System and method for controlling network access in wireless environment
First Claim
Patent Images
1. A service comprising:
- determining that a mobile computer has lost connectivity to a first access point of a network;
when the mobile computer roams to a second access point of the network, determining whether the second access point is authorized for secure communication and if so, releasing access to secure data on the network through the second access point.
3 Assignments
0 Petitions
Accused Products
Abstract
When an authenticated wireless computer loses connectivity to a wireless access point of a network and roams to another access point, the wireless computer (e.g., a hypervisor in the computer) determines whether the new access point is authorized for secure communication and if so, releases access to secure data on the network through the new access point.
18 Citations
22 Claims
-
1. A service comprising:
-
determining that a mobile computer has lost connectivity to a first access point of a network;
when the mobile computer roams to a second access point of the network, determining whether the second access point is authorized for secure communication and if so, releasing access to secure data on the network through the second access point. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A mobile computer, comprising:
-
at least one processor;
at least one wireless transceiver in communication with the processor, the processor executing logic including;
determining whether a predetermined communication hardware event has occurred; and
if a predetermined communication hardware event has occurred, selectively configuring the computer in a non-secure mode. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system including a mobile computer and a network including secure data, comprising:
-
means for determining that the mobile computer has lost connectivity to a first access point of the network;
means for determining whether a second access point of the network to which the mobile computer has roamed is authorized for secure communication; and
means for permitting the mobile computer to access secure data on the network through the second access point. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method comprising:
-
establishing communication between a mobile computer and a network through an access point; and
based on at least one of;
a location, and an identification, of the access point, selectively granting the computer access to secure assets in the network. - View Dependent Claims (20, 21, 22)
-
Specification