Configuring captive portals with a cloud service
First Claim
Patent Images
1. A system for provisioning a captive portal associated with a network access point (NAP), said system comprising:
- a processor programmed to;
receive configuration settings for the captive portal from a first user, the configuration settings including a plurality of application identifiers, wherein each of the plurality of application identifiers identify an application that is allowed access through the captive portal without authentication of a mobile device or user; and
process the received configuration settings to;
generate configuration data for configuring the NAP;
enable the captive portal to provide access to a network;
receiving a request from a second user to access a first application through the captive portal, the first application comprising a first application identifier from the plurality of application identifiers;
enabling the second user to access the first application through the captive portal without authenticating the second user or a computing device of the second user based at least on the first application identifier;
receiving a request from the second user to access a second application through the captive portal; and
based at least one the second application not including an identifier from the plurality of identifiers, sending a request to authenticate the second user or the computing device of the second user prior to enabling the second user to access the second application through the captive portal.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments provision captive portals on network access points (NAPs). In response to a request from a NAP owner, a cloud service associates a NAP with the NAP owner and provides a control channel for configuring the NAP. The NAP owner inputs configuration settings describing the captive portal. The cloud service processes the configuration settings to generate configuration data. The cloud service transmits the configuration data to the NAP. The NAP applies the configuration data to configure the NAP. Some embodiments configure Wi-Fi hotspots with captive portals for gated access to the Internet.
173 Citations
20 Claims
-
1. A system for provisioning a captive portal associated with a network access point (NAP), said system comprising:
a processor programmed to; receive configuration settings for the captive portal from a first user, the configuration settings including a plurality of application identifiers, wherein each of the plurality of application identifiers identify an application that is allowed access through the captive portal without authentication of a mobile device or user; and process the received configuration settings to; generate configuration data for configuring the NAP; enable the captive portal to provide access to a network; receiving a request from a second user to access a first application through the captive portal, the first application comprising a first application identifier from the plurality of application identifiers; enabling the second user to access the first application through the captive portal without authenticating the second user or a computing device of the second user based at least on the first application identifier; receiving a request from the second user to access a second application through the captive portal; and based at least one the second application not including an identifier from the plurality of identifiers, sending a request to authenticate the second user or the computing device of the second user prior to enabling the second user to access the second application through the captive portal. - View Dependent Claims (2, 3, 4, 5)
-
6. A method comprising:
-
sending, from a network access point (NAP) owner device, a NAP identifier and a NAP owner identifier; accessing, by the NAP owner device, a control channel; sending, from the NAP owner device via the provided control channel, configuration settings for a captive portal associated with a NAP, the captive portal providing access to a network, the configuration settings including a plurality of application identifiers, wherein each of the plurality of application identifiers identify an application that is allowed access to the captive portal without authentication of a mobile device or user; receiving a request from a user to access a first application through the captive portal, the first application comprising a first application identifier from the plurality of application identifiers; enabling the user to access the first application through the captive portal without authenticating the user or a computing device of the user based at least on the first application identifier; receiving a request from the user to access a second application through the captive portal; and based at least one the second application not including an identifier from the plurality of identifiers, sending a request to authenticate the user or the computing device of the second user prior to enabling the user to access the second application through the captive portal. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. One or more computer storage devices embodying computer-executable components, said components comprising:
-
a user interface component that when executed causes at least one processor to provide a user interface for display on a network access point (NAP) owner device, the NAP owner device receiving configuration settings for a NAP from a NAP owner via the provided user interface, the configuration settings defining access by a plurality of users to a network through a captive portal implemented by the NAP, the configuration settings including a plurality of application identifiers, wherein each of the plurality of application identifiers identify an application that is allowed access through the captive portal without authentication of a mobile device or user; and a configuration component that when executed causes at least one processor to process the configuration settings to; generate configuration data for configuring the NAP; enable the captive portal to provide access to the network; receive a request from a user to access a first application through the captive portal, the first application comprising a first application identifier from the plurality of application identifiers; enable the user to access the first application through the captive portal without authenticating the user or a computing device of the user based at least on the first application identifier; receive a request from the user to access a second application through the captive portal; and based at least one the second application not including an identifier from the plurality of identifiers, send a request to authenticate the user or the computing device of the second user prior to enabling the user to access the second application through the captive portal. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification