MOBILE AUTHENTICATION IN MOBILE VIRTUAL NETWORK
First Claim
Patent Images
1. A non-transitory computer-readable medium storing instructions that, when executed by one or more computer processors of a server, cause the server to:
- receive, from a mobile device, an access request to access an enterprise'"'"'s network that is managed by the server;
inspect a network identifier of the mobile device making the request;
examine a database of network identifiers assigned to mobile devices for members of the enterprise network to determine that the mobile device is used by a member of the enterprise, wherein the network identifier is assigned to the mobile device based on one or more mobile authentication factors for the mobile device;
receive, from the mobile device, a resource request to access a resource through the enterprise'"'"'s network;
extract, from the resource request, one or more resource request factors; and
authenticate the mobile device when the one or more mobile authentication factors respectively correspond with the one or more resource request factors.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and non-transitory computer-readable storage media for using mobile network authentication factors to authenticate a mobile device.
30 Citations
16 Claims
-
1. A non-transitory computer-readable medium storing instructions that, when executed by one or more computer processors of a server, cause the server to:
-
receive, from a mobile device, an access request to access an enterprise'"'"'s network that is managed by the server; inspect a network identifier of the mobile device making the request; examine a database of network identifiers assigned to mobile devices for members of the enterprise network to determine that the mobile device is used by a member of the enterprise, wherein the network identifier is assigned to the mobile device based on one or more mobile authentication factors for the mobile device; receive, from the mobile device, a resource request to access a resource through the enterprise'"'"'s network; extract, from the resource request, one or more resource request factors; and authenticate the mobile device when the one or more mobile authentication factors respectively correspond with the one or more resource request factors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method comprising:
-
receiving, in a server from a mobile device, an access request to access an enterprise'"'"'s network that is managed by the server; inspecting a network identifier of the mobile device making the request; examining a database of network identifiers assigned to mobile devices for members of the enterprise network to determine that the mobile device is used by a member of the enterprise, wherein the network identifier is assigned to the mobile device based on one or more mobile authentication factors for the mobile device; receiving, from the mobile device, a resource request to access a resource through the enterprise'"'"'s network; extracting, from the resource request, one or more resource request factors; and authenticating the mobile device when the one or more mobile authentication factors respectively correspond with the one or more resource request factors. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
one or more servers configured to host a mobile virtual network for an enterprise for providing a dedicated connection between a plurality of mobile devices and enterprise resources; a non-transitory computer-readable medium storing instructions that, when executed by one or more computer processors of a server, cause the one or more servers to; receive, from a mobile device, an access request to access an enterprise'"'"'s network that is managed by the server; inspect a network identifier of the mobile device making the request; examine a database of network identifiers assigned to mobile devices for members of the enterprise network to determine that the mobile device is used by a member of the enterprise, wherein the network identifier is assigned to the mobile device based on one or more mobile authentication factors for the mobile device; receive, from the mobile device, a resource request to access a resource through the enterprise'"'"'s network; extract, from the resource request, one or more resource request factors; and authenticate the mobile device when the one or more mobile authentication factors respectively correspond with the one or more resource request factors.
-
Specification