1. 1. The Client Computer connects to the Agent. The Agent protects the network by restricting access to only authorized Users. “Hello, Agent. I would like to connect to the network.” “Hello, Client Computer. Please send me a Username for authentication.” User Client Bob Agent Authentication Server The Accused System Does Not Infringe 1 click to proceed click to proceed
2. The Accused System Does Not Infringe 2. The Client Computer system prompts the User to enter his Username and Password. The Username will be sent to the Server. The Password is known only to the User and the Client Computer. The Password is “locked” to the Client Computer and never sent to the Authentication Server. 2 Please Enter Username: Bob Bob letMEin23 Password: letMEin23 User Client Bob letMEin23 Agent Authentication Server click to proceed click to proceed
3. The Accused System Does Not Infringe 3. The Client Computer requests authentication from the Agent and sends the Username to the Agent. The Agent forwards the Username to the Authentication Server. The Password is never sent. 3 “The user named ‘Bob’ wants to join the network. Please authenticate him.” User Client Bob Bob letMEin23 Bob Agent Authentication Server click to proceed click to proceed
4. The Accused System Does Not Infringe 4. The Client Computer and the Server negotiate to select a form of authentication. 4 “Hello, Client. How would you like to authenticate?” User Client Bob letMEin23 Agent Authentication Server click to proceed click to proceed
5. The Accused System Does Not Infringe 5. The Client Computer requests authentication that protects the secure nature of the User’s Password. 5 “I don’t want to send my password, so let’s use PEAP-MS-CHAP-V2” “OK.” User Client Bob letMEin23 Agent Authentication Server click to proceed