摘要:
Described herein are systems and methods for fallback operation within WLANs that rely on remote authentication procedures. When a primary network node authentication process fails, fallback access control parameters associated with a secondary network node authentication process are exchanged between a network node and an authentication server, wherein the secondary network node authentication process allows the network node to access other resources of a computer network.
摘要:
An access point to be installed in a wireless network is automatically discovered and associated with an authentication center adapted to provide remote authentication services for the wireless network. This may be accomplished by executing an address resolution protocol scan of nodes on the wireless network and identifying from the scan results the access point to be installed. Configuration information regarding the access point is then transmitted to the authentication center and the access point is configured to use the authentication center for 802.1x authentication services for the wireless network.
摘要:
A system, method and computer program product are provided. In use, a first key is exchanged between a granting node and a requesting node via a peer-to-peer wireless network. Further, a human-perceptible hash is generated at the granting node and the requesting node, utilizing the first key. Such human-perceptible hashes are then compared via an out-of-band communication channel. To this end, a second key may then be transmitted to the requesting node for providing access to a centrally-based wireless network.
摘要:
As part of a wireless access point configuration process, a computer network is probed and each previously unprogrammed wireless access point on the network is programmed by transmitting wireless network configuration parameters thereto using a software agent residing on a node of the computer network.
摘要:
A system, method and computer program product are provided. In use, a peer-to-peer wireless network is advertised utilizing a granting node. Further, a requesting node is provided for connecting to the peer-to-peer wireless network. Thereafter, such requesting node is redirected to a portal. To this end, a software application is capable of being downloaded to the requesting node via the peer-to-peer wireless network utilizing the portal.
摘要:
Described herein are systems and methods for fallback operation within WLANs that rely on remote authentication procedures. When a primary network node authentication process fails, fallback access control parameters associated with a secondary network node authentication process are exchanged between a network node and an authentication server, wherein the secondary network node authentication process allows the network node to access other resources of a computer network.
摘要:
As part of a wireless access point configuration process, a computer network is probed and each previously unprogrammed wireless access point on the network is programmed by transmitting wireless network configuration parameters thereto using a software agent residing on a node of the computer network.
摘要:
Methods and apparatus for the automated configuration of 802.1x clients in wireless computer networks are described. In one embodiment, a wireless network client for a wireless network is configured automatically, by providing (using a software driver installed at either the network client or a remote server) network configuration information to a software client of the wireless network client.
摘要:
A system, method and computer program product are provided. Included is a bridge capable of communication with a non-wireless capable device and a wireless network. In use, such bridge incorporates security functionality for remotely and automatically securing the non-wireless capable device during use of the wireless network.
摘要:
A system, method and computer program product are provided. In use, a first key is exchanged between a granting node and a requesting node via a peer-to-peer wireless network. Further, a human-perceptible hash is generated at the granting node and the requesting node, utilizing the first key. Such human-perceptible hashes are then compared via an out-of-band communication channel. To this end, a second key may then be transmitted to the requesting node for providing access to a centrally-based wireless network.