会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Generic framework for EAP
    • EAP的通用框架
    • US08307411B2
    • 2012-11-06
    • US11704624
    • 2007-02-09
    • Andrew BaronTaroon MandhanaSaurabh MahajanPrashant Malik
    • Andrew BaronTaroon MandhanaSaurabh MahajanPrashant Malik
    • H04L29/06
    • H04L63/083H04L63/162
    • An EAP-based authentication framework is provided that decouples credential acquisition from EAP methods that use credentials for authentication. An application may request from an EAP method parameters of credentials required by the EAP method. In response, the EAP method provides credential parameters, which may then be used by the application to acquire credentials consistent with the parameters from the user or other entity. The framework enables an application to request credentials in a context specific way. In addition, the application may simultaneously obtain credentials used in multiple authentication operations through a single user interface, or retain credentials for later use without further prompting a user such that a Single Sign-on user experience may be implemented. Additionally, the application can obtain credentials from a device so that the device may gain network access without requiring a user logon.
    • 提供了一种基于EAP的认证框架,用于将凭证获取与使用凭证进行身份验证的EAP方法进行脱钩。 应用程序可以从EAP方法请求的凭证请求EAP请求。 作为响应,EAP方法提供凭证参数,然后可以由应用程序使用该参数来获取与来自用户或其他实体的参数一致的凭证。 该框架使应用程序能够以上下文特定的方式请求凭证。 此外,应用程序可以同时获取通过单个用户界面在多个认证操作中使用的凭证,或者保留凭证以供将来使用而不进一步提示用户,使得可以实现单点登录用户体验。 此外,应用程序可以从设备获取凭据,以便设备可以在不需要用户登录的情况下获得网络访问权限。
    • 4. 发明申请
    • Generic framework for EAP
    • EAP的通用框架
    • US20080196089A1
    • 2008-08-14
    • US11704624
    • 2007-02-09
    • Andrew BaronTaroon MandhanaSaurabh MahajanPrashant Malik
    • Andrew BaronTaroon MandhanaSaurabh MahajanPrashant Malik
    • H04L9/32
    • H04L63/083H04L63/162
    • An EAP-based authentication framework is provided that decouples credential acquisition from EAP methods that use credentials for authentication. An application may request from an EAP method parameters of credentials required by the EAP method. In response, the EAP method provides credential parameters, which may then be used by the application to acquire credentials consistent with the parameters from the user or other entity. The framework enables an application to request credentials in a context specific way. In addition, the application may simultaneously obtain credentials used in multiple authentication operations through a single user interface, or retain credentials for later use without further prompting a user such that a Single Sign-on user experience may be implemented. Additionally, the application can obtain credentials from a device so that the device may gain network access without requiring a user logon.
    • 提供了一种基于EAP的认证框架,用于将凭证获取与使用凭证进行身份验证的EAP方法进行脱钩。 应用程序可以从EAP方法请求的凭证请求EAP请求。 作为响应,EAP方法提供凭证参数,然后可以由应用程序使用该参数来获取与来自用户或其他实体的参数一致的凭证。 该框架使应用程序能够以上下文特定的方式请求凭证。 此外,应用程序可以同时获取通过单个用户界面在多个认证操作中使用的凭证,或者保留凭证以供将来使用而不进一步提示用户,使得可以实现单点登录用户体验。 此外,应用程序可以从设备获取凭据,以便设备可以在不需要用户登录的情况下获得网络访问权限。
    • 8. 发明申请
    • Automatic detection of hidden networks
    • 自动检测隐藏网络
    • US20080082543A1
    • 2008-04-03
    • US11540070
    • 2006-09-29
    • Abhishek AbhishekAmir ZohrenejadYue ChenAndrew BaronYi Lu
    • Abhishek AbhishekAmir ZohrenejadYue ChenAndrew BaronYi Lu
    • G06F17/30
    • H04W48/18H04W48/16H04W84/12
    • It is determined whether a mobile user device is within transmission range of one or hidden networks. A list of known networks may be accessed, the list including broadcast and hidden networks. For the hidden networks, the network connection component may instruct a network interface to actively probe for the hidden networks. If the response is received for a communication corresponding to a particular network, then it may be considered that the mobile user interface is within transmission range of the hidden network. If auto-connection logic is activated, a preference order may be applied to select which of the detected broadcasts and/or hidden networks to connect. A user interface displays broadcast and hidden networks determined to be within transmission range of the mobile user device. The user device also displays hidden networks for which it has not yet been attempted to determine whether the hidden networks are in range.
    • 确定移动用户设备是否在一个或隐藏网络的传输范围内。 可以访问已知网络的列表,该列表包括广播和隐藏网络。 对于隐藏网络,网络连接组件可以指示网络接口主动探测隐藏的网络。 如果对于与特定网络相对应的通信接收到响应,则认为移动用户接口在隐藏网络的传输范围内。 如果自动连接逻辑被激活,则可以应用偏好顺序来选择要连接的检测到的广播和/或隐藏网络。 用户界面显示确定为在移动用户设备的传输范围内的广播和隐藏网络。 用户设备还显示尚未尝试确定隐藏网络是否在范围内的隐藏网络。
    • 9. 发明授权
    • Automatic detection of hidden networks
    • 自动检测隐藏网络
    • US08165101B2
    • 2012-04-24
    • US11540070
    • 2006-09-29
    • Abhishek AbhishekAmir ZohrenejadYue ChenAndrew BaronYi Lu
    • Abhishek AbhishekAmir ZohrenejadYue ChenAndrew BaronYi Lu
    • H04W4/00H04L12/54
    • H04W48/18H04W48/16H04W84/12
    • It is determined whether a mobile user device is within transmission range of one or hidden networks. A list of known networks may be accessed, the list including broadcast and hidden networks. For the hidden networks, the network connection component may instruct a network interface to actively probe for the hidden networks. If the response is received for a communication corresponding to a particular network, then it may be considered that the mobile user interface is within transmission range of the hidden network. If auto-connection logic is activated, a preference order may be applied to select which of the detected broadcasts and/or hidden networks to connect. A user interface displays broadcast and hidden networks determined to be within transmission range of the mobile user device. The user device also displays hidden networks for which it has not yet been attempted to determine whether the hidden networks are in range.
    • 确定移动用户设备是否在一个或隐藏网络的传输范围内。 可以访问已知网络的列表,该列表包括广播和隐藏网络。 对于隐藏网络,网络连接组件可以指示网络接口主动探测隐藏网络。 如果对于与特定网络相对应的通信接收到响应,则认为移动用户接口在隐藏网络的传输范围内。 如果自动连接逻辑被激活,则可以应用偏好顺序来选择要连接的检测到的广播和/或隐藏网络。 用户界面显示确定为在移动用户设备的传输范围内的广播和隐藏网络。 用户设备还显示尚未尝试确定隐藏网络是否在范围内的隐藏网络。