Deterministic user authentication service for communication network
DCFirst Claim
1. A user authentication method for a communication network having a plurality of nodes, the method comprising:
- entering on a first node first user identification information;
transmitting to a second node the first user identification information, the second node having second user identification information;
comparing for a match on the second node the first user identification information with the second user identification information; and
authorizing communication between the first node and a group of nodes on the communication network in response to a match, wherein the group of nodes is represented by a virtual local area network identifier.
9 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A user authentication service for a communication network authenticates local users before granting them access to personalized sets of network resources. Authentication agents on intelligent edge devices present users of associated end systems with log-in challenges. Information supplied by the users is forwarded to an authentication server for verification. If successfully verified, the authentication server returns to the agents authorized connectivity information and time restrictions for the particular authenticated users. The agents use the information to establish rules for filtering and forwarding network traffic originating from or destined for particular authenticated users during authorized time periods. An enhanced authentication server may be engaged if additional security is desired. The authorized connectivity information preferably includes identifiers of one or more virtual local area networks active in the network. Log-in attempts are recorded so that the identity and whereabouts of network users may be monitored from a network management station.
236 Citations
40 Claims
-
1. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
entering on a first node first user identification information;
transmitting to a second node the first user identification information, the second node having second user identification information;
comparing for a match on the second node the first user identification information with the second user identification information; and
authorizing communication between the first node and a group of nodes on the communication network in response to a match, wherein the group of nodes is represented by a virtual local area network identifier.
-
-
2. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
entering on a first node first user identification information;
transmitting to a second node the first user identification information, the second node having second user identification information;
comparing for a match on the second node the first user identification information with the second user identification information; and
establishing communicability between the first node and a group of nodes associated with the second user identification information in response to a match, wherein the group of nodes is represented by a virtual local area network identifier. - View Dependent Claims (3, 4, 5)
-
-
6. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
associating a user of the network with a group of nodes represented by a virtual local area network based on a unique user key;
verifying the unique user key in a log-in sequence; and
authorizing communication between the user and the group of nodes upon verifying the unique user key.- View Dependent Claims (7, 8, 10, 11)
-
-
9. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
associating a user of the network with a group of nodes and an access period based on a unique user key;
verifying the unique user key in a log-in sequence; and
authorizing communication between the user and the group of nodes for the access period upon verifying the unique user key, wherein the group of nodes is represented by a virtual local area network.
-
-
12. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
associating based on a unique user key each of a plurality of users of the network with a group of nodes represented by a virtual local area network selected for the user; and
verifying in a log-in sequence for each of the plurality of users the user'"'"'s unique user key prior to establishing communicability between the user and the group of nodes selected for the user. - View Dependent Claims (13, 14)
-
-
15. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
entering on a first node first user identification information;
transmitting to a second node the first user identification information, the second node having a database with pairs of user identification information and network resources;
searching the database for paired user identification information matching the first user identification information; and
authorizing communication between the first node and the network resources paired with matching user identification information, wherein the network resources are represented by a virtual local area network.
-
-
16. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
entering on a first node a first user identification information;
transmitting to a second node the first user identification information, the second node having second user identification information;
comparing for a match on the second node the first user identification information with the second user identification information; and
initiating upon a match an enhanced authentication for the user, whereby more information is solicited from the user and compared with information on a third node prior to establishing communicability between the user and a group of nodes represented by a virtual local area network identifier with which the user is authorized to communicate.
