anthropomorphism in technical presentation
TRANSCRIPT
Authentication Server
Client
Agent
User
The Accused System Does Not Infringe
1. The Client Computer connects to the Agent. The Agent protects the network by restricting access to only authorized Users.
1
Bob
“Hello, Agent. I would like to connect to the
network.”
“Hello, Client Computer. Please send me a Username
for authentication.”
click to proceedclick to
proceed
The Accused System Does Not Infringe
2. The Client Computer system prompts the User to enter his Username and Password. The Username will be sent to the Server. The Password is known only to the User and the Client Computer. The Password is “locked” to the Client Computer and never sent to the Authentication Server.
2
Authentication Server
Client
Agent
User
letMEin23
Please Enter Username:
Password:Bob
letMEin23
BobletMEin23
Bob
click to proceedclick to
proceed
Bob
The Accused System Does Not Infringe
3. The Client Computer requests authentication from the Agent and sends the Username to the Agent. The Agent forwards the Username to the Authentication Server. The Password is never sent.
3
“The user named ‘Bob’ wants to join the network. Please authenticate him.”
Authentication Server
Client
Agent
User
Bob
letMEin23
Bob
click to proceedclick to
proceed
The Accused System Does Not Infringe
4. The Client Computer and the Server negotiate to select a form of authentication.
4
Authentication Server
Client
Agent
User
“Hello, Client. How would you like to
authenticate?”
Bob
letMEin23
click to proceedclick to
proceed
The Accused System Does Not Infringe
5. The Client Computer requests authentication that protects the secure nature of the User’s Password.
5
“I don’t want to send my password, so let’s use
PEAP-MS-CHAP-V2”
Authentication Server
Client
Agent
User
Bob
letMEin23
“OK.”
click to proceed