Native Application Hotspot
First Claim
1. A method comprising:
- by a computing device, detecting interception of data sent by the computing device to a first network resource through a communication network, the first network resource corresponding to a particular domain of the communication network;
by the computing device, determining whether the communication network is administered by the particular domain;
by the computing device, automatically generating a request to access the communication network that identifies a second network resource based at least in part on the determination, the second network resource being configured to authenticate a user to the particular domain of the communication network; and
by the computing device, sending the request to the second network resource to access the communication network.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes detecting interception of data sent by the computing device to a first network resource through a communication network. The first network resource corresponds to a particular domain of the communication network. The method also includes determining whether the communication network is administered by the particular domain; and automatically generating a request to access the communication network that identifies a second network resource based at least in part on the determination. The second network resource is configured to authenticate a user to the particular domain of the communication network. The method also includes sending the request to the second network resource to access the communication network.
-
Citations
20 Claims
-
1. A method comprising:
-
by a computing device, detecting interception of data sent by the computing device to a first network resource through a communication network, the first network resource corresponding to a particular domain of the communication network; by the computing device, determining whether the communication network is administered by the particular domain; by the computing device, automatically generating a request to access the communication network that identifies a second network resource based at least in part on the determination, the second network resource being configured to authenticate a user to the particular domain of the communication network; and by the computing device, sending the request to the second network resource to access the communication network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more computer-readable non-transitory storage media embodying software configured when executed to:
-
detect interception of data sent by the computing device to a first network resource through a communication network, the first network resource corresponding to a particular domain of the communication network; determine whether the communication network is administered by the particular domain; automatically generate a request to access the communication network that identifies a second network resource based at least in part on the determination, the second network resource being configured to authenticate a user to the particular domain of the communication network; and send the request to the second network resource to access the communication network. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A device comprising:
-
a processor; and one or more computer-readable non-transitory storage media coupled to the processor and embodying software that; detect interception of data sent by the device to a first network resource through a communication network, the first network resource corresponding to a particular domain of the communication network; determine whether the communication network is administered by the particular domain; automatically generate a request to access the communication network that identifies a second network resource based at least in part on the determination, the second network resource being configured to authenticate a user to the particular domain of the communication network; and send the request to the second network resource to access the communication network. - View Dependent Claims (18, 19, 20)
-
Specification