Claims
- 1. A method for automatic client authentication for a wireless network protected by an authentication protocol, comprising:
attempting to authenticate a user using a default authentication protocol; determining when the authentication is unsuccessful, and when unsuccessful, automatically attempting authentication using a different authentication protocol.
- 2. The method of claim 1, wherein attempting to authenticate the user using the default authentication protocol, further comprises: obtaining information used to authenticate the user.
- 3. The method of claim 2, wherein obtaining the information used to authenticate the user, further comprises: obtaining a username and domain.
- 4. The method of claim 2, wherein obtaining information used to authenticate the user further comprises using a UI to obtain the information.
- 5. The method of claim 1, wherein obtaining information used to authenticate the user further comprises retrieving the information from a data store.
- 6. The method of claim 3, further comprising obtaining a password.
- 7. The method of claim 1, wherein the default authentication protocol is PEAP.
- 8. The method of claim 7, wherein the different authentication protocol is TLS.
- 9. The method of claim 8, wherein a certificate associated with the user and the TLS protocol is automatically chosen.
- 10. The method of claim 8, wherein the user selects a certificate.
- 11. The method of claim 1, wherein determining when the authentication is unsuccessful further comprises receiving an error indicating that the authentication is unsuccessful.
- 12. The method of claim 1, further comprising determining when the user desires to connect to a WEP network, and when, obtaining a WEP key, and disabling 802.1× for the WEP network when the connection to the network is successful.
- 13. A system for automatically authenticating a user on a wireless network protected by an authentication protocol, comprising:
a processor and a computer-readable medium; an operating environment stored on the computer-readable medium and executing on the processor; a wireless interface layer operating under the control of the operating environment and configured to connect with another device; and an authentication device operating under the control of the operating environment and operative to perform actions, including:
attempting to authenticate a user using a default authentication protocol; and determining when the authentication is unsuccessful, and when unsuccessful, automatically attempting authentication using a different authentication protocol.
- 14. The system of claim 13, wherein attempting to authenticate the user using the default authentication protocol, further comprises using a display to obtain information used to authenticate the user.
- 15. The system of claim 14, wherein obtaining the information used to authenticate the user, further comprises: obtaining the information from a data store used to authenticate the user.
- 16. The system of claim 13, wherein the default authentication protocol is PEAP.
- 17. The system of claim 16, wherein the different authentication protocol is TLS.
- 18. The system of claim 17, wherein a certificate associated with the user and the TLS protocol is automatically chosen.
- 19. The system of claim 13, wherein determining when the authentication is unsuccessful further comprises receiving an error from another device indicating that the authentication is unsuccessful.
- 20. The system of claim 13, further comprising determining when the user desires to connect to a WEP network, and when, obtaining a WEP key, and disabling 802.1× for the WEP network when the connection to the network is successful.
- 21. A modulated data signal for automatically authenticating a user on a wireless network protected by an authentication protocol, comprising:
attempting to authenticate a user using a default authentication protocol; and determining when the authentication is unsuccessful, and when unsuccessful, automatically attempting authentication using a different authentication protocol.
- 22. The modulated data signal of claim 21, wherein attempting to authenticate the user using the default authentication protocol, further comprises using a display to obtain information used to authenticate the user until the information is saved.
- 23. The modulated data signal of claim 21, wherein the default authentication protocol is PEAP.
- 24. The modulated data signal of claim 23, wherein the different authentication protocol is TLS.
- 25. The modulated data signal of claim 24, wherein a certificate associated with the user and the TLS protocol is automatically chosen.
- 26. The modulated data signal of claim 21, further comprising determining when the user desires to connect to a WEP network, and when, obtaining a WEP key, and disabling 802.1× for the WEP network when the connection to the network is successful.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Application Serial No. 60/420,365, filed Oct. 21, 2002, the benefit of the earlier filing date of which is hereby claimed under 35 U.S.C. § 119 (e).
Provisional Applications (1)
|
Number |
Date |
Country |
|
60420365 |
Oct 2002 |
US |