Authentication techniques

Information security – Access control or authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C713S168000

Reexamination Certificate

active

07831996

ABSTRACT:
Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.

REFERENCES:
patent: 4897874 (1990-01-01), Lidinsky et al.
patent: 5237614 (1993-08-01), Weiss et al.
patent: 5721780 (1998-02-01), Ensor et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 5774551 (1998-06-01), Wu et al.
patent: 6035406 (2000-03-01), Moussa et al.
patent: 6167052 (2000-12-01), McNeill et al.
patent: 6212191 (2001-04-01), Alexander et al.
patent: 6339830 (2002-01-01), See et al.
patent: 6874090 (2005-03-01), See et al.
patent: 7062566 (2006-06-01), Amara et al.
patent: 7502929 (2009-03-01), Schnizlein et al.
patent: 2002/0133534 (2002-09-01), Forslow
patent: 2003/0056063 (2003-03-01), Hochmuth et al.
patent: 2004/0030932 (2004-02-01), Juels et al.
patent: 2004/0255154 (2004-12-01), Kwan et al.
patent: 2005/0025125 (2005-02-01), Kwan
patent: 2005/0055570 (2005-03-01), Kwan et al.
Aboba, B., “IANA Consideration for RADIUS (Remote Authentication Dial In User Service),” Netwrok Working Group, Request for Comments # 3575, updates # 2865, Standard Track, Jul. 2003, pp. 1-8 downloaded from http://tools.ietf.org/rfc/rfc3575.txt on Mar. 13, 2007.
Aboba et al., “Extensible Authentication Protocol (EAP),” Network Working Group, Request for Comments # 3748, Obsoletes # 2284, Standards Track, Jun. 2004, pp. 1-63 downloaded from http://tools.ietf.org/rfc/rfc3748.txt on Mar. 13, 2007.
Blunk et al., “PPP Extensible Authentication Protocol (EAP),” Network Working Group, Request for Comments # 2284, Standards Track, Mar. 1998, pp. 1-15 downloaded from http://tools.ietf.org/rfc2284.txt on Mar. 13, 2007.
Congdon et al., “IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines,” Network Working Group, Request for Comments # 3580, International, Sep. 2003, pp. 1-29 downloaded from http://tools.ietf.org/rfc/rfc3580.txt on Mar. 13, 2007.
Rigney et al., “Remote Authentication Dial In User Service (RADIUS),” Network Working Group, Request for Comments # 2058, Standards Track, Jan. 1997, pp. 1-60 downloaded from http://tools.ietf.org/rfc/rfc2058.txt on Mar. 13, 2007.
Rigney, C., “RADIUS Accounting,” Network Working Group, Request for Comments # 2059, Informational, Jan. 1997, pp. 1-24 downloaded from http://tools.ietf.org/rfc/rfc2059.txt on Mar. 13, 2007.
Rigney et al., “Remote Authentication Dial In User Service (RADIUS),” Network Working Group, Request for Comments # 2865, Obsoletes # 2138, Standards Track, Jun. 2000, pp. 1-71 downloaded from http://tools.ietf.org/rfc/rfc2865.txt on Mar. 13, 2007.
Rigney, C., “RADIUS Accounting,” Network Working Group, Request for Comments # 2866, Informational, Obsoletes # 2139, Jun. 2000, pp. 1-27 downloaded from http://tools.ietf.org/rfc/rfc2866.txt on Mar. 13, 2007.
Rigney, C., “RADIUS Accounting,” Network Working Group, Request for Comments # 2139, Obsoletes # 2059, Informational, Apr. 1997, pp. 1-24 downloaded from http://tools.ietf.org/rfc/rfc2139.txt on Mar. 13, 2007.
Rigney et al., “Remote Authentication Dial In User Service (RADIUS),” Network Working Group, Request for Comments # 2138, Obsoletes # 2058, Standards Track, Apr. 1997, pp. 1-61 downloaded from http://tools.ietf.org/rfc/rfc2138.txt on Mar. 13, 2007.
Zorn et al., “RADIUS Accounting Modifications for Tunnel Protocol Support,” network Working Group, Request for Comments # 2867, Informational, Updates # 2866, Jun. 2000, pp. 1-11 downloaded from http://tools.ietf.org/rfc/rfc2867.txt on Mar. 13, 2007.
Zorn et al., “RADIUS Attributes for Tunnel Protocol Support,” network Working Group, Request for Comments # 2868, Informational, Updates # 2865, Jun. 2000, pp. 1-19 downloaded from http://tools.ietf.org/rfc/rfc2868.txt on Mar. 13, 2007.
“IEEE Standard for Local and metropolitan area Networks—Port-Based Network Access Control,”IEEEStd 802.1 X-2001, table of contents and pp. 1-134 (2001).
“802.1X™ IEEE Standard for Local and metropolitan area Networks—Port-Based Network Access Control,”IEEEStd 802.1X™-2004, table of contents and pp. 1-169 (Dec. 13, 2004).
Foundry Security Guide, Jul. 2005, 200 pages, Foundry Networks, Inc.
Foundry Security Guide, Jan. 2006, 252 pages, Foundry Networks, Inc.
Foundry FastIron X-Series and FastIron GS Configuration and Security Guide—FastIron Edge Switch x-Series, FastIron Workgroup Switch X-Series, FastIron SuperX Switch, FastIron SX Switch, FastIron GS Switch, Oct. 2006 (Draft), 1076 pages, Foundry Networks, Inc.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication techniques does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication techniques, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication techniques will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4178302

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.