METHOD AND APPARATUS FOR RE-AUTHENTICATION OF A COMPUTING DEVICE USING CACHED STATE
    4.
    发明申请
    METHOD AND APPARATUS FOR RE-AUTHENTICATION OF A COMPUTING DEVICE USING CACHED STATE 审中-公开
    使用高速缓存状态重新认证计算机设备的方法和装置

    公开(公告)号:WO2007047440A3

    公开(公告)日:2009-04-23

    申请号:PCT/US2006040097

    申请日:2006-10-11

    Abstract: Automatically re-authenticating a computing device seeking access to a network or a resource. A method comprises forwarding a request received from the computing device to an authentication device to enable the authentication device to authenticate the computing device using a full-authentication mechanism. State information related to authenticating the computing device is created from authenticating the computing device. The state information is received and stored. For example, an authenticator device that forwarded the initial authentication request from the computing device to the authentication device receives and stores the state information. The computing device is re-authenticated using the stored state information without again contacting the authentication device.

    Abstract translation: 自动重新认证计算设备寻求对网络或资源的访问。 一种方法包括将从计算设备接收的请求转发到认证设备,以使认证设备能够使用完全认证机制认证计算设备。 通过验证计算设备创建与认证计算设备相关的状态信息。 接收并存储状态信息。 例如,将初始认证请求从计算装置转发到认证装置的认证装置接收并存储状态信息。 使用所存储的状态信息重新认证计算设备,而不再与认证设备联系。

    METHOD AND APPARATUS FOR RE-AUTHENTICATION OF A COMPUTING DEVICE USING CACHED STATE
    5.
    发明公开
    METHOD AND APPARATUS FOR RE-AUTHENTICATION OF A COMPUTING DEVICE USING CACHED STATE 有权
    方法和装置与缓冲器状态中的电脑设备重新认证

    公开(公告)号:EP1938506A4

    公开(公告)日:2009-08-05

    申请号:EP06825918

    申请日:2006-10-11

    Applicant: CISCO TECH INC

    Abstract: Automatically re-authenticating a computing device seeking access to a network or a resource. A method comprises forwarding a request received from the computing device to an authentication device to enable the authentication device to authenticate the computing device using a full-authentication mechanism. State information related to authenticating the computing device is created from authenticating the computing device. The state information is received and stored. For example, an authenticator device that forwarded the initial authentication request from the computing device to the authentication device receives and stores the state information. The computing device is re-authenticated using the stored state information without again contacting the authentication device.

Patent Agency Ranking