作者: Najeeb M. Abdulrahiman , Thomas F. Pauly , Vikram B. Yerrabommanahalli
DOI:
关键词:
摘要: Described are methods that allow credentials of a first client station to authenticate second station. An exemplary method includes associating with station, the including credential information, authorizing use transmitting, by an association request network, network utilizing information authorize connection, configured perform proxy functionality for requests received from be forwarded and responses determining, whether is authenticated establishing connection between using