Network Pre-Authentication
First Claim
Patent Images
1. A method of dynamic pre-authentication, comprising:
- (a) receiving at an access point from one or more content platforms a white-list of internet domains that are to be deemed valid for serving content to a non-authenticated user;
(b) dynamically receiving updates to the white list from said one or more content platforms which are each responsible for a particular promotional campaign that features specific content;
(c) receiving a request at said access point from a non-authenticated user for certain of said specific content; and
(d) allowing the non-authenticated user to retrieve a domain of the content platform responsible for said certain specific content.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of dynamic pre-authentication includes receiving at an access point from one or more content platforms a white-list of internet domains that are to be deemed valid for serving content to a non-authenticated user. Updates to the white list are dynamically received from the one or more content platforms which are each responsible for a particular promotional campaign that features specific content. A request is received at the access point from a non-authenticated user for certain of the specific content, which is allowed such that a domain of the content platform responsible for the certain specific content is accessed by the user.
-
Citations
24 Claims
-
1. A method of dynamic pre-authentication, comprising:
-
(a) receiving at an access point from one or more content platforms a white-list of internet domains that are to be deemed valid for serving content to a non-authenticated user; (b) dynamically receiving updates to the white list from said one or more content platforms which are each responsible for a particular promotional campaign that features specific content; (c) receiving a request at said access point from a non-authenticated user for certain of said specific content; and (d) allowing the non-authenticated user to retrieve a domain of the content platform responsible for said certain specific content. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of implicit pre-authentication, comprising:
-
(a) providing to an internet access point a white-list of internet domains that are to be deemed valid for serving content to a non-authenticated user requesting access; (b) providing a protocol of curtailed internet access for a non-authenticated user requesting access to a domain that is on the white list; (c) receiving a request at said access point from a non-authenticated user for a domain that is on the white list; and (d) allowing the non-authenticated user to have curtailed internet access according to the protocol at least in order to retrieve the white-listed domain. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. One or more computer readable media having digital code embedded therein for programming one or more processors to perform a method of dynamic pre-authentication, wherein the method comprises:
-
(a) receiving at an access point from one or more content platforms a white-list of internet domains that are to be deemed valid for serving content to a non-authenticated user; (b) dynamically receiving updates to the white list from said one or more content platforms which are each responsible for a particular promotional campaign that features specific content; (c) receiving a request at said access point from a non-authenticated user for certain of said specific content; and (d) allowing the non-authenticated user to retrieve a domain of the content platform responsible for said certain specific content. - View Dependent Claims (14, 15, 16, 17)
-
-
18. One or more computer readable media having digital code embedded therein for programming one or more processors to perform a method of implicit pre-authentication, comprising:
-
(a) providing to an internet access point a white-list of internet domains that are to be deemed valid for serving content to a non-authenticated user requesting access; (b) providing a protocol of curtailed internet access for a non-authenticated user requesting access to a domain that is on the white list; (c) receiving a request at said access point from a non-authenticated user for a domain that is on the white list; and (d) allowing the non-authenticated user to have curtailed internet access according to the protocol at least in order to retrieve the white-listed domain. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification