Patents by Inventor Glen W. Zorn

Glen W. Zorn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7802091
    Abstract: A proxy server that is inserted between a plurality of network access servers, typically an access points, and an authentication server. When an original authentication request is received by a network access server, the network access server forwards the request to the proxy server which forwards the request to an authentication server. The authentication server then sends the session information to the proxy server which stores the keying material as a dynamic credentials. When the client re-authenticates with one of the plurality of access servers, the re-authentication request is handled by the proxy server using the dynamic credentials. The proxy server may re-authenticate the client using a different method than the method that was originally used. For example, the original authentication may be by Extensible Authentication Protocol—Transport Layer Security (EAP-TLS) and subsequent re-authentications may use Wi-Fi Protected Access (WPA).
    Type: Grant
    Filed: August 12, 2008
    Date of Patent: September 21, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: David E. Halasz, Glen W. Zorn
  • Publication number: 20080301790
    Abstract: A proxy server that is inserted between a plurality of network access servers, typically an access points, and an authentication server. When an original authentication request is received by a network access server, the network access server forwards the request to the proxy server which forwards the request to an authentication server. The authentication server then sends the session information to the proxy server which stores the keying material as a dynamic credentials. When the client re-authenticates with one of the plurality of access servers, the re-authentication request is handled by the proxy server using the dynamic credentials. The proxy server may re-authenticate the client using a different method than the method that was originally used. For example, the original authentication may be by Extensible Authentication Protocol—Transport Layer Security (EAP-TLS) and subsequent re-authentications may use Wi-Fi Protected Access (WPA).
    Type: Application
    Filed: August 12, 2008
    Publication date: December 4, 2008
    Inventors: David E. Halasz, Glen W. Zorn
  • Patent number: 7434044
    Abstract: A proxy server that is inserted between a plurality of network access servers, typically an access points, and an authentication server. When an original authentication request is received by an network access server, the network access server forwards the request to the proxy server which forwards the request to an authentication server. The authentication server then sends the session information to the proxy server which stores the keying material as a dynamic credentials. When the client re-authenticates with one of the plurality of access servers, the re-authentication request is handled by the proxy server using the dynamic credentials. The proxy server may re-authenticate the client using a different method than the method that was originally used. For example, the original authentication may be by Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) and subsequent reauthentications may use Wi-Fi Protected Access (WPA).
    Type: Grant
    Filed: February 26, 2003
    Date of Patent: October 7, 2008
    Inventors: David E. Halasz, Glen W. Zorn
  • Patent number: 7188253
    Abstract: A wireless authentication protocol. Access to a network is managed by providing a challenge-handshake protocol within the Extensible Authentication Protocol for authentication between a client and the network.
    Type: Grant
    Filed: February 6, 2006
    Date of Patent: March 6, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: David E. Halasz, Glen W. Zorn, Stuart Norman, Douglas Smith
  • Patent number: 6996714
    Abstract: A wireless authentication protocol. Access to a network is managed by providing a challenge-handshake protocol within the Extensible Authentication Protocol for authentication between a client and the network.
    Type: Grant
    Filed: December 14, 2001
    Date of Patent: February 7, 2006
    Assignee: Cisco Technology, Inc.
    Inventors: David E. Halasz, Glen W. Zorn, Stuart Norman, Douglas Smith
  • Publication number: 20040168054
    Abstract: A proxy server that is inserted between a plurality of network access servers, typically an access points, and an authentication server. When an original authentication request is received by an network access server, the network access server forwards the request to the proxy server which forwards the request to an authentication server. The authentication server then sends the session information to the proxy server which stores the keying material as a dynamic credentials. When the client re-authenticates with one of the plurality of access servers, the re-authentication request is handled by the proxy server using the dynamic credentials. The proxy server may re-authenticate the client using a different method than the method that was originally used. For example, the original authentication may be by Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) and subsequent reauthentications may use Wi-Fi Protected Access (WPA).
    Type: Application
    Filed: February 26, 2003
    Publication date: August 26, 2004
    Inventors: David E. Halasz, Glen W. Zorn
  • Publication number: 20040019786
    Abstract: A wireless authentication protocol for handling alternative hash functions in a Lightweight Extensible Authentication Protocol (LEAP) environment. Authentication between a network and a client is managed according to LEAP authentication. With advance knowledge of the alternative encoding scheme in both the client and network, the alternatively encoded data can be synchronized. Implementation is by way of providing an alternative database on the network such that the alternative database can be accessed during the LEAP authentication process.
    Type: Application
    Filed: October 14, 2002
    Publication date: January 29, 2004
    Inventors: Glen W. Zorn, David E. Halasz