System and method for authorizing a portable communication device
First Claim
1. A method of authorizing a portable communication device to access a network resource, the method being performed at a network management system in communication with the portable communication device via a network, the method comprising:
- receiving, from a portable communication device via a network, a request to access a network resource;
determining, on a processor, whether the portable communication device is authorized to access the requested network resource, the determination being based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information;
if the portable communication device is authorized, allowing the portable communication device to access the network resource; and
if the portable communication device is not authorized, redirecting the portable communication device to an authentication system where the portable communication device is configured to submit authentication-related information wherein the portable communication device can be authorized to access the requested network resource, wherein redirecting the portable communication device comprises sending transmission control protocol handshake completion data to the portable communication device in response to the request to access the network resource, the transmission control protocol handshake completion data configured to appear to be from the network resource, wherein the network management system need not communicate with the network resource if the portable communication device is not authorized.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of authorizing a portable communication device to access a network resource. In an embodiment, a request to access a network resource is received from a portable communication device via a network. A processor is used to dynamically and selectively determine whether the portable communication device is authorized to access the requested network resource. The determination may be based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information. If the portable communication device is authorized, it may be allowed to access the network resource. Otherwise, it may be redirected to an authentication system where it may be enabled to submit authentication-related information so that it may be authorized to access the requested network resource.
-
Citations
20 Claims
-
1. A method of authorizing a portable communication device to access a network resource, the method being performed at a network management system in communication with the portable communication device via a network, the method comprising:
-
receiving, from a portable communication device via a network, a request to access a network resource; determining, on a processor, whether the portable communication device is authorized to access the requested network resource, the determination being based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information; if the portable communication device is authorized, allowing the portable communication device to access the network resource; and if the portable communication device is not authorized, redirecting the portable communication device to an authentication system where the portable communication device is configured to submit authentication-related information wherein the portable communication device can be authorized to access the requested network resource, wherein redirecting the portable communication device comprises sending transmission control protocol handshake completion data to the portable communication device in response to the request to access the network resource, the transmission control protocol handshake completion data configured to appear to be from the network resource, wherein the network management system need not communicate with the network resource if the portable communication device is not authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 15)
-
-
13. A computer implemented network management system configured to authorize a portable communication device to access a network resource, the system comprising:
-
a first network interface configured to receive, from a portable communication device via a network, a request to access a network resource; a first software module that, when implemented on one or more processors, is configured to determine whether the portable communication device is authorized to access the requested network resource, the determination being based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information; a second software module that, when implemented on one or more processors, is configured to allow the portable communication device to access the requested network resource if the portable communication device is authorized; a third software module that, when implemented on one or more processors, is configured to redirect the portable communication device to an authentication system where the portable communication device is configured to submit authentication-related information wherein the portable communication device can be authorized to access the requested network resource if the portable communication device is not authorized, the third software module configured to redirect the portable communication device by sending connection handshake completion data to the portable communication device in response to the request to access the network resource, the connection handshake completion data configured to appear to be from the network resource, wherein the network management system need not communicate with the network resource if the portable communication device is not authorized; and one or more processors configured to implement the first, second and third software modules. - View Dependent Claims (16, 17, 18)
-
-
14. A computer implemented network management system configured to authorize a portable communication device to access a network resource, the system comprising:
-
a first network interface configured to receive, from a portable communication device via a network, a request to access a network resource; and one or more processors configured to; determine whether the portable communication device is authorized to access the requested network resource, the determination being based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information; allow the portable communication device to access the requested network resource if the portable communication device is authorized; and redirect the portable communication device to an authentication system where the portable communication device is configured to submit authentication-related information wherein the portable communication device can be authorized to access the requested network resource if the portable communication device is not authorized, by at least sending connection handshake completion data to the portable communication device in response to the request to access the network resource, the connection handshake completion data configured to appear to be from the network resource, wherein the network management system need not communicate with the network resource if the portable communication device is not authorized. - View Dependent Claims (19, 20)
-
Specification