anthropomorphism in technical presentation

5
Authenticati on Server Clien t Agent User The Accused System Does Not Infringe 1. The Client Computer connects to the Agent. The Agent protects the network by restricting access to only authorized Users. 1 Bob “Hello, Agent. I would like to connect to the network.” “Hello, Client Computer. Please send me a Username for authentication.” click to proceed click to proceed

Upload: barnes-robertsllc

Post on 14-Apr-2017

1.388 views

Category:

Design


1 download

TRANSCRIPT

Page 1: Anthropomorphism in Technical Presentation

Authentication Server

Client

Agent

User

The Accused System Does Not Infringe

1. The Client Computer connects to the Agent. The Agent protects the network by restricting access to only authorized Users.

1

Bob

“Hello, Agent. I would like to connect to the

network.”

“Hello, Client Computer. Please send me a Username

for authentication.”

click to proceedclick to

proceed

Page 2: Anthropomorphism in Technical Presentation

The Accused System Does Not Infringe

2. The Client Computer system prompts the User to enter his Username and Password. The Username will be sent to the Server. The Password is known only to the User and the Client Computer. The Password is “locked” to the Client Computer and never sent to the Authentication Server.

2

Authentication Server

Client

Agent

User

letMEin23

Please Enter Username:

Password:Bob

letMEin23

BobletMEin23

Bob

click to proceedclick to

proceed

Page 3: Anthropomorphism in Technical Presentation

Bob

The Accused System Does Not Infringe

3. The Client Computer requests authentication from the Agent and sends the Username to the Agent. The Agent forwards the Username to the Authentication Server. The Password is never sent.

3

“The user named ‘Bob’ wants to join the network. Please authenticate him.”

Authentication Server

Client

Agent

User

Bob

letMEin23

Bob

click to proceedclick to

proceed

Page 4: Anthropomorphism in Technical Presentation

The Accused System Does Not Infringe

4. The Client Computer and the Server negotiate to select a form of authentication.

4

Authentication Server

Client

Agent

User

“Hello, Client. How would you like to

authenticate?”

Bob

letMEin23

click to proceedclick to

proceed

Page 5: Anthropomorphism in Technical Presentation

The Accused System Does Not Infringe

5. The Client Computer requests authentication that protects the secure nature of the User’s Password.

5

“I don’t want to send my password, so let’s use

PEAP-MS-CHAP-V2”

Authentication Server

Client

Agent

User

Bob

letMEin23

“OK.”

click to proceed