SlideShare a Scribd company logo
1.	The Client Computer connects to the Agent. The Agent protects the network by restricting access to only authorized Users. “Hello, Agent. I would like to connect to the network.” “Hello, Client Computer. Please send me a Username for authentication.” User Client Bob Agent Authentication Server The Accused System Does Not Infringe 1 click to proceed click to proceed
The Accused System Does Not Infringe 2.	The Client Computer system prompts the User to enter his Username and Password. The Username will be sent to the Server. The Password is known only to the User and the Client Computer. The Password is “locked” to the Client Computer and never sent to the Authentication Server. 2 Please Enter Username: Bob Bob letMEin23 Password: letMEin23 User Client Bob letMEin23 Agent Authentication Server click to proceed click to proceed
The Accused System Does Not Infringe 3.	The Client Computer requests authentication from the Agent and sends the Username to the Agent. The Agent forwards the Username to the Authentication Server. The Password is never sent. 3 “The user named ‘Bob’ wants to join the network. Please authenticate him.” User Client Bob Bob letMEin23 Bob Agent Authentication Server click to proceed click to proceed
The Accused System Does Not Infringe 4.	The Client Computer and the Server negotiate to select a form of authentication.  4 “Hello, Client. How would you like to authenticate?” User Client Bob letMEin23 Agent Authentication Server click to proceed click to proceed
The Accused System Does Not Infringe 5.	The Client Computer requests authentication that protects the secure nature of the User’s Password. 5 “I don’t want to send my password, so let’s use PEAP-MS-CHAP-V2” “OK.” User Client Bob letMEin23 Agent Authentication Server click to proceed

More Related Content

Viewers also liked

Cognitive development including piaget's theory(mainly in pre-school years)
Cognitive development including piaget's theory(mainly in pre-school years)Cognitive development including piaget's theory(mainly in pre-school years)
Cognitive development including piaget's theory(mainly in pre-school years)
Aashna Suri
 
Theories of Learning and Development
Theories of Learning and Development Theories of Learning and Development
Theories of Learning and Development
Pippa Totraku
 
Perception
PerceptionPerception
Perception
Sheenu
 
Chapter 4 Consumer Motivation
Chapter 4 Consumer MotivationChapter 4 Consumer Motivation
Chapter 4 Consumer Motivation
Nishant Agrawal
 
Cognitive development of the preschoolers
Cognitive development of the preschoolersCognitive development of the preschoolers
Cognitive development of the preschoolers
BSEPhySci14
 
Toddler Development PowerPoint
Toddler Development PowerPointToddler Development PowerPoint
Toddler Development PowerPoint
jollytolley
 
Development short cases approach
Development short cases  approachDevelopment short cases  approach
Development short cases approach
Teik Beng Khoo
 
PowerPoint Presentation Development
PowerPoint Presentation DevelopmentPowerPoint Presentation Development
PowerPoint Presentation Development
tltiede
 
Boyd ppt ch4_f
Boyd ppt ch4_fBoyd ppt ch4_f
Boyd ppt ch4_f
cjosek
 
Cognitive development of intermediate schoolers
Cognitive development of intermediate schoolersCognitive development of intermediate schoolers
Cognitive development of intermediate schoolers
Rommel Ferrer
 

Viewers also liked (10)

Cognitive development including piaget's theory(mainly in pre-school years)
Cognitive development including piaget's theory(mainly in pre-school years)Cognitive development including piaget's theory(mainly in pre-school years)
Cognitive development including piaget's theory(mainly in pre-school years)
 
Theories of Learning and Development
Theories of Learning and Development Theories of Learning and Development
Theories of Learning and Development
 
Perception
PerceptionPerception
Perception
 
Chapter 4 Consumer Motivation
Chapter 4 Consumer MotivationChapter 4 Consumer Motivation
Chapter 4 Consumer Motivation
 
Cognitive development of the preschoolers
Cognitive development of the preschoolersCognitive development of the preschoolers
Cognitive development of the preschoolers
 
Toddler Development PowerPoint
Toddler Development PowerPointToddler Development PowerPoint
Toddler Development PowerPoint
 
Development short cases approach
Development short cases  approachDevelopment short cases  approach
Development short cases approach
 
PowerPoint Presentation Development
PowerPoint Presentation DevelopmentPowerPoint Presentation Development
PowerPoint Presentation Development
 
