Method and apparatus for user domain based white lists
First Claim
1. A method of determining whether access to a host requested by a user is permitted after an authorization failure, the method comprising the computer-implemented steps of:
- determining a home provider associated with the user;
determining a list of hosts based on the home provider; and
using the list of hosts to determine whether to permit the user to access the requested host.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed for determining a whether access to host requested by a user is permitted. User identifying information is obtained using any of a variety of techniques. The method includes determining a user domain, which indicates an identity of the user'"'"'s home service provider. A list of hosts is determined based on the home provider. If the requested host is in the list of hosts, then the user is allowed access to the requested host though the user is not authorized. The list of hosts may be determined by one or more attributes from an actual or implied user profile, such as a domain name.
-
Citations
21 Claims
-
1. A method of determining whether access to a host requested by a user is permitted after an authorization failure, the method comprising the computer-implemented steps of:
-
determining a home provider associated with the user;
determining a list of hosts based on the home provider; and
using the list of hosts to determine whether to permit the user to access the requested host. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 20, 21)
-
-
15. A computer readable medium comprising one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors to determine whether access to host requested by a user is permitted after an authorization failure by performing the steps of:
-
determining a home provider associated with the user;
determining a list of hosts based on the home provider; and
using the list of hosts to determine whether to permit the user to access the requested host. - View Dependent Claims (16, 17, 18)
-
-
19. A method of managing a user session in a wireless network, the method comprising the computer-implemented steps of:
-
receiving an authentication request from a user receiving a request from the user for access to a host;
determining that the user is not authorized to access the requested host;
determining a home provider associated with the user;
determining a list of hosts associated with the home provider; and
if the requested host is included in the list of hosts, then connecting the user to the requested host.
-
Specification