Cross access login controller
First Claim
Patent Images
1. A method of controlling access to a network, the method comprising:
- via a flow controller server in communication with,a data repository, a network, a first access system associated with a first type of connection to the network, and a second access system associated with a second type of connection to the network;
causing storage of, in the data repository, a first identifying detail relating to the second type of connection;
associating the first identifying detail with a base credential relating to the first type of connection;
receiving a first request to access the network via the second access system associated with the second type of connection, the first request including a second identifying detail;
causing storage of, in the data repository, the second identifying detail; and
associating the second identifying detail with the base credential if a correlation is found between the second identifying detail and the first identifying detail; and
receiving a second request to access the network via the first access system associated with the first type of network connection, the second request including a third identifying detail;
causing storage of, in the data repository, the third identifying detail; and
associating the third identifying detail with the base credential if a correlation is found between the third identifying detail and the first identifying detail.
9 Assignments
0 Petitions
Accused Products
Abstract
A method of controlling access to a network, the method comprising storing in a data repository first identifying detail relating to a second type of connection and associating the details with respective base credential relating to a first type of connection, and granting a request to access to network via second type of connection, the request comprises a second identifying detail, if correlation is found between the second identifying detail and the first identifying detail.
13 Citations
21 Claims
-
1. A method of controlling access to a network, the method comprising:
-
via a flow controller server in communication with, a data repository, a network, a first access system associated with a first type of connection to the network, and a second access system associated with a second type of connection to the network; causing storage of, in the data repository, a first identifying detail relating to the second type of connection; associating the first identifying detail with a base credential relating to the first type of connection; receiving a first request to access the network via the second access system associated with the second type of connection, the first request including a second identifying detail; causing storage of, in the data repository, the second identifying detail; and associating the second identifying detail with the base credential if a correlation is found between the second identifying detail and the first identifying detail; and receiving a second request to access the network via the first access system associated with the first type of network connection, the second request including a third identifying detail; causing storage of, in the data repository, the third identifying detail; and associating the third identifying detail with the base credential if a correlation is found between the third identifying detail and the first identifying detail. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for controlling access to a network, the system comprising:
-
a data repository in communication with a controller, a network, a processor, a first access system associated with a first type of connection to the network, and a second system associated with a second type of connection to the network; the data repository configured to store a first identifying detail relating to the second type of connection; the processor, configured to, associate the first identifying detail with a base credential relating to the first type of connection, receive a first request to access the network via the second access system, over the second type of connection, the first request including a second identifying detail; and cause storage of the second identifying detail in the data repository; associating the second identifying detail with the base credential if a correlation is found between the second identifying detail and the first identifying detail; the controller configured to grant access to the network responsive to the first request, if a correlation is found between the second identifying detail and the first identifying detail; receive a second request to access the network via the first access system, over a first type of connection, the request including a third identifying detail; and cause storage of the third identifying detail in the data repository; associating the third identifying detail with the base credential if a correlation is found between the third identifying detail and the first identifying detail; the controller configured to grant access to the network responsive to the second request, if a correlation is found between the third identifying detail and the first identifying detail. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform a method of controlling access to a network, the method comprising:
-
via a flow controller server in communication with, a data repository, a network, a first access system associated with a first type of connection to the network, and a second access system associated with a second type of connection to the network; causing storage of, in the data repository, a first identifying detail relating to the second type of connection; associating the first identifying detail with a base credential relating to the first type of connection; receiving a first request to access the network via the second access system associated with the second type of connection, the first request including a second identifying detail; causing storage of, in the data repository, the second identifying detail; and associating the second identifying detail with the base credential if a correlation is found between the second identifying detail and the first identifying detail; and receiving a second request to access the network via the first access system associated with the first type of network connection, the second request including a third identifying detail; causing storage of, in the data repository, the third identifying detail; and associating the third identifying detail with the base credential if a correlation is found between the third identifying detail and the first identifying detail. - View Dependent Claims (20, 21)
-
Specification