Abstract:
Techniques for supporting concurrent data services with different credentials are described. A wireless communication network authenticates a user/device whenever new credentials are used. An access terminal sends first credentials via a Point-to-Point Protocol (PPP) link to a Packet Data Serving Node (PDSN) and receives an indication of successful authentication for a first data service based on the first credentials. The access terminal may receive a request for a second data service and second credentials from an internal application or a terminal device coupled to the access terminal. The access terminal then sends the second credentials via the PPP link to the PDSN while the first data service is ongoing. The access terminal receives from the PDSN an indication of successful authentication for the second data service based on the second credentials. The access terminal may send a Configure-Request packet or an Authenticate-Request packet to trigger or initiate authentication by the PDSN for the second data service.
Abstract:
Security level establishment for an application in a terminal equipment under a generic bootstrapping architecture offering a plurality of different bootstrapping mechanisms, the terminal equipment comprising a credential establishment entity and an application entity, comprising a request for a credential for the application from the application entity to the credential establishment entity and a response from the credential establishment entity to the application entity, wherein the response comprises the requested credential and credential quality information.
Abstract:
The present invention relates to a system for authentication of an end user of a user station arrangement (10) requesting access to protected information, comprising access server means (20) and authentication means (30), the user station arrangement (10) supporting communication with the authentication means (30) over a first communication channel of a radio network (40) . It further supports communication with the authentication means (30) over a second communication channel. The authentication means (30) are adapted to, at reception of a request for access to protected information from a user station arrangement (10) , establish if the user station arrangement (10) is reachable over the first communication channel. Said authentication means (30) are adapted to support a first authentication mode and a second authentication mode over said second communication channel, and further comprises decision means for selecting if and/or when the first or second authentication mode is to be used for a user station arrangement (10) requesting access to protected information.
Abstract:
There is disclosed a method and system for communicating a secure login request between a mobile client and a destination server providing access to a service, the method to be implemented by a disclosed gateway adapted to communicate with both the mobile client and the destination server. The gateway may also implement appropriate protocol conversions between otherwise incompatible client and server pairs. Wireless instant messaging, email and other such services are considered as exemplary services for the disclosed method, system and gateway.
Abstract:
A method is disclosed for determining the authentication capabilities of a supplicant before initiating an authentication conversation with a client (104), for example, using Extensible Authentication Protocol (EAP). In one aspect, the method provides for sending (130), to a supplicant (104) that is requesting access to a computer network (110) subject to authentication of a user (102) of the supplicant (104), a list of first authentication methods (112) that are supported by an authentication server (150); receiving (152), from the supplicant (104), a counter-list of second authentication methods (112) that are supported by the supplicant (104); determining how many second authentication methods in the counter-list match the first authentication methods (154); and performing an authentication policy action based on how many of the second authentication methods match the first authentication methods (156). Policy actions can include blocking access, re-directing to sources of acceptable authentication methods, granting one of several levels of network access, etc (162-170).
Abstract:
A method is disclosed for determining the authentication capabilities of a supplicant before initiating an authentication conversation with a client (104), for example, using Extensible Authentication Protocol (EAP). In one aspect, the method provides for sending (130), to a supplicant (104) that is requesting access to a computer network (110) subject to authentication of a user (102) of the supplicant (104), a list of first authentication methods (112) that are supported by an authentication server (150); receiving (152), from the supplicant (104), a counter-list of second authentication methods (112) that are supported by the supplicant (104); determining how many second authentication methods in the counter-list match the first authentication methods (154); and performing an authentication policy action based on how many of the second authentication methods match the first authentication methods (156). Policy actions can include blocking access, re-directing to sources of acceptable authentication methods, granting one of several levels of network access, etc (162-170).
Abstract:
Methods and apparatus are provided for authenticating an iSCSI initiator connected to a fibre channel storage area network. An iSCSI initiator performs an authentication exchange with a fibre channel target such as a fibre channel host or disk array through one or more fibre channel switches. Authentication information such as password information no longer is required at fibre channel switches and can instead be aggregated at fibre channel targets.
Abstract:
A method is disclosed for determining the authentication capabilities of a supplicant before initiating an authentication conversation with a client, for example, using Extensible Authentication Protocol (EAP). In one aspect, the method provides for sending, to a supplicant that is requesting access to a computer network subject to authentication of a user of the supplicant, a list of first authentication methods that are supported by an authentication server; receiving, from the supplicant, a counter-list of second authentication methods that are supported by the supplicant; determining how many second authentication methods in the counter-list match the first authentication methods; and performing an authentication policy action based on how many of the second authentication methods match the first authentication methods. Policy actions can include blocking access, re-directing to sources of acceptable authentication methods, granting one of several levels of network access, etc.