTICATION
First Claim
Patent Images
1. A method of identifying and authenticating a network user comprising:
- receiving a first network layer packet from a first user entity, the first network layer packet including first unique identification information unique to the first user entity and independent of a first network address associated with the first network layer packet; and
verifying, at a network layer of a network, that the first network layer packet is from the first user entity based on the first unique identification information.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of identifying and authenticating a network user includes receiving a first network layer packet from a first user entity. The first network layer packet may include first unique identification information unique to the first user entity and independent of a first network address associated with the first network layer packet. The method further includes verifying, at a network layer of a network, that the first network layer packet is from the first user entity based on the first unique identification information.
-
Citations
20 Claims
-
1. A method of identifying and authenticating a network user comprising:
-
receiving a first network layer packet from a first user entity, the first network layer packet including first unique identification information unique to the first user entity and independent of a first network address associated with the first network layer packet; and verifying, at a network layer of a network, that the first network layer packet is from the first user entity based on the first unique identification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A processor configured to execute computer instructions to cause a system to perform operations for identifying and authenticating a network user, the operations comprising:
-
receiving a first network layer packet from a first user entity, the first network layer packet including first unique identification information unique to the first user entity and independent of a first network address associated with the first network layer packet; and verifying, at a network layer of a network, that the first network layer packet is from the first user entity based on the first unique identification information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification