WO2006001587A1 - Systeme de gestion de reseau et serveur de gestion de reseau cooperant avec un serveur d'authentification - Google Patents
Systeme de gestion de reseau et serveur de gestion de reseau cooperant avec un serveur d'authentification Download PDFInfo
- Publication number
 - WO2006001587A1 WO2006001587A1 PCT/KR2005/000840 KR2005000840W WO2006001587A1 WO 2006001587 A1 WO2006001587 A1 WO 2006001587A1 KR 2005000840 W KR2005000840 W KR 2005000840W WO 2006001587 A1 WO2006001587 A1 WO 2006001587A1
 - Authority
 - WO
 - WIPO (PCT)
 - Prior art keywords
 - network
 - server
 - registration information
 - authentication
 - management server
 - Prior art date
 
Links
- 238000001514 detection method Methods 0.000 claims abstract description 6
 - 230000002452 interceptive effect Effects 0.000 claims description 6
 - 238000012546 transfer Methods 0.000 claims description 6
 - 230000004044 response Effects 0.000 claims description 5
 - 230000002265 prevention Effects 0.000 claims description 3
 - 238000000034 method Methods 0.000 description 22
 - 230000002159 abnormal effect Effects 0.000 description 4
 - 238000004891 communication Methods 0.000 description 4
 - 230000000903 blocking effect Effects 0.000 description 2
 - 238000010586 diagram Methods 0.000 description 2
 - 241000700605 Viruses Species 0.000 description 1
 - 238000013475 authorization Methods 0.000 description 1
 - 230000005540 biological transmission Effects 0.000 description 1
 - 238000010276 construction Methods 0.000 description 1
 - 230000010485 coping Effects 0.000 description 1
 - 230000007123 defense Effects 0.000 description 1
 - 238000011161 development Methods 0.000 description 1
 - 230000000694 effects Effects 0.000 description 1
 - 238000005538 encapsulation Methods 0.000 description 1
 - 238000012544 monitoring process Methods 0.000 description 1
 - 238000011160 research Methods 0.000 description 1
 - 230000001360 synchronised effect Effects 0.000 description 1
 - 230000005641 tunneling Effects 0.000 description 1
 
Classifications
- 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
 - H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L12/00—Data switching networks
 - H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
 - H04L12/46—Interconnection of networks
 - H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
 - H04L41/08—Configuration management of networks or network elements
 - H04L41/0894—Policy-based network configuration management
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
 - H04L63/102—Entity profiles
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
 - H04L41/02—Standardisation; Integration
 - H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
 
 
Definitions
- the present invention relates to a network management system capable of managing whole network devices constituting the network, and more particularly, to a network management system for determining granting network-device access rights to users at the same time that an authentication server performs an authentication process for the users, thereby improving network security and efficiently managing the network devices.
 - FIG. 1 is a configuration view showing a whole configuration of an authentication system in accordance with the IEEE 802. Ix standard.
 - FIG. 2 is a flowchart for explaining a series of authentication processes performed by entities in the authentication system of FIG. 1.
 - the IEEE 802. Ix standard defines three entities: a supplicant 100; an authenticator 110; and an authentication server 120.
 - the supplicant 100 is an entity providing user's authentication information to the authenticator 110 and sending authentication request to the authenticator 110.
 - the supplicant includes wire or wireless terminals intending to access network.
 - the authenticator is initially set to an uncontrolled port status.
 - the supplicant and authenticator can communicate with each other through the EAP (Extensible Authentication Protocol) .
 - the authenticator 110 is an entity transferring the received authentication information and authentication request to the authentication server 120.
 - the authenticator transfers an authentication success message to the supplicant and converts its port status into a controlled port status.
 - the authenticator includes APs (Access Points), routers, switches, and the like.
 - the authentication server 120 is an entity determining authentication based on the supplicant's authentication request received from the authenticator 110. In order to determine authentication, the authentication server uses user's authentication information stored in its internal database or received from external entities. In the IEEE 802.
 - any protocol for communication between the authentication server 120 and the authenticator 110 is not defined.
 - a protocol used for an AAA (Authentication, Authorization, and Accounting) server is also recommended as the protocol between the authentication server 120 and the authenticator 110. Therefore, the RADIUS (Remote Authentication Dial-In User Service) protocol is used as an industrial de-facto standard protocol.
 - the authenticator and the authentication server communicate with each other through the RADIUS protocol, the user's network access right can be controlled according to the determination of authentication (performed by an internal authentication algorithm of the authentication server) and the attributes and vendor-specific attributes of the RADIUS which can be transferred . together with the authentication success message.
 - FIG. 3 is a configuration view of a network according to the centralized authentication method.
 - FIG. 4 is a configuration view of a network according to the distributed authentication method.
 - the authentication server is located in the center of the network, so that a user authentication management can be advantageously centralized.
 - data rate of the network may be limited, and performance of the network may deteriorate due to increase in load of the authentication server.
 - FIG. 3 is a configuration view of a network according to the centralized authentication method.
 - a main authentication server located in the center of the network is connected to the network to manage resources and database, and local servers sending authentication requests manage TLS (Transport Layer Security) session and keys to reduce load of the main authentication server.
 - the distributed authentication method can increase network efficiency by about five times that of the centralized authentication method.
 - the distributed authentication method can improve stability of authentication for local users .
 - the Internet is a network of networks using the TCP/IP (Transmission Control Protocol/Internet Protocol) developed by US Defense Department, and widely used to connect thousands of networks and millions of hosts in the world. At the beginning of its development, the Internet was used as an academic research network in universities and institutes. Recently, the Internet has been commercially used.
 - the protocol TCP/IP has a cooperation function of providing efficient mutual interconnection to different types of information resources in the world.
 - the protocol has several security problems due to source code disclosure of the associated UNIX system and communication utilities.
 - network intrusion and associated damages have increased.
 - intrusion to systems of Internet subscribed entities and associated damage thereto there are network intrusion through the Telnet, illegal actions after system intrusion, distribution of dangerous programs such as Internet Worm virus, and the like.
 - a variety of methods of preventing the intrusions and damage according to layers in the network have been developed and proposed.
 - practical security tools for the layers, security policies coping with security problems, and network application for providing various security services have been greatly researched and developed.
 - the present invention proposes a system capable of efficiently managing network recourses.
 - an object of the present invention is to provide a network management system capable of granting network-device access rights to users in cooperation with an authentication server.
 - another object of the present invention is to provide a network management server capable of storing and managing registration information on network devices or setting predetermined registration information to the network devices in corporation with an authentication server.
 - still another object of the present invention is to provide a network management system capable of setting predetermined registration information to network devices by means of an authentication server and efficiently controlling the network devices.
 - a network management system controlling network-device access rights of user terminals in cooperation with an authentication server, comprising: a management server for communicating with at least one of the network devices connected to a network and storing and managing registration information on the network devices and security policies applied to the user terminals; and an authentication server for determining allowing the user to access the network and the network- device access right of the user terminal by using the registration information and the security policies stored in the management server when the user terminal sends an authentication request, thereby controlling the network-device access right based on the users accessing the network.
 - the network devices may include a firewall server, wherein the management server stores and manages registration information on the firewall server and security policies of firewall applied to the user terminals, and wherein the authentication server applies the firewall to the user terminal based on the security policies stored in the management server when the user terminal sends an authentication request.
 - the network devices may include a virtual private network (VPN) server, wherein the management server stores and manages registration information on the VPN server and security policies of the VPN applied to the user terminals, and wherein the authentication server applies the VPN to the user terminal based on the security policies stored in the management server when the user terminal sends an authentication request.
 - VPN virtual private network
 - the network devices may include a access point (AP) or switch (SW) , wherein the management server stores and manages registration information on the AP or SW and security policies of the AP or SW applied to the user terminals, and wherein the authentication server determines allowing the user terminal to access the AP or SW based on the security policies stored in the management server when the user terminal sends an authentication request.
 - the network devices may include an intrusion prevention system (IPS) server or an intrusion detection system (IDS) server, wherein the management server stores and manages registration information on the IPS or IDS and security policies of firewall applied to the user terminals, and wherein the authentication server determines driving the IPS or IDS based on the security policies stored in the management server when the user terminal sends an authentication request.
 - IPS intrusion prevention system
 - IDS intrusion detection system
 - the authentication server may comprises a registration setup section for inputting the registration information on the network devices and transmits the registration information input through the registration setup section to the management server, and wherein the management server communicates with the network devices in a two-way interactive manner and transfers the registration information received from the authentication server to the network devices.
 - the management server may comprises a registration setup section for inputting the registration information on the network devices, wherein the management server communicates with the network devices in a two-way interactive manner, wherein the management server transfers the registration information input through the registration setup section to the network devices or transmits the registration information to the authentication server in response to a request of the authentication server.
 - a network management server comprising a database for storing and managing registration information on at least one of network devices constituting a network and security policies applied to users, wherein, in response to a request of an authentication server, the network management server transmits the registration information stored in the database and the security policies applied to the users to the authentication server.
 - the network management server may receive the registration information from the authentication server and transfer the received registration information to the network devices .
 - the network devices may include at least one of an intrusion protection system (IPS) server, an intrusion detection system (IDS) server, and a firewall server. Effect of the Invention
 - the authentication server can grant network-device access rights to users.
 - the authentication server can control access to all the network devices connected to the network.
 - the network management system of the present invention at the same time that the authentication server performs an authentication process for the users, network-devices access rights of the users can be controlled.
 - the network management system can provide an efficient and convenient network control and management function by means of the authentication and management servers.
 - FIG. 1 is a configuration view showing a whole configuration of an authentication system in accordance with the IEEE 802. Ix standard.
 - FIG. 2 is a flowchart for explaining a series of authentication processes performed by entities in the authentication system of FIG. 1.
 - FIGS. 3 and 4 are views for explaining centralized and distributed authentication methods, respectively.
 - FIG. 5 is a block diagram exemplifying applications to which a network management system according to a preferred embodiment of the present invention can be applied.
 - FIG. 6 is a configuration view showing a whole configuration of the network management system according to the preferred embodiment of the present invention.
 - FIG. 7 is a configuration view showing a whole configuration of the network management system according to another embodiment of the present invention.
 - FIG. 8 is a flowchart for explaining a series of whole operations of a network management system according to embodiments of the present invention.
 - FIG. 9 is a flowchart for explaining a series of operations of the network management system of FIG. 7.
 - FIG. 5 is a block diagram exemplifying applications (that is, network devices) to which the network management system according to the preferred embodiment of the present invention can be applied.
 - network security devices such firewall servers, intrusion prevention system (IPS) servers, intrusion detection system (IDS) servers, and virtual private network (VPN) servers are connected to the network management system according to the present invention.
 - IPS intrusion prevention system
 - IDDS intrusion detection system
 - VPN virtual private network
 - the network management system comprises user terminals 640 and 642 sending authentication requests, an authentication server 600 performing an authentication process, and a management server 610 cooperating with the authentication server 600.
 - a management server 610 cooperating with the authentication server 600.
 - other network devices such as a VPN server 620, a firewall server 630, internal networks 650, external networks 654, an Email server 656 may be connected to the network management system.
 - the management server 610 includes a database for storing and managing registration information on at least one of the network devices connected to the network and security policies applied to the users.
 - the management server 610 transmits the information to the authentication server 600.
 - the management server 610 communicates with the network devices in a two-way interactive manner to receive registration information from the network devices.
 - the authentication server 600 performs the authentication process for the users based on the user authentication information (for example, user's ID, and password) when the authentication request is received from the user terminals 640 and 642 via a switch. If the management server 610 grants authentication to the users, the management server 610 receives the registration information on the network devices and security policies (applied to the users) from the management server 610 and grants network-device access rights to the users based on the received registration information and security policies.
 - a management server stores and manages registration information on network devices connected to a network (Step 800) .
 - an authentication server receives authentication information and security policies applied to the user from the management server (Step 810) .
 - the authentication server performs an authentication process of the user based on the received authentication information and determines whether or not to grant a network-device access right to the user based on the received security policies (Step 820) .
 - the authentication server can control the network-device access rights based on the users intending to access the network.
 - the firewall server provides an efficiency Internet security service by allowing access to an authorized Internet service and denying access to an unauthorized Internet service based on predetermined security policies. Namely, the firewall server protects internal network by blocking external unauthorized traffic and passing external authorized traffic. In general, the firewall server provides network users with and network transparency and an active security solution to reduce dangerous regions.
 - the management server of the network management system stores and manages the registration information on the firewall server and the security policies of the firewall applied to the users in the database thereof.
 - the authentication server applies the firewall to the user terminal based on the security policies associated with the user. Therefore, according to the present invention, it is possible to perform security policies of the firewall based on the users.
 - a VPN server is a low-cost network solution for constructing a WAN (Wide Area Network) by connecting points through an encryption-based tunneling protocol without any additional private network. Since additional network devices or software are not needed for the VPN, it is possible to reduce construction cost in comparison to general private networks.
 - WAN Wide Area Network
 - the management server of the network management system stores and manages registration information on the VPN server and security policies of the VPN applied to the users in the database thereof.
 - the authentication server applies the VPN to the user terminal based on the security policies associated with the user. Therefore, according to the present invention, it is possible to perform security policies of the VPN based on the users.
 - FIG. 9 is a flowchart for explaining a series of processes of controlling the AP or SW access rights by the network management system according to the present invention.
 - an authentication server registers information on the APs or SWs in the database thereof (Step 900) .
 - information on the APs or SWs registered in the authentication server are transmitted to and synchronized with a management server (Step 910) .
 - the management server generates a setup file for the APs or SWs and transmits the setup file to a DHCP (Dynamic Host Configuration Protocol) server (Step 920) .
 - the DHCP server sets up the APs or SWs based on the setup file received from the management server (Step 930) .
 - the management server receives information on the connected APs or SWs from an SNMP (Simple Network Management Protocol) server (Step 940) .
 - the management server analyzes the APs or SWs by comparing the received information on the APs or SWs with the information registered in the database. If the received information on the APs or SWs does not match with the information registered in the database, the APs or SWs are determined to be illegal.
 - the resulting information is transmitted to the authentication server (Step 950) . According to the present invention, it is possible to search for illegal APs or SWs and prevent connection of the illegal APs or SWs.
 - an IPS and an IDS among the network devices to which the present invention is applied.
 - the IPS is a security solution for stopping abnormal traffic by searching for intruder's signature in the network and automatically performing a predetermined process.
 - the IPS may control the abnormal action of the intruder by monitoring information leakage associated with the abnormal action in the server and blocking the information leakage.
 - the IDS is a system for detecting for abnormal usage, misuse, or abuse of a . computer in real time. Since the IPS completely copes with illegal actions (for example, secret leakage) of internal users and external hacking, the IDS checks intrusion patterns of hackers and monitors external dangerous information to block, all the internal and external information flowing in real time.
 - the management server of the network management system stores and manages registration information on the IDS or IPS server and security policies of the IDS or IPS applied to the users in the database thereof.
 - the authentication server applies the IDS or IPS to the user terminal based on the security policies associated with the user. Therefore, according to the present invention, it is possible to perform security policies of the IDS or IPS based on the users.
 - the management server comprises a registration setup section for inputting the registration information on the network devices. Therefore, a manager can input the registration information on the network devices through the management server.
 - the management server transmits the registration information (input through the registration setup section) to the associated network devices.
 - the network devices can set up according to the received registration information in their own system.
 - the authentication server comprises a registration setup section for inputting the registration information on the network devices. Therefore, a manager can input the registration information on the network devices through the authentication server.
 - the authentication server transmits the registration information (input through the registration setup section) to a management server.
 - the management server transmits the registration information to the associated network devices.
 - the network devices can set up in accordance with the received registration information in their own system.
 - exemplary embodiments should be considered in descriptive sense only and not for purposes of limitation.
 - types of network device connected to a network management system data fields of data stored in a database of a management server, and a communication protocol between the management server and the network devices may be modified in various manners in order to improve performance of a whole system or in consideration of data rate thereof. Therefore, the scope of the invention is defined not by the detailed description of the invention but by the appended claims, and all differences within the scope will be construed as being included in the present invention.
 - a network management system controls an authentication process for users and network-device access rights of the users, so that the network management system can be used to provide an efficient and convenient network control and management function.
 
Landscapes
- Engineering & Computer Science (AREA)
 - Computer Security & Cryptography (AREA)
 - Computer Networks & Wireless Communication (AREA)
 - Signal Processing (AREA)
 - Computer Hardware Design (AREA)
 - Computing Systems (AREA)
 - General Engineering & Computer Science (AREA)
 - Health & Medical Sciences (AREA)
 - General Health & Medical Sciences (AREA)
 - Virology (AREA)
 - Data Exchanges In Wide-Area Networks (AREA)
 - Computer And Data Communications (AREA)
 
Abstract
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| KR20040020030 | 2004-03-24 | ||
| KR10-2004-0020030 | 2004-03-24 | ||
| KR1020050023327A KR20060044494A (ko) | 2004-03-24 | 2005-03-21 | 인증 서버와 연동되는 네트워크 관리 시스템 및 네트워크관리 서버 | 
| KR10-2005-0023327 | 2005-03-21 | 
Publications (1)
| Publication Number | Publication Date | 
|---|---|
| WO2006001587A1 true WO2006001587A1 (fr) | 2006-01-05 | 
Family
ID=35781973
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date | 
|---|---|---|---|
| PCT/KR2005/000840 WO2006001587A1 (fr) | 2004-03-24 | 2005-03-23 | Systeme de gestion de reseau et serveur de gestion de reseau cooperant avec un serveur d'authentification | 
Country Status (1)
| Country | Link | 
|---|---|
| WO (1) | WO2006001587A1 (fr) | 
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| WO2008005697A1 (fr) * | 2006-06-30 | 2008-01-10 | Intel Corporation | Détection d'environnement de réseau | 
| WO2010149030A1 (fr) * | 2009-06-23 | 2010-12-29 | 中兴通讯股份有限公司 | Procédé et système d'authentification centralisée | 
| US8763088B2 (en) | 2006-12-13 | 2014-06-24 | Rockstar Consortium Us Lp | Distributed authentication, authorization and accounting | 
| US9009778B2 (en) | 2005-07-29 | 2015-04-14 | Rpx Clearinghouse Llc | Segmented network identity management | 
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US20020112182A1 (en) * | 2000-12-15 | 2002-08-15 | Ching-Jye Chang | Method and system for network management with adaptive monitoring and discovery of computer systems based on user login | 
| KR100366403B1 (ko) * | 2001-03-07 | 2003-01-06 | 소프트포럼 주식회사 | 인터넷 환경에서의 사용자 인증방법 및 이를 위한 시스템 | 
| KR20040019375A (ko) * | 2001-08-03 | 2004-03-05 | 노키아 코포레이션 | 네트워크 서비스에 대한 접근 및 등록을 관리하는 시스템및 방법 | 
- 
        2005
        
- 2005-03-23 WO PCT/KR2005/000840 patent/WO2006001587A1/fr active Application Filing
 
 
