Associating services to perimeters
First Claim
1. A method, comprising:
- receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first set of resources and resources external to the first set of resources, the first set of resources associated with the internal application for accessing the server resource account and a first enterprise identifier;
wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second set of resources included in the second device and associated with the cellular network access between the second device and the cellular network;
receiving, at the first device and from the second device, the second enterprise identifier; and
determining, at the first device, whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second set of resources based on the first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein determining whether to grant access comprises;
comparing the first enterprise identifier to the second enterprise identifier; and
based on the first enterprise identifier not matching the second enterprise identifier, generating a separate set of resources including resources for an unknown user to access an enterprise service.
6 Assignments
0 Petitions
Accused Products
Abstract
In some implementations, a method includes receiving, from a user of a first device, a request to enable access, through a second device, to a server resource account of an enterprise. The first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource. A request is wirelessly transmit, to the second device, to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device. Whether to grant access to the internal resource is determined based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device.
-
Citations
17 Claims
-
1. A method, comprising:
-
receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first set of resources and resources external to the first set of resources, the first set of resources associated with the internal application for accessing the server resource account and a first enterprise identifier; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second set of resources included in the second device and associated with the cellular network access between the second device and the cellular network; receiving, at the first device and from the second device, the second enterprise identifier; and determining, at the first device, whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second set of resources based on the first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein determining whether to grant access comprises; comparing the first enterprise identifier to the second enterprise identifier; and based on the first enterprise identifier not matching the second enterprise identifier, generating a separate set of resources including resources for an unknown user to access an enterprise service. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A first device, comprising:
-
a memory; and one or more hardware processors communicatively coupled with the memory and configured to; receive, by the first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first set of resources and resources external to the first set of resources, the first set of resources associated with the internal application for accessing the server resource account and a first enterprise identifier; wirelessly transmit, to the second device, a request to the second device for a second enterprise identifier assigned to a second set of resources included in the second device and associated with the cellular network access between the second device and the cellular network; receive, at the first device and from the second device, the second enterprise identifier; and determine, at the first device, whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second set of resources based on the first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the one or more hardware processors are configured to determine whether to grant access comprises the one or more hardware processors configured to; compare the first enterprise identifier to the second enterprise identifier; and based on the first enterprise identifier not matching the second enterprise identifier, generate a separate set of resources including resources for an unknown user to access an enterprise service. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product encoded on a non-transitory storage medium, the product comprising computer readable instructions for causing one or more processors to perform operations comprising:
-
receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first set of resources and resources external to the first set of resources, the first set of resources associated with the internal application for accessing the server resource account and a first enterprise identifier; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second set of resources included in the second device and associated with the cellular network access between the second device and the cellular network; receiving, at the first device and from the second device, the second enterprise identifier; and determining, at the first device, whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second set of resources based on the first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises; comparing the first enterprise identifier to the second enterprise identifier; and based on the first enterprise identifier not matching the second enterprise identifier, generating a separate set of resources including resources for an unknown user to access an enterprise service. - View Dependent Claims (16, 17)
-
Specification