System and method for automatic network logon over a wireless network
First Claim
Patent Images
1. A method for accessing one or more resources in a computer network, the method comprising:
- receiving, from a client device connected to the computer network via one or more wireless access points, a first set of authentication data transmitted automatically by the client device to access a first set of network resources, the authentication data comprising machine identification data uniquely identifying the client device;
assigning a first authentication level to the client device, the first authentication level allowing access to a first set of network resources;
providing access to the client device to the first set of network resources based on the first authentication level;
sending one or more programs to the client device based upon the first set of authentication data, at least one program comprising an executable logon script that configures the client device according to the logon script;
receiving a second set of authentication data from the client device after the client device has executed the one or more programs, wherein the second set of authentication data comprises user identification data associated with a user of the client device; and
assigning a second authentication level to the client device, the second authentication level providing access to the second set of network resources, wherein providing access to the client device to the second set of network resources corresponding to the second authentication level, comprises;
if the second set of authentication data is valid, the second authentication level is greater than the first authentication level and the second set of network resources comprises at least one additional resource in addition to the first set of network resources; and
if the second set of authentication data is not valid, such that the user identification data is not recognized, the second authentication level is less than the first authentication level and the second set of network resources comprises a subset of the first set of network resources, the subset comprising at least one resource but less than all resources of the first set of resources.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for providing access to one or more resources in a computer network, establishing a connection between a user and the computer network via at least one wireless access point, generating an authentication level for the user associated with accessing the one or more resources, sending a program to the client device, receiving authentication data from the user, and changing the authorization level of the user based upon the authentication data received from the user.
239 Citations
25 Claims
-
1. A method for accessing one or more resources in a computer network, the method comprising:
-
receiving, from a client device connected to the computer network via one or more wireless access points, a first set of authentication data transmitted automatically by the client device to access a first set of network resources, the authentication data comprising machine identification data uniquely identifying the client device; assigning a first authentication level to the client device, the first authentication level allowing access to a first set of network resources; providing access to the client device to the first set of network resources based on the first authentication level; sending one or more programs to the client device based upon the first set of authentication data, at least one program comprising an executable logon script that configures the client device according to the logon script; receiving a second set of authentication data from the client device after the client device has executed the one or more programs, wherein the second set of authentication data comprises user identification data associated with a user of the client device; and assigning a second authentication level to the client device, the second authentication level providing access to the second set of network resources, wherein providing access to the client device to the second set of network resources corresponding to the second authentication level, comprises; if the second set of authentication data is valid, the second authentication level is greater than the first authentication level and the second set of network resources comprises at least one additional resource in addition to the first set of network resources; and if the second set of authentication data is not valid, such that the user identification data is not recognized, the second authentication level is less than the first authentication level and the second set of network resources comprises a subset of the first set of network resources, the subset comprising at least one resource but less than all resources of the first set of resources. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system, comprising:
-
a processor; and a storage device readable by the computer system, embodying logic executable by the processor, the logic operable when executed on the processor to; receive, from a client device connected to a network via one or more wireless access points, a first set of authentication data transmitted automatically by the client device to access a first set of network resources, the authentication data comprising machine identification data uniquely identifying the client device; assign a first authentication level to the client device, the first authentication level allowing access to a first set of network resources; provide access to the client device to the first set of network resources based on the first authentication level; send one or more programs to the client device based upon the first set of authentication data, at least one program comprising an executable logon script that configures the client device according to the logon script; receive a second set of authentication data from the client device after the client device has executed the one or more programs, wherein the second set of authentication data comprises user identification data associated with a user of the client device; and assign a second authentication level to the client device, the second authentication level providing access to the second set of network resources, wherein providing access to the client device to the second set of network resources corresponding to the second authentication level, comprises; if the second set of authentication data is valid, the second authentication level is greater than the first authentication level and the second set of network resources comprises at least one additional resource in addition to the first set of network resources; and if the second set of authentication data is not valid, such that the user identification data is not recognized, the second authentication level is less than the first authentication level and the second set of network resources comprises a subset of the first set of network resources, the subset comprising at least one resource but less than all resources of the first set of resources. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for providing access to one or more resources in a computer network, the method comprising:
-
receiving, from a client device connected to the computer network via one or more wireless access points, machine identification data uniquely identifying the client device, the machine identification data transmitted automatically by the client device; generating an authentication level for the client device, the authentication level associated with accessing one or more resources in the computer network; sending one or more programs to the client device, at least one program comprising an executable logon script that configures the client device according to the logon script; receiving authentication data from the client device during the connection after the client device has executed the one or more programs, wherein the authentication data comprises user identification data associated with a user of the client device; and changing the authentication level of the user based upon the authentication data received during the connection, wherein; if the authentication data is valid, the authentication level is increased and the client device is allowed to access at least one additional resource in addition to the one or more resource in the computer network; and if the authentication data is not valid, such that the user identification data is not recognized, the authentication level is decreased and the client device is allowed to access at least one resource that is at least one resource less than the one or more resource in the computer network. - View Dependent Claims (17, 18, 19)
-
-
20. A computer system, comprising:
-
a processor; and a storage device readable by the computer system, embodying logic executable by the processor, the logic operable, when executed by the processor, to; receive, from a client device connected to a computer network via one or more wireless access points, machine identification data uniquely identifying the client device, the machine identification data transmitted automatically by the client device; generate an authentication level for the client device, the authentication level associated with accessing one or more resources in the computer network; send one or more programs to the client device, at least one program comprising an executable logon script that configures the client device according to the logon script; receive authentication data from the client device during the connection after the client device has executed the one or more programs, wherein the authentication data comprises user identification data associated with a user of the client device; and change the authentication level of the user based upon the authentication data received during the connection, wherein; if the authentication data is valid, the authentication level is increased and the client device is allowed to access at least one additional resource in addition to the one or more resource in the computer network; and if the authentication data is not valid, such that the user identification data is not recognized, the authentication level is decreased and the client device is allowed to access at least one resource that is at least one resource less than the one or more resource in the computer network. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification