Controlling Access to Resources on a Network
First Claim
Patent Images
1. A system, comprising:
- a memory storage; and
a processor coupled to the memory storage, the processor configured to;
generate a request to access at least one enterprise resource, wherein the request comprises a set of user access credentials, and a device identifier associated with the system,cause the request to access the at least one enterprise resource to be provided to an authorization service,provide an updated device profile to the authorization service,determine whether the authorization service has provided a set of enterprise access credentials, andin response to determining that the authorization service has provided the set of enterprise access credentials, generate a second request to access the at least one enterprise resource, wherein the second request comprises the set of enterprise access credentials and the device identifier associated with the system.
1 Assignment
0 Petitions
Accused Products
Abstract
Control of access to resources on a network may be provided. A request to access enterprise resource(s), the request comprising a set of user access credentials and a device identifier, may be generated. The request to access the at least one enterprise resource and an updated device profile may be provided to an authorization service. A set of enterprise access credentials may be received from the authorization service and used to generate a second request to access the enterprise resource(s).
18 Citations
20 Claims
-
1. A system, comprising:
-
a memory storage; and a processor coupled to the memory storage, the processor configured to; generate a request to access at least one enterprise resource, wherein the request comprises a set of user access credentials, and a device identifier associated with the system, cause the request to access the at least one enterprise resource to be provided to an authorization service, provide an updated device profile to the authorization service, determine whether the authorization service has provided a set of enterprise access credentials, and in response to determining that the authorization service has provided the set of enterprise access credentials, generate a second request to access the at least one enterprise resource, wherein the second request comprises the set of enterprise access credentials and the device identifier associated with the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving a request from a client device to access at least one enterprise resource, wherein the request comprises a set of user access credentials and a device identifier associated with the client device; determining whether the user access credentials are authorized to request access to the at least one enterprise resource; and in response to determining that the user access credentials are authorized to request access to the at least one enterprise resource; authenticating the client device based at least in part on the device identifier, determining whether the client device is authorized to access the requested quantity of enterprise resources, wherein determining whether the client device is authorized comprises determining whether a periodically updated device profile associated with the client device is in compliance with at least one compliance rule, generating a second request for the at least one enterprise resource comprising a set of enterprise access credentials and the device identifier, and transmitting the second request to an enterprise device to receive the requested quantity of enterprise resources. - View Dependent Claims (12, 13, 14)
-
-
15. A non-transitory computer-readable medium embodying a program executable in a computing device, the program, when executed, performing a method comprising:
-
receiving, from a proxy service, a request to authorize a client device to access at least one enterprise resource, wherein the request comprises a device identifier associated with the client device; determining, according to a device profile associated with the device identifier, whether the client device is in compliance with a plurality of compliance rules; and in response to determining that the client device is in compliance with the plurality of compliance rules, causing the client device to be authorized to access the at least one enterprise resource. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification