Associating Services to Perimeters
First Claim
1. A method of accessing a resource, the method comprising:
- receiving, by a first device, a request to enable the first device to access, through a wireless connection with a second device, a server resource account of an enterprise, wherein the first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and being configured to prevent external resources from accessing the internal resource;
wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device; and
determining whether to grant access to the internal resource based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device.
4 Assignments
0 Petitions
Accused Products
Abstract
In some implementations, a method includes receiving, from a user of a first device, a request to enable access, through a second device, to a server resource account of an enterprise. The first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource. A request is wirelessly transmit, to the second device, to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device. Whether to grant access to the internal resource is determined based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device.
40 Citations
28 Claims
-
1. A method of accessing a resource, the method comprising:
-
receiving, by a first device, a request to enable the first device to access, through a wireless connection with a second device, a server resource account of an enterprise, wherein the first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and being configured to prevent external resources from accessing the internal resource; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device; and determining whether to grant access to the internal resource based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A mobile device, comprising:
one or more processors operable to; receive, by a first device, a request to enable access, through a wireless connection with a second device, to a server resource account of an enterprise, wherein the first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource; wirelessly transmit, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device; and determine whether to grant access to the internal resource based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer program product encoded on a tangible, non-transitory storage medium, the product comprising computer readable instructions for causing one or more processors to perform operations comprising:
-
receiving, by a first device, a request to enable access, through a wireless connection with a second device, to a server resource account of an enterprise, wherein the first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device; and determining whether to grant access to the internal resource based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A system, comprising:
-
a first mobile device configured to receive a request to enable access, through a wireless connection with a second device, to a server resource account of an enterprise, wherein the first mobile device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource, wirelessly transmit a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second mobile device, and determine whether to grant access to the internal resource based on a first enterprise identifier assigned to the first mobile device and a second enterprise identifier assigned to the second mobile device; and the second mobile device configured to connect the first mobile device to the cellular network. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification