System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol
First Claim
1. A method of controlling access by a Light Extensible Authentication Protocol (LEAP)-compatible wireless client to a network that utilizes a Challenge Handshake Authentication Protocol (CHAP)-compatible protocol, comprising the steps of:
- accessing a proxy service on the network in response to receiving access information from the client;
processing the access information with the proxy service into CHAP-compatible access information; and
forwarding the CHAP-compatible access information to a CHAP-based access control server disposed on the network that determines whether to grant network access to the client.
1 Assignment
0 Petitions
Accused Products
Abstract
Architecture for controlling access by a Light Extensible Authentication Protocol (LEAP)-compatible wireless client to a network that utilizes a challenge/handshake authentication protocol (CHAP). A proxy service is hosted on a network server disposed on the network, and accessed in response to receiving access information from the client. The access information is processed with the proxy service into CHAP-compatible access information, and forwarded to a CHAP-based access control server disposed on the network to determine whether to grant network access to the client.
98 Citations
42 Claims
-
1. A method of controlling access by a Light Extensible Authentication Protocol (LEAP)-compatible wireless client to a network that utilizes a Challenge Handshake Authentication Protocol (CHAP)-compatible protocol, comprising the steps of:
-
accessing a proxy service on the network in response to receiving access information from the client; processing the access information with the proxy service into CHAP-compatible access information; and forwarding the CHAP-compatible access information to a CHAP-based access control server disposed on the network that determines whether to grant network access to the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of controlling access by a Light Extensible Authentication Protocol (LEAP)-compatible wireless client to a network that utilizes a Challenge Handshake Authentication Protocol (CHAP)-compatible protocol, comprising the steps of:
-
accessing a proxy service hosted on an access point that is disposed on the network, which proxy service is accessed in response to receiving access information from the client; processing the access information with the proxy service into CHAP-compatible access information; and forwarding the CHAP-compatible access information to a CHAP-based Remote Authentication Dial-In User Service (RADIUS)-compatible access control server disposed on the network, which access control server accesses a database to determine whether to grant network access to the client. - View Dependent Claims (26, 27, 28)
-
-
29. A method of controlling access by a Light Extensible Authentication Protocol (LEAP)-compatible wireless client to a network that utilizes a Challenge Handshake Authentication Protocol (CHAP)-compatible protocol, comprising the steps of:
-
accessing a proxy service hosted on a proxy Remote Authentication Dial-In User Service (RADIUS)-compatible server that is disposed on the network, which proxy RADIUS-compatible server is accessed in response to receiving access information from the client; processing the access information with the proxy service into CHAP-compatible access information; and forwarding the CHAP-compatible access information to a second CHAP-based RADIUS-compatible access control server disposed on the network, which access control server accesses a database to determine whether to grant network access to the client. - View Dependent Claims (30, 31, 32, 33)
-
-
34. A network access control system for a Light Extensible Authentication Protocol (LEAP)-compatible wireless client that utilizes a Challenge Handshake Authentication Protocol (CHAP)-compatible protocol, comprising:
-
a proxy service hosted on an access point that is disposed on the network, which proxy service is accessed in response to receiving access information from the client, the access information processed with the proxy service into CHAP-compatible access information; and a CHAP-based Remote Authentication Dial-In User Service (RADIUS)-compatible access control server disposed on the network to which the CHAP-compatible access information is forwarded, which RADIUS-compatible access control server accesses a database to determine whether to grant network access to the client. - View Dependent Claims (35, 36, 37)
-
-
38. A network access control system for a Light Extensible Authentication Protocol (LEAP)-compatible wireless client that utilizes a Challenge Handshake Authentication Protocol (CHAP) compatible protocol, comprising:
-
a proxy service hosted on a proxy Remote Authentication Dial-In User Service (RADIUS)-compatible server that is disposed on the network, which proxy RADIUS-compatible server is accessed in response to receiving access information from the client, the access information processed with the proxy service into CHAP-compatible access information; and a second CHAP-based RADIUS-compatible access control server disposed on the network to which the CHAP-compatible access information is forwarded, which RADIUS-compatible access control server accesses a database to determine whether to grant network access to the client. - View Dependent Claims (39, 40, 41, 42)
-
Specification