System and method for providing a certificate for network access
First Claim
1. A method of providing a certificate for based secured wireless network layer access in response to a user request comprising:
- identifying a first system having at least one processor and a plurality of users, each user having at least one attribute;
receiving from a third party at least one predefined required attribute for secured network layer access upon a second system providing a secured wireless network, the secured wireless network requiring a Public Key Infrastructure (“
PKI”
) certificate for network layer authentication to the wireless network;
receiving from a user known to the first system a request for certificate based network layer network access to a second system having at least one processor, the request having at least one identifier;
querying the first system with the at least one identifier for attributes associated with the user requesting the certificate based network layer network access to a second system;
evaluating the attributes associated with the user requesting the certificate to the least one predefined required attribute for the PKI certificate in order to access the second system; and
in response to at least one attribute associated with the user requesting the PKI certificate correlating to the at least one predefined required attribute, providing the requesting user with a PKI certificate with at least one characteristic for certificate based network layer authentication for network layer access to the secured wireless network of the secured second system, the second system distinct from the first, the PKI certificate provided from a system other than the first system;
wherein a first user having a first set of correlating attributes is provided with a PKI certificate permitting different access than a second user having a second set of correlating attributes, the first and second sets being different with respect to at least one correlated attribute.
10 Assignments
0 Petitions
Accused Products
Abstract
Provided is a system and method for providing a certificate, and more specifically a certificate for network access upon a second system. The method includes, identifying a first system having at least one processor and a plurality of users, each user having at least one attribute; receiving from a third party at least one required attribute for certificate based network access; receiving from a user known to the first system a request for certificate based network layer network access to a second system having at least one processor, the request having at least one identifier; querying the first system with the at least one identifier for attributes associated with the user requesting the certificate based network layer network access to a second system; evaluating the attributes associated with the user requesting the certificate to the at least one predefined attribute; and in response to at least one attribute associated with the user requesting the certificate correlating to the at least one predefined attribute, providing from a system other than the first system, as requested by the user a certificate with at least one characteristic for certificate based network layer network access on the second system, the second system distinct from the first system. An associated system for providing a Certificate is also provided.
-
Citations
44 Claims
-
1. A method of providing a certificate for based secured wireless network layer access in response to a user request comprising:
-
identifying a first system having at least one processor and a plurality of users, each user having at least one attribute; receiving from a third party at least one predefined required attribute for secured network layer access upon a second system providing a secured wireless network, the secured wireless network requiring a Public Key Infrastructure (“
PKI”
) certificate for network layer authentication to the wireless network;receiving from a user known to the first system a request for certificate based network layer network access to a second system having at least one processor, the request having at least one identifier; querying the first system with the at least one identifier for attributes associated with the user requesting the certificate based network layer network access to a second system; evaluating the attributes associated with the user requesting the certificate to the least one predefined required attribute for the PKI certificate in order to access the second system; and in response to at least one attribute associated with the user requesting the PKI certificate correlating to the at least one predefined required attribute, providing the requesting user with a PKI certificate with at least one characteristic for certificate based network layer authentication for network layer access to the secured wireless network of the secured second system, the second system distinct from the first, the PKI certificate provided from a system other than the first system; wherein a first user having a first set of correlating attributes is provided with a PKI certificate permitting different access than a second user having a second set of correlating attributes, the first and second sets being different with respect to at least one correlated attribute. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of providing a certificate for certificate based secured wireless network layer access in response to a user request comprising:
-
identifying a first system having at least one processor and a plurality of users, each user having at least one attribute; receiving from a third party at least one predefined required attribute for secured network layer access upon a second system providing a secured wireless network, the secured wireless network requiring a Public Key Infrastructure (“
PKI”
) certificate for network layer authentication to the wireless network;receiving from a user known to the first system a request for OSI Layer 2-3 network access to a second system having at least one processor and distinct from the first system, the request having at least one identifier; querying the first system with the at least one identifier for attributes associated with the user requesting the certificate based network layer network access to a second system; evaluating the attributes associated with the user requesting the certificate to the at least one predefined required attribute for the PKI certificate in order to access the second system; and in response to at least one attribute associated with the user requesting the PKI certificate correlating to the at least one predefined required attribute, providing the requesting user with a PKI certificate with at least one characteristic for certificate based network layer authentication for network OSI Layer 2-3 access to the secured wireless network of the secured second system, the second system distinct form from the first, the PKI certificate provided from a system other than the first system; wherein a first user having a first set of correlating attributes is provided with a certificate permitting different access than a second user having a second set of correlating attributes, the first and second sets being different with respect to at least one correlated attribute. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory machine readable medium on which is stored a computer program for providing a certificate for based secured wireless network layer access in response to a user request for network access, the computer program comprising instructions which when executed by a computer system having at least one processor performs the steps of:
-
identifying a first system having at least one processor and a plurality of users, each user having at least one attribute; receiving from a third party at least one predefined required attribute for secured network layer access upon a second system providing a secured wireless network, the secured wireless network requiring a Public Key Infrastructure (“
PKI”
) certificate for network layer authentication to the wireless network;receiving from a user known to the first system a request for certificate based network layer network access to a second system having at least one processor, the request having at least one identifier; querying the first system with the at least one identifier for attributes associated with the user requesting the certificate based network layer network access to a second system; evaluating the attributes associated with the user requesting the certificate to the least one predefined required attribute for the PKI certificate in order to access the second system; and in response to at least one attribute associated with the user requesting the PKI certificate correlating to the at least one predefined required attribute, providing the requesting user with a PKI certificate with at least one characteristic for certificate based network layer authentication for network layer access to the secured wireless network of the secured second system, the second system distinct from the first, the PKI certificate provided from a system other than the first system; wherein a first user having a first set of correlating attributes is provided with a certificate permitting different access than a second user having a second set of correlating attributes, the first and second sets being different with respect to at least one correlated attribute. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A non-transitory machine readable medium on which is stored a computer program comprising instructions to adapt a computer system having a processor to provide a certificate for certificate based secured wireless network layer access in response to a user request for network access, the computer program comprising:
-
an input routine operative associated with an input device for receiving from a third party at least one predefined required attribute as criteria for receiving a Public Key Infrastructure (“
PKI”
) certificate for secured network layer access upon a second system providing a secured wireless network, the secured wireless network requiring a PKI certificate for network layer authentication to the wireless network, and for receiving from a user authenticated to a first system a request for certificate based OSI Layer 2-3 wireless network access to a second system distinct from the first system, the request having at least one identifier;a query routine for querying the first system with the at least one identifier for attributes associated with the user requesting the certificate based secured wireless network access and evaluating the associated attributers to the predefined required attribute for the PKI certificate in order to access the second system, the querying performed by other than one of the user requesting the PKI certificate; and an output routine for providing the requesting user with a PKI certificate with at least one characteristic for certificate based network layer authentication for network OSI Layer 2-3 access to the secured wireless network of the secured second system, the second system distinct from the first, the PKI certificate provided from a system other than the first system; wherein a first user having a first set of correlating attributes is provided with a certificate permitting different access than a second user having a second set of correlating attributes, the first and second sets being different with respect to at least one correlated attribute. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A system for providing a certificate for based secured wireless network layer access in response to a third party request comprising:
-
a first system having at least one processor structured and arranged as a single sign on system having a plurality of user accounts corresponding to a plurality of users remote from the first system; a third party structured and arranged to establish at least one predefined required attribute for receiving a Public Key Infrastructure (“
PKI”
) certificate permitting secured network layer access upon a second system providing a secured wireless network, the secured wireless network requiring a PKI certificate for network layer authentication to the wireless network, the second system having at least one processor, the second system distinct from the first system; andan authorizing system structured and arranged to receive from the third party the at least one predefined required attribute for the PKI certificate in order to access the second system, and in response to a request from a user of the first system for a PKI certificate for certificate based network access to the second system the authorizing system further structured and arranged to access the first system to query the remote user accounts for attributes associated with at least one user, the authorizing system providing a PKI certificate with at least one characteristic derived from the attributes associated with the requesting user for certificate based network layer authentication to the secured wireless network of the secured second system to at least one requesting user having at least one attribute associated with the requesting user correlated to the at least one predefined required attribute; wherein a first user having a first set of correlating attributes is provided with a certificate permitting different access than a second user having a second set of correlating attributes, the first and second sets being different with respect to at least one correlated attribute. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44)
-
Specification