-
-
17. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
entering on a first node first user identification information;
transmitting to an authentication agent on a second node communicating with the first node over a LAN link the first user identification information;
relaying from the authentication agent to an authentication server the first user identification information;
comparing on the authentication server the first user identification information with user identification information in a database of user identification information; and
transmitting from the authentication server to the authentication agent, if the first user identification information matches user identification information in the database of user identification information, information notifying the authentication agent that a user on the first node has been authenticated whereupon the authentication agent authorizes transmission on the second node of packets in data flows involving the first node. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
transmitting a log-in response from an end system being used by a user to an authentication agent;
relaying the log-in response to an authentication server;
reviewing the log-in response at the authentication server to determine if the user is authorized; and
transmitting to the authentication agent a list of network resources for which the user is authorized, along with any time restrictions whereupon the authentication agent applies the authorized list of network resources and time restrictions to establish network connectivity rules for the user, wherein the authentication agent is located on a node having a LAN link to the end system.
-
-
24. A user authentication system for a communication network comprising:
-
a first node for entering user identification information;
a second node for receiving the user identification information from the first node and comparing for a match the user identification information with user identification information in a database of user identification information; and
a port on the second node that is authenticated upon a match for allowing communication between the first node and a group of nodes associated with the user identification information, and is not authenticated upon a mismatch, thereby failing to establish communication between the first node and other nodes, wherein the group of nodes is associated with a virtual local area network. - View Dependent Claims (25, 26, 27)
-
-
28. A user authentication system for a communication network comprising:
-
a node interconnected to an edge device over a LAN, the edge device managing the packet flow from the node to a backbone network; and
the backbone network coupled to a network management station, wherein the edge device comprises;
an authentication module interfacing with the node, performing LAN media translations so that the edge device supports nodes operating using disparate LAN media;
a backbone module for interfacing the authentication module to the backbone network;
a switching link for switching packets from the authentication module to the backbone module, thereby allowing packets from authenticated users to flow between the node and the backbone network; and
a management processor module for managing the switching link. - View Dependent Claims (29, 30, 31)
a database of user records; and
an authentication server that compares user identity information with the user records in the database, and upon a match, the authentication server sends to the edge device, a list of network resources that a user on the first node is authorized to use, and upon a mismatch, the authentication server sends to the edge device an indication of non-authorization.
-
-
32. A user authentication system for a communication network, comprising:
-
a first node being used by a user; and
a second node communicating with the first node over a LAN link, the second node providing the sole interface between the first node and a LAN backbone, wherein the second node denies the first node access to the LAN backbone prior to the user becoming authenticated, except for conducting a user authentication protocol exchange. - View Dependent Claims (33, 34)
-
-
35. A user authentication system for a communication network, comprising:
-
a first node being used by a user; and
a second node communicating with the first node over a LAN link, the second node providing an exclusive point of access for the first node to the network, wherein the network is an institutional communication network and wherein prior to the user becoming authenticated the second node permits the first node access to the network solely for conducting an authentication protocol exchange with the user. - View Dependent Claims (36)
-
-
37. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
entering on a first node first user identification information;
transmitting to an authentication agent on a second node communicating with the first node over a LAN link the first user identification information;
relaying from the authentication agent to an authentication server the first user identification information;
comparing on the authentication server the first user identification information with user identification information in a database of user identification information;
transmitting from the authentication server to the authentication agent, the result of the comparison;
transmitting from the authentication server to the authentication agent a list of network resources for which the user is authorized if the result is a match; and
associating a list of network resources with the first node if the result is a match. - View Dependent Claims (38, 39)
-
-
40. A user authentication method for a communication network having a plurality of nodes, the method comprising:
-
entering on a first node first user identification information;
transmitting to an authentication agent on a second node the first user identification information;
relaying from the authentication agent to an authentication server the first user identification information;
comparing on the authentication server the first user identification information with user identification information in a database of user identification information;
transmitting from the authentication server to the authentication agent, the result of the comparison;
transmitting from the authentication server to the authentication agent a list of network resources for which the user is authorized if the result is a match;
associating a list of network resources with the first node if the result is a match;
forwarding packets between the first node and a destination node if the result is a match and the nodes share a common VLAN;
dropping packets between the first node and a destination node if the result is not a match; and
dropping packets between the first node and a destination node if the nodes do not share a common VLAN.
-
Specification