Boyd ppt ch4_f
Boyd ppt ch4_fBoyd ppt ch4_f
Boyd ppt ch4_f
 
Cognitive development of intermediate schoolers
Cognitive development of intermediate schoolersCognitive development of intermediate schoolers
Cognitive development of intermediate schoolers
 

Similar to Anthropomorphism in Technical Presentation

Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
Spring security oauth2
Spring security oauth2Spring security oauth2
Spring security oauth2
axykim00
 
Tales of modern day data breaches - a web security guide for developers
Tales of modern day data breaches - a web security guide for developersTales of modern day data breaches - a web security guide for developers
Tales of modern day data breaches - a web security guide for developers
Jaap Karan Singh
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
AshKhan85
 
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David JohanssonInfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
David Johansson
 
Login With External Accounts In Odoo
Login With External Accounts In OdooLogin With External Accounts In Odoo
Login With External Accounts In Odoo
Anisha Technaureus
 

Similar to Anthropomorphism in Technical Presentation (6)

Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Spring security oauth2
Spring security oauth2Spring security oauth2
Spring security oauth2
 
Tales of modern day data breaches - a web security guide for developers
Tales of modern day data breaches - a web security guide for developersTales of modern day data breaches - a web security guide for developers
Tales of modern day data breaches - a web security guide for developers
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
 
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David JohanssonInfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
 
Login With External Accounts In Odoo
Login With External Accounts In OdooLogin With External Accounts In Odoo
Login With External Accounts In Odoo
 

Recently uploaded

一比一原版布兰登大学毕业证(BU毕业证书)如何办理
一比一原版布兰登大学毕业证(BU毕业证书)如何办理一比一原版布兰登大学毕业证(BU毕业证书)如何办理
一比一原版布兰登大学毕业证(BU毕业证书)如何办理
wkip62b
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
Virtual Real Design
 
一比一原版马来西亚世纪大学毕业证成绩单一模一样
一比一原版马来西亚世纪大学毕业证成绩单一模一样一比一原版马来西亚世纪大学毕业证成绩单一模一样
一比一原版马来西亚世纪大学毕业证成绩单一模一样
k4krdgxx
 
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
qo1as76n
 
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
bo44ban1
 
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
kuapy
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
qo1as76n
 
UXpert_Report (UALR Mapping Renewal 2022).pdf
UXpert_Report (UALR Mapping Renewal 2022).pdfUXpert_Report (UALR Mapping Renewal 2022).pdf
UXpert_Report (UALR Mapping Renewal 2022).pdf
anthonylin333
 
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证如何办理
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证如何办理一比一原版(Vancouver毕业证书)温哥华岛大学毕业证如何办理
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证如何办理
ijk38lw
 
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
21uul8se
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
Knight Moves
 
一比一原版肯特大学毕业证UKC成绩单一模一样
一比一原版肯特大学毕业证UKC成绩单一模一样一比一原版肯特大学毕业证UKC成绩单一模一样
一比一原版肯特大学毕业证UKC成绩单一模一样
tobbk6s8
 
Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
Bianca Woods
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
Kyungeun Sung
 
一比一原版南安普顿索伦特大学毕业证Southampton成绩单一模一样
一比一原版南安普顿索伦特大学毕业证Southampton成绩单一模一样一比一原版南安普顿索伦特大学毕业证Southampton成绩单一模一样
一比一原版南安普顿索伦特大学毕业证Southampton成绩单一模一样
3vgr39kx
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NishantRathi18
 
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
k7nm6tk
 
NHL Stenden University of Applied Sciences Diploma Degree Transcript
NHL Stenden University of Applied Sciences Diploma Degree TranscriptNHL Stenden University of Applied Sciences Diploma Degree Transcript
NHL Stenden University of Applied Sciences Diploma Degree Transcript
lhtvqoag
 
原版制作(MDIS毕业证书)新加坡管理发展学院毕业证学位证一模一样
原版制作(MDIS毕业证书)新加坡管理发展学院毕业证学位证一模一样原版制作(MDIS毕业证书)新加坡管理发展学院毕业证学位证一模一样
原版制作(MDIS毕业证书)新加坡管理发展学院毕业证学位证一模一样
hw2xf1m
 
Getting Data Ready for Culture Hack by Neontribe
Getting Data Ready for Culture Hack by NeontribeGetting Data Ready for Culture Hack by Neontribe
Getting Data Ready for Culture Hack by Neontribe
Harry Harrold
 