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US20020112182A1 (en) * | 2000-12-15 | 2002-08-15 | Ching-Jye Chang | Method and system for network management with adaptive monitoring and discovery of computer systems based on user login | 
| KR100366403B1 (ko) * | 2001-03-07 | 2003-01-06 | 소프트포럼 주식회사 | 인터넷 환경에서의 사용자 인증방법 및 이를 위한 시스템 | 
| KR20040019375A (ko) * | 2001-08-03 | 2004-03-05 | 노키아 코포레이션 | 네트워크 서비스에 대한 접근 및 등록을 관리하는 시스템및 방법 | 
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US9009778B2 (en) | 2005-07-29 | 2015-04-14 | Rpx Clearinghouse Llc | Segmented network identity management | 
| WO2008005697A1 (fr) * | 2006-06-30 | 2008-01-10 | Intel Corporation | Détection d'environnement de réseau | 
| GB2451026A (en) * | 2006-06-30 | 2009-01-14 | Intel Corp | Detection of network environment | 
| JP2009540476A (ja) * | 2006-06-30 | 2009-11-19 | インテル コーポレイション | ネットワーク環境の検出 | 
| US7814531B2 (en) | 2006-06-30 | 2010-10-12 | Intel Corporation | Detection of network environment for network access control | 
| GB2451026B (en) * | 2006-06-30 | 2011-01-19 | Intel Corp | Detection of network environment | 
| US8763088B2 (en) | 2006-12-13 | 2014-06-24 | Rockstar Consortium Us Lp | Distributed authentication, authorization and accounting | 
| WO2010149030A1 (fr) * | 2009-06-23 | 2010-12-29 | 中兴通讯股份有限公司 | Procédé et système d'authentification centralisée | 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| US7342906B1 (en) | Distributed wireless network security system | |
| US8959334B2 (en) | Secure network architecture | |
| US8484705B2 (en) | System and method for installing authentication credentials on a remote network device | |
| US9218469B2 (en) | System and method for installing authentication credentials on a network device | |
| US9112879B2 (en) | Location determined network access | |
| US20040153171A1 (en) | System and methodology providing automation security architecture in an industrial controller environment | |
| US20050111466A1 (en) | Method and apparatus for content based authentication for network access | |
| CN104813328A (zh) | 受信容器 | |
| US20040093519A1 (en) | Network protecting authentication proxy | |
| US20150249639A1 (en) | Method and devices for registering a client to a server | |
| CN102271120A (zh) | 一种增强安全性的可信网络接入认证方法 | |
| US10298588B2 (en) | Secure communication system and method | |
| KR20060044494A (ko) | 인증 서버와 연동되는 네트워크 관리 시스템 및 네트워크관리 서버 | |
| JPH11203248A (ja) | 認証装置、および、そのプログラムを記録した記録媒体 | |
| WO2006001587A1 (fr) | Systeme de gestion de reseau et serveur de gestion de reseau cooperant avec un serveur d'authentification | |
| WO2006001647A1 (fr) | Systeme de gestion de reseau integree | |
| Cisco | Security Setup | |
| Cisco | Security Setup | |
| Cisco | Security Setup | |
| Tian et al. | Network security and privacy architecture | |
| EP2090073B1 (fr) | Architecture de réseau sécurisée | |
| Lee et al. | Intelligent pervasive network authentication: S/key based device authentication | |
| Hollows et al. | Design of an IoT Authentication and Access Control Framework | |
| Venturini et al. | Security model for ad hoc networks | |
| Lee et al. | Intelligent home network authentication: S/Key-based home device authentication | 
Legal Events
| Date | Code | Title | Description | 
|---|---|---|---|
| AK | Designated states | 
             Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW  | 
        |
| AL | Designated countries for regional patents | 
             Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG  | 
        |
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| NENP | Non-entry into the national phase | 
             Ref country code: DE  | 
        |
| WWW | Wipo information: withdrawn in national office | 
             Country of ref document: DE  | 
        |
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established | 
             Free format text: COMMUNICATION PURSUANT TO RULE 69 (1) EPC ( EPO FORM 1205A DATED 06.12.06)  | 
        |
| 122 | Ep: pct application non-entry in european phase |