System and method for controlling network access in wireless environment
First Claim
Patent Images
1. A service comprising:
- determining that a mobile computer has lost connectivity to a first access point of a network;
when the mobile computer roams to a second access point of the network, determining whether the second access point is authorized for first secure communication and if so,releasing access of the computer to first secure data on the network through the second access point, and otherwise releasing access of the computer to data other than the first secure data on the network through the second access point, wherein the mobile computer is authenticated at the first access point, prior to losing connectivity thereto, wherein releasing access to secure data on the network through the second access point comprises releasing access to a set of secure data which differs from the secure data released when the mobile computer is connected to the first access point.
3 Assignments
0 Petitions
Accused Products
Abstract
When an authenticated wireless computer loses connectivity to a wireless access point of a network and roams to another access point, the wireless computer (e.g., a hypervisor in the computer) determines whether the new access point is authorized for secure communication and if so, releases access to secure data on the network through the new access point.
15 Citations
8 Claims
-
1. A service comprising:
-
determining that a mobile computer has lost connectivity to a first access point of a network; when the mobile computer roams to a second access point of the network, determining whether the second access point is authorized for first secure communication and if so, releasing access of the computer to first secure data on the network through the second access point, and otherwise releasing access of the computer to data other than the first secure data on the network through the second access point, wherein the mobile computer is authenticated at the first access point, prior to losing connectivity thereto, wherein releasing access to secure data on the network through the second access point comprises releasing access to a set of secure data which differs from the secure data released when the mobile computer is connected to the first access point. - View Dependent Claims (2, 3, 4)
-
-
5. A system including a mobile computer and a network including secure data, comprising:
-
means for determining that the mobile computer has lost connectivity to a first access point of the network; means for determining whether a second access point of the network to which the mobile computer has roamed is authorized for secure communication; and means for permitting the mobile computer to access secure data on the network through the second access point if the second access point is authorized for secure communication, and otherwise granting access to the computer to data other than the secure data through the second access point, wherein the means are embodied by a hypervisor in the mobile computer. - View Dependent Claims (6)
-
-
7. A method comprising:
-
establishing communication between a mobile computer and a network through an access point; and based on at least one of;
a location, or an identification, of the access point, either granting the computer access to secure assets in the network or granting the computer access to other than the secure assets in the network, wherein the act of selectively granting is undertaken by a hypervisor in the mobile computer. - View Dependent Claims (8)
-
Specification