$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for verifying and updating the configuration of an access device during authentication

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06F-011/30
  • G06F-007/04
  • G06F-007/02
  • G06F-017/30
출원번호 UP-0821313 (2004-04-08)
등록번호 US-7539862 (2009-07-01)
발명자 / 주소
  • Edgett, Jeff Steven
  • Nelson, Barbara
  • Vollbrecht, John Robert
  • Albert, Roy David
  • Underwood, James Marion
  • Bullock, Blair Thomas
출원인 / 주소
  • iPass Inc.
인용정보 피인용 횟수 : 42  인용 특허 : 75

초록

A system and method is provided to verify configuration of a client access device requesting access to a network by establishing a communications link between a network access system and the client access device to authenticate and authorize the client access device and a user associated with the cl

대표청구항

What is claimed is: 1. A method comprising: performing, in a first service access provider, operations including, receiving an access request from a client access device, the access request requesting access to a network, wherein a user associated with the client access device is a subscriber of a

이 특허에 인용된 특허 (75)

  1. Thakkar Dhanya,CAX ; Montcalm Jacques,CAX ; Langford Glenn C.,CAX, Access and storage of secure group communication cryptographic keys.
  2. Creamer Thomas Edward ; Lozinski Zygmunt Anthony Boleslaw Gerard,GBX ; Mandalia Baiju Dhirajlal ; Mansey Pradeep Parsram, Access to extended telephone services via the internet.
  3. Hernandez Milton B. ; Kusnetsov Dmitry ; Tapia Pablo E., Accounting and billing based on network use.
  4. Van Horne Peter ; Olson Keith ; Miller Kevin, Active client to communications network connection apparatus and method.
  5. Epstein, Michael A., Administration and utilization of private keys in a networked environment.
  6. Bright Michael W. ; Fuchs Kenneth Carl ; Marquardt Kelly Jo, Apparatus and method of reading a program into a processor.
  7. Howard ; Jr. James L. ; Hess Pennington J. ; MacStravic James A., Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  8. Hall Eric P., Automated network sizing and pricing system for satellite network.
  9. Reeder Mary, Billing system for a network.
  10. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  11. Yoshida Kojun (Kawasaki JPX) Fujii Yasuo (Kawasaki JPX) Kaneshima Toshihito (Kawasaki JPX), Centralized supervisory system for supervising network equipments based on data indicating operation states thereof.
  12. Ahuja Sudhir Raman ; Karaul Mehmet ; Korilis Ioannis A., Client-side techniques for web server allocation.
  13. Kirby Richard Steven, Debit service systems and methods for wireless units.
  14. Boss Jerome D. ; Marcjan Cezary ; Su Fei, Distributed internet user experience monitoring system.
  15. Holleran Patrick A. ; Evans John S. ; Cleron Michael A. ; Fisher Stephen ; Bruck Timo, Embedding internet browser/buttons within components of a network component system.
  16. Ginzboorg Philip,FIX ; Ekberg Jan-Erik,FIX ; Yla-Jaaski Antti,FIX, Implementation of charging in a telecommunications system.
  17. John J. DePaola ; John G. Nightingale, Jr. ; Lawrence T. Babbio, III ; James F. McHenry, Inetwork architecture for calling party pays wireless service.
  18. Fletcher Richard A. ; Banthia Prakash C. ; Svensson Amanda, Integrated computer system and network performance monitoring.
  19. Egendorf Andrew, Internet billing method.
  20. Shachor, Gal, Maintaining HTTP session affinity in a cluster environment.
  21. Canetti Ran (Tel Aviv NY ILX) Herzberg Amir (New York NY), Mechanism for keeping a key secret from mobile eavesdroppers.
  22. Herzberg Amir (Ramat-gan ILX) Kutten Shay (Rockaway NJ) Yung Marcel M. (New York NY), Method and apparatus for authenticating users of a communication system to each other.
  23. Abrol, Nischal; Lioy, Marcello, Method and apparatus for authentication in a wireless telecommunications system.
  24. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for password based authentication in a distributed system.
  25. Hall Anthony D. ; Crabtree ; Jr. Walden B. ; Volk Frederick A., Method and apparatus for processing orders from customers in a mobile environment.
  26. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  27. Limsico Carl, Method and apparatus for providing a secure remote password graphic interface.
  28. Bouanaka Hansali ; Rahman Moshiur, Method and apparatus for providing telephone billing and authentication over a computer network.
  29. Ichikawa Takeo,JPX ; Kayama Hidetoshi,JPX ; Yamamoto Hiroyuki,JPX ; Takanashi Hitoshi,JPX ; Morikura Masahiro,JPX, Method and base station for packet transfer.
  30. Grootwassink,David B., Method and process for validating roaming cellular users.
  31. Janning William J., Method for flexibly provisioning switching devices and a switching device incorporating the same.
  32. Shambroom W. David, Method for providing secure remote command execution over an insecure computer network.
  33. Levine Jonathan D. ; Parsons David M., Method of customizing control interfaces for devices on a network.
  34. Patzer, Robert A.; Chen, Lidong, Method to authenticate a network access server to an authentication server.
  35. Nieminen, Mika P.; Kalpio, Karri; Rinkinen, Jorma, Methods and arrangements for distributing services and/or programs in a network environment.
  36. Blanco, Marcos Ares; Marco, Regis, Network access authentication system.
  37. Marran, Nadine, Over the air programming and/or service activation.
  38. Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password in a particular remote server.
  39. Kadooka Etsuko (Tokyo JPX), Password updating system to vary the password updating intervals according to access frequency.
  40. Paridaens, Olivier; De Schrijver, Peter Paul Camille; T'Joens, Yves Robert Fernand, Performing authentication over label distribution protocol (LDP) signaling channels.
  41. Lee Warren S. ; Copp David W. ; Platteter Dale T. ; Carrier Neil P., Point of presence (POP) for digital facsimile network with virtual POPs used to communicate with other networks.
  42. Kiser, Charles H.; Clinton, Cheryl L.; Couchot, John T.; Curtin, Anne M.; Donovan, Joseph M.; Dorfmeister, Steven C.; Fish, Brian L.; Flores, Lisa Q.; Gerton, William M.; Hall, James D.; Hicks, Jaye , Processing performance data describing a relationship between a provider and a client.
  43. Johnson Donavon W. (Georgetown TX) Smith Todd A. (Austin TX), Remote authentication and authorization in a distributed data processing system.
  44. Ballard Claudio R., Remote image capture with centralized processing and storage.
  45. Jacobs Dwayne C. (Austin TX) Wangler James A. (Cedar Park TX), Remote password administration for a computer network among a plurality of nodes sending a password update message to al.
  46. Shoobe, Howard A.; Watts, Jr., LaVaughn F.; Leftwich, James, Scalable docking architecture to support various bandwidth.
  47. Angelo Michael F. ; Olarig Sompong P., Secure two-piece user authentication in a computer network.
  48. Wray, Michael, Security protocol.
  49. Farhat, Jay; Rozenfeld, Alla; Sunder, Singam, Service quality monitoring process.
  50. Zhang Shujin ; Lou Shuxian, Single step network logon based on point to point protocol.
  51. Huang Gang (Highlands NJ) Werner Jean-Jacques (Holmdel NJ), Synchronization scheme for digital communications systems transporting data at a customer-controlled rate.
  52. Glazer,Elliott; White,Dirk; Armes,David; Bishop,Fred Alan; Barrett,Michael, System and method for authenticating a web page.
  53. Gallagher Michael D. ; Carlson Kirk D. ; Jeffery Stuart S. ; Lee Ming J. ; Grencions Vilnis G. ; Snyder Randall A., System and method for authenticating cellular telephonic communication.
  54. Ronen Yzhak, System and method for billing for transactions conducted over the internet from within an intranet.
  55. Temoshenko Leo (Carrboro NC) Weddington ; Jr. Harry F. (Cary NC), System and method for collecting response times for exception response applications.
  56. Tennison, Lynden L.; Vaiskunas, Thomas J.; Conley, Todd M.; Edeid, Nader; Wilmes, Dave J., System and method for dynamically routing messages transmitted from mobile platforms.
  57. MacFarlane Lloyd ; Driskell Dwight D. ; Henley Vivian C. ; Lane Nancy C. ; Greenspan Michael ; Nielsen Betty J., System and method for generating an invoice to rebill charges to the elements of an organization.
  58. Hartmann, Richard G.; Krissell, Daniel L.; Murphy, Jr., Thomas E.; Orzel, Francine M.; Rieth, Paul F.; Stevens, Jeffrey S., System and method for managing denial of service attacks.
  59. Nixon, Miles J.; Moyer, Alan R.; Moyer, Christopher A., System and method for monitoring informational resources.
  60. Sekiya Jeffrey G. (Raleigh NC) Stayton Michael W. (Cary NC) Temoshenko Leo (Carrboro NC), System and method for obtaining network performance data.
  61. Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench Edwin H., System and method for providing multi-level security in computer devices utilized with non-secure networks.
  62. Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
  63. Kenner Brian ; Colby Kenneth W. ; Mudry Robert N., System and method for server-side optimization of data delivery on a distributed computer network.
  64. Crosskey James P. ; Mei Mark Gee-Gwo ; Ragavan Harish ; Wu Kun-Lung ; Yu Philip Shi-lung, System and method of multiparty billing for Web access.
  65. John E. Brezak, Jr. ; Richard B. Ward ; Michael M. Swift ; Paul J. Leach, System and method of user logon in combination with user authentication for network access.
  66. Van Tol, Alphonsus Johannes, System for coupling the public telephone network to the internet.
  67. Shambroom W. David, System for providing secure remote command execution network.
  68. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  69. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K.; Twaddell,Gordon W., Systems and methods for state-less authentication.
  70. Davis Mark Charles ; Kuehr-McLaren David Gerard ; Powers Calvin Stacy, Systems, methods and computer program products that use an encrypted session for additional password verification.
  71. Nelson Nickolas B., Telecommunications access cost management system.
  72. Haverty Rand,CAX, User authentification using a virtual private key.
  73. Scott A. Vanstone CA; Donald B. Johnson, Verification protocol.
  74. O'Neal, Stephen C.; Terry, George Alex, Voice access through a data-centric network to an integrated message storage and retrieval system.
  75. Mosher Michael S. ; Howard David L. R., Wireless communication product fulfillment system.

이 특허를 인용한 특허 (42)

  1. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  2. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  3. Lindholm, Fredrik; Castellanos, David; Walker, John Michael, Authentication in an IP multimedia subsystem network where an in-use line identifier (LID) does not match a registered LID.
  4. Raleigh, Gregory G.; Lavine, James, Automated credential porting for mobile devices.
  5. Conant, Robert A.; Nelson, Barbara; Paiva, Anre Nario Roshan; Pister, Stark, Binding an authenticated user with a wireless device.
  6. Kowalewski, Frank, Communication device, method for providing a data service, communication terminal, and method for requesting a data service.
  7. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Sabin, Michael J., Communications device with secure data path processing agents.
  8. Wiese, James Christopher, Control of resource access privileges via agent authentication.
  9. Chandwani, Santosh, Controlling network access.
  10. Raleigh, Gregory G., Device assisted services install.
  11. Raleigh, Gregory G., Device group partitions and settlement platform.
  12. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Device-assisted services for protecting network capacity.
  13. Choe, Calvin Choon-Hwan; Pickford, Misty Louise, Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy.
  14. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, End user device that secures an association of application to service policy with an application certificate check.
  15. Limont, David P.; Atwood, John Allen; Ciccotosto, Massimiliano; Aftab, Omar; Tousignant, Patrick; Nalliah, Selvaraj; Yang, Zhidong, Enforcing device settings for mobile devices.
  16. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
  17. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  18. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Enterprise access control and accounting allocation for access networks.
  19. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand; James, Justin; Nguyen, Laurent An Minh, Method for child wireless device activation to subscriber account of a master wireless device.
  20. Raleigh, Gregory G., Method for operating a wireless end-user device mobile payment agent.
  21. Raleigh, Gregory G.; Lavine, James; Carter, III, Russell Bertrand, Mobile device and service management.
  22. Barillaud, Franck; Cho, Insoo; Christiani, Daniel M.; Thill, Mark R.; Zhang, David S., Network authentication of a geo-fenced volume.
  23. Barillaud, Franck; Cho, Insoo; Christiani, Daniel M.; Thill, Mark R.; Zhang, David S., Network authentication of a geo-fenced volume.
  24. Barillaud, Franck; Cho, Insoo; Christiani, Daniel M.; Thill, Mark R.; Zhang, David S., Network authentication of a geo-fenced volume.
  25. Barillaud, Franck; Cho, Insoo; Christiani, Daniel M.; Thill, Mark R.; Zhang, David S., Network authentication of a geo-fenced volume.
  26. Junod, Forrest A.; Fly, Robert C.; Dapkus, Peter; Yancey, Scott W.; Lawrance, Steven S.; Fell, Simon Z., On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service.
  27. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Proxy system and method for adaptive ambient services.
  28. Raleigh, Gregory G., Quality of service for device assisted services.
  29. Meyer, Markus; Schulz, Torsten; Boerries, Marco; Srinivasan, Venkatachary, Recovering a blade in scalable software blade architecture.
  30. Gomez, Garrison; Yeakley, Daniel; Doren, Michael; French, Daniel; Mangicaro, David; Koziol, Thomas; Haile, Adam; Caballero, Aldo, Remote device management interface.
  31. Srinivasan, Venkatachary; Meyer, Markus; Schulz, Torsten; Boerries, Marco, Scalable software blade architecture.
  32. Conant, Robert A.; Nelson, Barbara, Securing credential distribution.
  33. Raleigh, Gregory G., Security techniques for device assisted services.
  34. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  35. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; James, Justin; Green, Jeffrey, Service design center for device assisted services.
  36. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service selection set publishing to device agent with on-device service selection.
  37. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  38. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  39. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  40. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  41. Wu, Min-Hui; Liang, Yi-Hua; Lin, Yu-Sheng, Verification of network device position.
  42. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, Wireless end-user device with divided user space/kernel space traffic policy system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트