Information security – Access control or authentication – Network
Reexamination Certificate
2011-02-08
2011-02-08
Moore, Ian N (Department: 2491)
Information security
Access control or authentication
Network
C726S001000, C726S002000, C726S004000, C726S005000, C709S217000, C709S219000, C709S227000, C709S229000
Reexamination Certificate
active
07886339
ABSTRACT:
A computer implemented method, apparatus, and computer program product for authenticating a user to a network. In response to receiving a request from a user to access a protected resource, the process sends a unique bit sequence into a network connection utilized by the user. Next, the process authenticates the user to access the protected resource in response to receiving a verification that the unique bit sequence was received by an access point that authenticated the user when the user logged on to the network.
REFERENCES:
patent: 7010582 (2006-03-01), Cheng et al.
patent: 7174456 (2007-02-01), Henry et al.
patent: 7284062 (2007-10-01), Krantz et al.
patent: 7610049 (2009-10-01), Watanabe
patent: 7716338 (2010-05-01), Sylvain
patent: 2003/0063593 (2003-04-01), Koyanagi et al.
patent: 2005/0021956 (2005-01-01), Genty et al.
patent: 2005/0207378 (2005-09-01), Zaitsu
patent: 2005/0220099 (2005-10-01), Igarashi
patent: 2005/0286489 (2005-12-01), Shin et al.
patent: 2006/0013157 (2006-01-01), Annic
patent: 2006/0021004 (2006-01-01), Moran et al.
patent: 2006/0048212 (2006-03-01), Tsuruoka et al.
patent: 2006/0200678 (2006-09-01), Yamada et al.
patent: 2006/0236369 (2006-10-01), Covington et al.
patent: 2006/0271485 (2006-11-01), McKenzie et al.
patent: 2007/0113269 (2007-05-01), Zhang
patent: 2007/0169178 (2007-07-01), Keohane et al.
patent: 2007/0204156 (2007-08-01), Jeghers
patent: 1830190 (2006-09-01), None
Yanchao Zhang, A Secure Authentication and Billling Architecture for Wireless Mesh Networks, Kluwer Academic Publishers , Published online:Jun. 2006.
Iuon-Chang Lin, A User Authentication system using back-propagation Network, Article: Neural Computing & Applications; 2005, vol. 14 Issue 3, p243-249, 7p.
Rigney et al., “Remote Authentication Dial In User Service (RADIUS)”, RFC 2865, Jun. 2000, pp. 1-71, http://rfc.net/rfc2865.txt.
Blunk et al., “PPP Extensible Authentication Protocol (EAP)”, RFC 2284, Mar. 1998, pp. 1-15 http://rfc.net/rfc2284.txt.
Rigney et al., “RADIUS Extensions”, RFC 2869, pp. 1-44, Jun. 2000 http://rfc.net/rfc2869.txt.
Mitton, “Network Access Servers Requirements: Extended RADIUS Practices”, RFC 2882, Jul. 2000, pp. 1-15 http://rfc.net/rfc2882.txt.
Vollbrecht et al., “State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator”, RFC 4137, pp. 1-48, Aug. 2005.
“802.1X IEEE Standard for Local and metropolitan area networks, Port-Based network Access Control”, IEEE Computer Society, Dec. 13, 2004, pp. 1-169.
China Patent office action for application 2010100900646230 dated Oct. 13, 2010.
Keohane Susann Marie
McBrearty Gerald Francis
Mullen Shawn Patrick
Murillo Jessica Carol
Shieh Johnny Meng-Han
Dillon Justin M.
Gracia Gary
International Business Machines - Corporation
Moore Ian N
Yee & Associates P.C.
LandOfFree
Radius security origin check does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Radius security origin check, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Radius security origin check will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2621930