ASSOCIATING PRE-SHARED KEYS WITH CLIENT DEVICES BASED ON MESSAGE INTEGRITY CHECK VALUES

    公开(公告)号:US20240146512A1

    公开(公告)日:2024-05-02

    申请号:US18050083

    申请日:2022-10-27

    CPC classification number: H04L9/0825 H04L9/085 H04L9/3242

    Abstract: A process includes accessing a first message that is sent from an access point device. The first message includes data representing a second message that is sent by a client device. The second message is part of an exchange of messages between the client device and the access point device associated with authentication of the client device and a derivation of a first key used to encrypt and decrypt data communicated between the client device and the access point device. The second message includes a first message integrity check value. The process includes identifying, based on the second message, a pre-shared key corresponding to the client device. The identification of the pre-shared key includes determining a second message integrity check value based on a candidate pre-shared key of a plurality of candidate pre-shared keys; comparing the second message integrity check value with the first message integrity check value; and based on a result of the comparison, selecting the given candidate pre-shared key as the pre-shared key. The process includes determining a user role based on the pre-shared key. The process includes causing a third message to be sent to the access point device, where the third message includes data representing the pre-shared key and data representing the user role.

    Network authentication system extensions

    公开(公告)号:US10469473B2

    公开(公告)日:2019-11-05

    申请号:US15253223

    申请日:2016-08-31

    Abstract: Example implementations relate to network authentication system extensions. For example, network authentication system extensions may be installed and executed using a system. The system may comprise a processing resource and a memory resource storing readable instructions. The instructions may cause the processing resource to initiate an extension system and initiate an application programming interface (API) to manage a plurality of installed extensions in the extension system, where the installed extensions operate on a network authentication system. The instructions may also cause the processing resource to define a particular instance of an installed extension among the plurality of installed extensions and execute installed extensions on the network authentication system.

    NETWORK AUTHENTICATION SYSTEM EXTENSIONS
    5.
    发明申请

    公开(公告)号:US20180060060A1

    公开(公告)日:2018-03-01

    申请号:US15253223

    申请日:2016-08-31

    CPC classification number: H04L63/08 G06F21/45 G06F21/629

    Abstract: Example implementations relate to network authentication system extensions. For example, network authentication system extensions may be installed and executed using a system. The system may comprise a processing resource and a memory resource storing readable instructions. The instructions may cause the processing resource to initiate an extension system and initiate an application programming interface (API) to manage a plurality of installed extensions in the extension system, where the installed extensions operate on a network authentication system. The instructions may also cause the processing resource to define a particular instance of an installed extension among the plurality of installed extensions and execute installed extensions on the network authentication system.

    Tiered Network Access Based on User Action
    6.
    发明申请

    公开(公告)号:US20170366953A1

    公开(公告)日:2017-12-21

    申请号:US15688481

    申请日:2017-08-28

    Abstract: The present disclosure discloses a method and network device for providing tiered network access based on user actions. Specifically, a network device can identify a social action performed by a user, where the social action is performed while the user is logged into a social network application. Furthermore, the network device can select a network access level of a plurality of network access levels based on the social action. Accordingly, the network device grants a client device corresponding to the user access to a network based on the selected network access level. Note that the network access level is selected from the plurality of network access levels based on a plurality of social actions performed by the user.

    Associating pre-shared keys with client devices based on message integrity check values

    公开(公告)号:US12244695B2

    公开(公告)日:2025-03-04

    申请号:US18050083

    申请日:2022-10-27

    Abstract: A process includes accessing a first message that is sent from an access point device. The first message includes data representing a second message that is sent by a client device. The second message is part of an exchange of messages between the client device and the access point device associated with authentication of the client device and a derivation of a first key used to encrypt and decrypt data communicated between the client device and the access point device. The second message includes a first message integrity check value. The process includes identifying, based on the second message, a pre-shared key corresponding to the client device. The identification of the pre-shared key includes determining a second message integrity check value based on a candidate pre-shared key of a plurality of candidate pre-shared keys; comparing the second message integrity check value with the first message integrity check value; and based on a result of the comparison, selecting the given candidate pre-shared key as the pre-shared key. The process includes determining a user role based on the pre-shared key. The process includes causing a third message to be sent to the access point device, where the third message includes data representing the pre-shared key and data representing the user role.

Patent Agency Ranking