Transport agnostic network access control
First Claim
1. A computer-implemented method comprising:
- assigning, at a server-side network-access-control computing system, a transport-agnostic identifier to a client-side computing device, the transport-agnostic identifier being configured to uniquely identify the client-side computing device regardless of the media-transport technologies used by the client-side computing device to access a first network;
associating the transport-agnostic identifier with access-control information stored at the server-side network-access-control computing system that is indicative of whether the client-side computing device is compliant with an access-control policy;
identifying, at the server-side network-access-control computing system, a first attempt by the client-side computing device to access the first network, the first attempt being made via a first media-transport technology that identifies the client-side computing device with a first transport-specific identifier;
receiving, at the server-side network-access-control computing system, the transport-agnostic identifier from the client-side computing device;
using, at the server-side network-access-control computing system, the transport-agnostic identifier, instead of the first transport-specific identifier, to determine whether to allow the client-side computing device to access the first network, wherein;
determining whether to allow the client-side computing device to access the first network comprises;
using the transport-agnostic identifier to retrieve the access-control information stored at the server-side network-access-control computing system;
determining, based on the access-control information, whether the client-side computing device is compliant with the access-control policy;
identifying, at the server-side network-access-control computing system, a second attempt by the client-side computing device to access the first network, the second attempt being made via a second media-transport technology that identifies the client-side computing device with a second transport-specific identifier that is different than the first transport-specific identifier;
re-receiving, at the server-side network-access-control computing system, the transport-agnostic identifier from the client-side computing device;
using, at the server-side network-access-control computing system, the transport-agnostic identifier, instead of the second transport-specific identifier, to determine whether to allow the client-side computing device to access the first network.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method may include assigning a transport-agnostic identifier to a computing device. The computer-implemented method may include identifying a first attempt by the computing device to access a first network. The first attempt may be made via a first media-transport technology that identifies the computing device with a first transport-specific identifier. The computer-implemented method may also include receiving the transport-agnostic identifier from the computing device. The computer-implemented method may further include using the transport-agnostic identifier, instead of the first transport-specific identifier, to determine whether to allow the computing device to access the first network. Various other methods, systems, and computer-readable media are also disclosed.
8 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
assigning, at a server-side network-access-control computing system, a transport-agnostic identifier to a client-side computing device, the transport-agnostic identifier being configured to uniquely identify the client-side computing device regardless of the media-transport technologies used by the client-side computing device to access a first network; associating the transport-agnostic identifier with access-control information stored at the server-side network-access-control computing system that is indicative of whether the client-side computing device is compliant with an access-control policy; identifying, at the server-side network-access-control computing system, a first attempt by the client-side computing device to access the first network, the first attempt being made via a first media-transport technology that identifies the client-side computing device with a first transport-specific identifier; receiving, at the server-side network-access-control computing system, the transport-agnostic identifier from the client-side computing device; using, at the server-side network-access-control computing system, the transport-agnostic identifier, instead of the first transport-specific identifier, to determine whether to allow the client-side computing device to access the first network, wherein; determining whether to allow the client-side computing device to access the first network comprises; using the transport-agnostic identifier to retrieve the access-control information stored at the server-side network-access-control computing system; determining, based on the access-control information, whether the client-side computing device is compliant with the access-control policy; identifying, at the server-side network-access-control computing system, a second attempt by the client-side computing device to access the first network, the second attempt being made via a second media-transport technology that identifies the client-side computing device with a second transport-specific identifier that is different than the first transport-specific identifier; re-receiving, at the server-side network-access-control computing system, the transport-agnostic identifier from the client-side computing device; using, at the server-side network-access-control computing system, the transport-agnostic identifier, instead of the second transport-specific identifier, to determine whether to allow the client-side computing device to access the first network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a control module programmed to; assign, at a server-side network-access-control computing system, a transport-agnostic identifier to a client-side computing device, the transport-agnostic identifier being configured to uniquely identify the client-side computing device regardless of the media-transport technologies used by the client-side computing device to access a first network; associate the transport-agnostic identifier with access-control information stored at the server-side network-access-control computing system that is indicative of whether the client-side computing device is compliant with an access-control policy; identify, at the server-side network-access-control computing system, a first attempt by the client-side computing device to access the first network, the first attempt being made via a first media-transport technology that identifies the client-side computing device with a first transport-specific identifier; receive, at the server-side network-access-control computing system, the transport-agnostic identifier from the client-side computing device; use, at the server-side network-access-control computing system, the transport-agnostic identifier, rather than the first transport-specific identifier, to determine whether to allow the client-side computing device to access the first network, wherein determining whether to allow the client-side computing device to access the first network comprises; using the transport-agnostic identifier to retrieve the access-control information stored at the server-side network-access-control computing system; determining, based on the access-control information, whether the client-side computing device is compliant with the access-control policy; identify, at the server-side network-access-control computing system, a second attempt by the client-side computing device to access the first network, the second attempt being made via a second media-transport technology that identifies the client-side computing device with a second transport-specific identifier that is different than the first transport-specific identifier; re-receive, at the server-side network-access-control computing system, the transport-agnostic identifier from the client-side computing device; use, at the server-side network-access-control computing system, the transport-agnostic identifier, rather than the second transport-specific identifier, to determine whether to allow the client-side computing device to access the first network; one or more hardware processors configured to execute the control module; one or more databases configured to store the access-control information and the transport-agnostic identifier. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by a client-side computing device, cause the client-side computing device to:
-
assign, at a server-side network-access-control computing system, a transport-agnostic identifier to a remote client-side computing device, the transport-agnostic identifier being configured to uniquely identify the remote client-side computing device regardless of the media-transport technologies used by the remote client-side computing device to access a first network; associate the transport-agnostic identifier with access-control information stored at the server-side network-access-control computing system that is indicative of whether the remote client-side computing device is compliant with an access-control policy; identify, at the server-side network-access-control computing system, a first attempt by the remote client-side computing device to access the first network, the first attempt being made via a first media-transport technology that identifies the remote client-side computing device with a first transport-specific identifier; receive, at the server-side network-access-control computing system, the transport-agnostic identifier from the remote client-side computing device; use, at the server-side network-access-control computing system, the transport-agnostic identifier, instead of the first transport-specific identifier, to determine whether to allow the remote client-side computing device to access the first network, wherein determining whether to allow the remote client-side computing device to access the first network comprises; using the transport-agnostic identifier to retrieve the access-control information stored at the server-side network-access-control computing system; determining, based on the access-control information, whether the remote client-side computing device is compliant with the access-control policy; identify, at the server-side network-access-control computing system, a second attempt by the remote client-side computing device to access the first network, the second attempt being made via a second media-transport technology that identifies the remote client-side computing device with a second transport-specific identifier that is different than the first transport-specific identifier; re-receive, at the server-side network-access-control computing system, the transport-agnostic identifier from the remote client-side computing device; use, at the server-side network-access-control computing system, the transport-agnostic identifier, instead of the second transport-specific identifier, to determine whether to allow the remote client-side computing device to access the first network. - View Dependent Claims (19, 20)
-
Specification