Public key generation utilizing media access control address
First Claim
Patent Images
1. An apparatus comprising:
- a memory, storing a set of instructions; and
a processor, to execute the stored set of instructions, to;
in a registration process of a user device in a network, generate a public/private key pair based on a media access control (MAC) address of the user device;
transmit the generated public/private key pair to the user device;
receive from the user device the generated public key and a user device digital signature, the user device requesting access to a network;
verify if the digital signature is valid;
determine the MAC address from a certificate extension of the public key;
compare the determined MAC address with a MAC address of the user device requesting network access; and
provide network access to the user device if the MAC address determined from the certificate extension is the same as the MAC address of the device requesting access to the network and if the digital signature is verified as valid.
2 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, in a registration process where a user device is registering for access to a network, a public/private key pair may be generated based on a media access control (MAC) address of a user device. The generated public/private key pair may be transmitted to the user device for future access to the network. In some embodiments, where a user device is requesting access to a network, a MAC address embedded in a public key may be utilized to determine whether access to the network should be granted.
21 Citations
15 Claims
-
1. An apparatus comprising:
-
a memory, storing a set of instructions; and a processor, to execute the stored set of instructions, to; in a registration process of a user device in a network, generate a public/private key pair based on a media access control (MAC) address of the user device; transmit the generated public/private key pair to the user device; receive from the user device the generated public key and a user device digital signature, the user device requesting access to a network; verify if the digital signature is valid; determine the MAC address from a certificate extension of the public key; compare the determined MAC address with a MAC address of the user device requesting network access; and provide network access to the user device if the MAC address determined from the certificate extension is the same as the MAC address of the device requesting access to the network and if the digital signature is verified as valid. - View Dependent Claims (2, 3, 4)
-
-
5. A method of managing access to a network, the method comprising:
-
implementing a media access control based authentication operation in determining whether to grant a user device of a user access to the network; enabling the user to self-register the user device into a database of authorized users to access the network in response to the user being denied access to the network through the MAC based authentication operation and being listed as a valid user in a directory of active network users; receiving a MAC address of the user device; generating a public/private key pair for the user, the MAC address of the user device being embedded in the public certificate extension; and transmitting the generated public/private key pair to the user device. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A non-transitory computer readable storage medium on which is embedded a computer program, said computer program implementing a method, said computer program comprising computer readable code to:
-
receive, from a user device requesting access to a network, a public key and a digital signature, the public key including a media access control (MAC) address; verify if the digital signature is valid; determine the MAC address from the public key; compare the determined MAC address with a MAC address of the user device requesting access to the network; and provide network access to the user device if the MAC address determined from the public key is the same as the MAC address of the user device requesting access to the network and if the digital signature is valid. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification