Authentication of a user device using traffic flow information

作者: Fenglin Yin , Jianxiu Hao , Pramod Kalyanasundaram , Zhong Chen

DOI:

关键词:

摘要: A device may receive traffic flow information that includes user identifiers. The receive, from a accessing an application associated with third party service, authentication request to authenticate the provides service. include session token identifies session, identifier application, and device. determine based on whether matches one of identifiers included in information. provide, device, indication has been authenticated permit allow or deny access

参考文章(47)
Michael Rash, Jamie Woodhead, Markus Nispel, Richard Graham, Device and related method for establishing network policy based on applications ,(2013)
Robert Thibadeau, Steven Sprague, Michael Sprague, Device identification scoring ,(2014)
David Lowsky, Shozo Fujiwara, Jeffrey Chin, Joshua Schroeder, Christopher Hong, Kentaro Takeda, Kevin Lee, Rina Horiuchi, Nicholas Lee, Subscription-fee-based automated machine translation system ,(2002)
Michael Rash, David Kjendal, Markus Nispel, Richard Graham, System and related method for network monitoring and control based on applications ,(2013)
Matthew W. Nelson, Rakesh Chandwani, Lalit R. Kotecha, Dynamic network traffic analysis and traffic flow configuration for radio networks ,(2013)
Ian Mcbeth, Darren Ziebart, David Ong, Andrew Macmillan, Peter Warrick, Josh Wookey, Automatic service activation for user device upon detecting its device identifier on network of hospitality establishment ,(2012)
Jerome P. Moisand, Julius W. Francis, Session-aware service chaining within computer networks ,(2013)
Mohammad Raheel Khalid, Ansar Kassim, Secure login for subscriber devices ,(2013)