Recently uploaded (20)

一比一原版布兰登大学毕业证(BU毕业证书)如何办理
一比一原版布兰登大学毕业证(BU毕业证书)如何办理一比一原版布兰登大学毕业证(BU毕业证书)如何办理
一比一原版布兰登大学毕业证(BU毕业证书)如何办理
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
 
一比一原版马来西亚世纪大学毕业证成绩单一模一样
一比一原版马来西亚世纪大学毕业证成绩单一模一样一比一原版马来西亚世纪大学毕业证成绩单一模一样
一比一原版马来西亚世纪大学毕业证成绩单一模一样
 
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
 
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
 
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
 
UXpert_Report (UALR Mapping Renewal 2022).pdf
UXpert_Report (UALR Mapping Renewal 2022).pdfUXpert_Report (UALR Mapping Renewal 2022).pdf
UXpert_Report (UALR Mapping Renewal 2022).pdf
 
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证如何办理
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证如何办理一比一原版(Vancouver毕业证书)温哥华岛大学毕业证如何办理
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证如何办理
 
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
 
一比一原版肯特大学毕业证UKC成绩单一模一样
一比一原版肯特大学毕业证UKC成绩单一模一样一比一原版肯特大学毕业证UKC成绩单一模一样
一比一原版肯特大学毕业证UKC成绩单一模一样
 
Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
 
一比一原版南安普顿索伦特大学毕业证Southampton成绩单一模一样
一比一原版南安普顿索伦特大学毕业证Southampton成绩单一模一样一比一原版南安普顿索伦特大学毕业证Southampton成绩单一模一样
一比一原版南安普顿索伦特大学毕业证Southampton成绩单一模一样
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
 
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
 
NHL Stenden University of Applied Sciences Diploma Degree Transcript
NHL Stenden University of Applied Sciences Diploma Degree TranscriptNHL Stenden University of Applied Sciences Diploma Degree Transcript
NHL Stenden University of Applied Sciences Diploma Degree Transcript
 
原版制作(MDIS毕业证书)新加坡管理发展学院毕业证学位证一模一样
原版制作(MDIS毕业证书)新加坡管理发展学院毕业证学位证一模一样原版制作(MDIS毕业证书)新加坡管理发展学院毕业证学位证一模一样
原版制作(MDIS毕业证书)新加坡管理发展学院毕业证学位证一模一样
 
Getting Data Ready for Culture Hack by Neontribe
Getting Data Ready for Culture Hack by NeontribeGetting Data Ready for Culture Hack by Neontribe
Getting Data Ready for Culture Hack by Neontribe
 

Anthropomorphism in Technical Presentation

  • 1. 1. The Client Computer connects to the Agent. The Agent protects the network by restricting access to only authorized Users. “Hello, Agent. I would like to connect to the network.” “Hello, Client Computer. Please send me a Username for authentication.” User Client Bob Agent Authentication Server The Accused System Does Not Infringe 1 click to proceed click to proceed
  • 2. The Accused System Does Not Infringe 2. The Client Computer system prompts the User to enter his Username and Password. The Username will be sent to the Server. The Password is known only to the User and the Client Computer. The Password is “locked” to the Client Computer and never sent to the Authentication Server. 2 Please Enter Username: Bob Bob letMEin23 Password: letMEin23 User Client Bob letMEin23 Agent Authentication Server click to proceed click to proceed
  • 3. The Accused System Does Not Infringe 3. The Client Computer requests authentication from the Agent and sends the Username to the Agent. The Agent forwards the Username to the Authentication Server. The Password is never sent. 3 “The user named ‘Bob’ wants to join the network. Please authenticate him.” User Client Bob Bob letMEin23 Bob Agent Authentication Server click to proceed click to proceed
  • 4. The Accused System Does Not Infringe 4. The Client Computer and the Server negotiate to select a form of authentication. 4 “Hello, Client. How would you like to authenticate?” User Client Bob letMEin23 Agent Authentication Server click to proceed click to proceed
  • 5. The Accused System Does Not Infringe 5. The Client Computer requests authentication that protects the secure nature of the User’s Password. 5 “I don’t want to send my password, so let’s use PEAP-MS-CHAP-V2” “OK.” User Client Bob letMEin23 Agent Authentication Server click to proceed