Anthropomorphism in Technical Presentation
Upcoming SlideShare
Loading in...5
×
 

Anthropomorphism in Technical Presentation

on

  • 1,758 views

 

Statistics

Views

Total Views
1,758
Views on SlideShare
1,754
Embed Views
4

Actions

Likes
0
Downloads
1
Comments
0

2 Embeds 4

http://www.linkedin.com 3
http://www.plaxo.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Anthropomorphism in Technical Presentation Anthropomorphism in Technical Presentation Presentation Transcript

  • 1. The Client Computer connects to the Agent. The Agent protects the network by restricting access to only authorized Users.
    “Hello, Agent. I would like to connect to the network.”
    “Hello, Client Computer. Please send me a Username for authentication.”
    User
    Client
    Bob
    Agent
    Authentication Server
    The Accused System Does Not Infringe
    1
    click to proceed
    click to proceed
  • The Accused System Does Not Infringe
    2. The Client Computer system prompts the User to enter his Username and Password. The Username will be sent to the Server. The Password is known only to the User and the Client Computer. The Password is “locked” to the Client Computer and never sent to the Authentication Server.
    2
    Please Enter Username:
    Bob
    Bob
    letMEin23
    Password:
    letMEin23
    User
    Client
    Bob
    letMEin23
    Agent
    Authentication Server
    click to proceed
    click to proceed
  • The Accused System Does Not Infringe
    3. The Client Computer requests authentication from the Agent and sends the Username to the Agent. The Agent forwards the Username to the Authentication Server. The Password is never sent.
    3
    “The user named ‘Bob’ wants to join the network. Please authenticate him.”
    User
    Client
    Bob
    Bob
    letMEin23
    Bob
    Agent
    Authentication Server
    click to proceed
    click to proceed
  • The Accused System Does Not Infringe
    4. The Client Computer and the Server negotiate to select a form of authentication.
    4
    “Hello, Client. How would you like to authenticate?”
    User
    Client
    Bob
    letMEin23
    Agent
    Authentication Server
    click to proceed
    click to proceed
  • The Accused System Does Not Infringe
    5. The Client Computer requests authentication that protects the secure nature of the User’s Password.
    5
    “I don’t want to send my password, so let’s use PEAP-MS-CHAP-V2”
    “OK.”
    User
    Client
    Bob
    letMEin23
    Agent
    Authentication Server
    click to proceed