Detection of required password authentication in a network
First Claim
Patent Images
1. A method comprising:
- transmitting an interrogation to an access point on a network, wherein the interrogation is transmitted by a client device that is suitably configured to request a connection to the network, and wherein the interrogation requests the connection between the client device and the network without the client device initially utilizing a browser;
determining if an authorization for the client device is required before connecting the client device to the network, wherein said determining if the authorization for the client device is required before connecting to the network is performed by the client device;
transmitting a request for a connection to a known defective uniform resource identifier (URI), wherein the known defective URI is an invalid address that is unable to present resources to any requester; and
receiving a valid response to the request for the connection to the known defective URI, wherein the valid response indicates that the request to the known defective URI was automatically directed to a valid login page;
in response to determining that the authorization for the client device is required before connecting the client device to the network, obtaining, by the client device, authorization to connect the client device to the network; and
in response to determining that the authorization for the client device is required before connecting the client device to the network, disabling any user applications on the client device that are not needed for establishing the connection to the network, wherein the user applications remain disabled until the client device is connected to the network.
1 Assignment
0 Petitions
Accused Products
Abstract
A client device interrogates an access point on a network to request an initial connection to the network. Without using a browser, the client device determines if the connection failed due to a lack of authorization for the client device to connect to the network.
6 Citations
14 Claims
-
1. A method comprising:
-
transmitting an interrogation to an access point on a network, wherein the interrogation is transmitted by a client device that is suitably configured to request a connection to the network, and wherein the interrogation requests the connection between the client device and the network without the client device initially utilizing a browser; determining if an authorization for the client device is required before connecting the client device to the network, wherein said determining if the authorization for the client device is required before connecting to the network is performed by the client device; transmitting a request for a connection to a known defective uniform resource identifier (URI), wherein the known defective URI is an invalid address that is unable to present resources to any requester; and receiving a valid response to the request for the connection to the known defective URI, wherein the valid response indicates that the request to the known defective URI was automatically directed to a valid login page; in response to determining that the authorization for the client device is required before connecting the client device to the network, obtaining, by the client device, authorization to connect the client device to the network; and in response to determining that the authorization for the client device is required before connecting the client device to the network, disabling any user applications on the client device that are not needed for establishing the connection to the network, wherein the user applications remain disabled until the client device is connected to the network. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
receiving, by a hardware access point that is suitably configured to provide a client device access to a network, an interrogation, wherein the interrogation requests a connection between the client device and the network without the client device initially utilizing a browser; determining if an authorization for the client device is required before connecting to the network by the hardware access point; receiving, from the client device, a request for the connection to a known defective uniform resource identifier (URI), wherein the known defective URI is an invalid address that is unable to present resources to any requester; and transmitting a valid response to the client device, wherein the valid response indicates to the client device that the request was automatically redirected to a valid login page; in response to determining that the authorization for the client device is required before connecting the client device to the network, transmitting an alert to the client device, wherein the alert informs the client device that the connection between the client device and the network failed; and in response to receiving authorization from the client device, connecting the client device to the network. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product for connecting a client device to a network, the computer program product comprising:
-
a non-transitory computer usable medium having computer usable program code embodied therewith, the computer usable program code comprising; computer usable program code configured to transmit an interrogation to an access point on a network, wherein the interrogation is transmitted by a client device that is suitably configured to request a connection to the network, and wherein the interrogation requests the connection between the client device and the network without the client device initially utilizing a browser; computer usable program code configured to determine if an authorization for the client device is required before connecting the client device to the network by; transmitting a request for a connection to a known defective uniform resource identifier (URI), wherein the known defective URI is known by a user of the client device to be an invalid address that is unable to present resources to any requester; and receiving a valid response to the request for the connection to the known defective URI, wherein the valid response indicates that the request to the known defective URI was automatically directed to a valid login page; computer usable program code configured to, in response to determining that the authorization for the client device is required before connecting the client device to the network, transmit an alert to a user of the client device; and computer usable program code configured to, in response to the user receiving the alert, obtain, by the client device, authorization to connect to the network. - View Dependent Claims (10, 11)
-
-
12. A system comprising:
-
a network; and a hardware access point for connecting the network to client devices that do not initially utilize a browser to connect to the network, wherein the hardware access point; receives an interrogation, wherein the interrogation requests a connection between a client device and the network without the client device initially utilizing a browser; determines if an authorization for the client device is required before connecting to the network by; receiving a request for a connection to a known defective uniform resource identifier (URI) wherein the known defective URI is known by a user of the client device to be an invalid address that is unable to resent resources to any requesters; and transmitting a valid response to the request for the connection to the known defective URI, wherein the valid res wise indicates that the realest to the known defective URI was automatically directed to a valid login page; in response to determining that the authorization for the client device is required before connecting the client device to the network, transmitting an alert to the client device, wherein the alert informs the client device that the connection between the client device and the network failed; and in response to receiving authorization from the client device, connecting the client device to the network. - View Dependent Claims (13, 14)
-
Specification