scispace - formally typeset
Search or ask a question
Topic

Authentication server

About: Authentication server is a research topic. Over the lifetime, 7022 publications have been published within this topic receiving 66358 citations.


Papers
More filters
01 Jan 1997
TL;DR: This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.
Abstract: This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.

1,289 citations

Patent
27 Sep 2002
TL;DR: In this article, a gateway server is interposed between wireless access points and protected networks to provide security and integration functions, for example, authentication, access control, link privacy, link integrity, and bandwidth metering in various embodiments.
Abstract: The present invention can be used to facilitate the integration of wireless capability provided by wireless access points into an enterprise computer network. A gateway server is interposed between wireless access points and protected networks to provide security and integration functions, for example, authentication, access control, link privacy, link integrity, and bandwidth metering in various embodiments. Use of such a gateway server allows substantial control to be gained over network access even with the use of relatively simple access points. In general, such a gateway server receives a request to access the protected network. An authentication subsystem of the gateway server authenticates the user, preferably by accessing an external authentication server and returns a role to the authenticated user. An access controller in the gateway server provides differential access to the protected network based on the user's assigned role. A multiple gateway servers can be connected together to form a mesh network architecture.

542 citations

Patent
02 Jul 1999
TL;DR: In this article, a method and apparatus that provide network access control are disclosed, in which a network device is configured to intercept network traffic initiated from a client and directed toward a network resource and to locally authenticate the client.
Abstract: A method and apparatus that provide network access control are disclosed. In one embodiment, a network device is configured to intercept network traffic initiated from a client and directed toward a network resource, and to locally authenticate the client. Authentication is carried out by comparing information identifying the client to authentication information stored in the network device. In one embodiment, an authentication cache in the network device stores the authentication information. If the client identifying information is authenticated successfully against the stored authentication information, the network device is dynamically re-configured to allow network traffic initiated by the client to reach the network resource. If local authentication fails, new stored authentication is created for the client, and the network device attempts to authenticate the client using a remote authentication server. If remote authentication is successful, the local authentication information is updated so that subsequent requests can authenticate locally. As a result, a client may be authenticated locally at a router or similar device, reducing network traffic to the authentication server.

399 citations

Patent
05 Sep 2001
TL;DR: In this article, the authors proposed a method whereby biometric elements, such as voice prints, are utilized to enhance the public key infrastructure as a means to decrypt data and verify data authenticity, such that the user's private key is authenticated remotely on a one-time basis.
Abstract: A network based mechanism for real time verification and authentication of data and user identities. The present invention enables a method whereby biometric elements, such as voice prints, are utilized to enhance the Public Key Infrastructure as a means to decrypt data and verify data authenticity, such that the user's private key is authenticated remotely on a one-time basis. The present invention comprises an authentication server ( 25 ) with various software modules that enable authentication of user identity, secure user access to data, digital signatures, secure messaging and secure online transactions.

371 citations

Patent
09 Nov 1994
TL;DR: In this paper, the security of communications over the system is enhanced by a first user generating a temporary asymmetric crypto-key having a first temporary key and an associated second temporary key portion.
Abstract: In a system, such as a system utilizing a Kerberos protocol, system users each have an associated asymmetric crypto-key. The security of communications over the system is enhanced by a first user generating a temporary asymmetric crypto-key having a first temporary key portion and an associated second temporary key portion. The second temporary key portion is encrypted by the first user with the first private key portion of the first user crypto-key to form a first encrypted message. Another user, preferably an authentication server, applies the second private key portion and the public key portion of the first user crypto-key to the first encrypted message to decrypt the second temporary key portion and thereby authenticate the first user to the security server. The authentication server then encrypts the first encrypted message with the second private key portion of the first user crypto-key to form a second encrypted message. The first user next applies the public key portion of the first user crypto-key to decrypt the second encrypted message and obtain the second temporary key portion, thereby authenticating the security server to the first user.

369 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
75% related
Cryptography
37.3K papers, 854.5K citations
74% related
Encryption
98.3K papers, 1.4M citations
74% related
Mobile computing
51.3K papers, 1M citations
73% related
Server
79.5K papers, 1.4M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20236
202221
202158
2020229
2019390
2018403