Method and Apparatus for Content Based Authentication for Network Access
a content authentication and network access technology, applied in the field of authentication techniques, to achieve the effect of restoring the integrity of the content of the devi
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018]FIG. 1 illustrates the network environment in which the present invention can operate. As shown in FIG. 1, a user employing a mobile computing device 110 attempts to access a network 120, such as an enterprise network, or a device or other resource connected to the network 120. According to one aspect of the invention, the user employing the mobile computing device 110 is challenged by an authentication server 400, discussed further below in conjunction with FIG. 4. The authentication server 400 may be associated, for example, with an enterprise or another network where network security is provided. While the present invention is illustrated in the context of an exemplary enterprise network 120, the present invention applies to many network environments where a network security policy is administered. Furthermore, while the user of a mobile device 110 will more likely take advantage of a wireless local area network than a wired network, the content authentication techniques of...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com