System and method for validating a user of an account for a wireless device
First Claim
1. A method for controlling access of a wireless device to resources provided through a private network accessed by the wireless device from a first network, the method comprising:
- receiving, at a server, a request from the wireless device requesting access to a resource, the request being received upon activation of a first icon in a graphical user interface (GUI) on a display of the wireless device, the first icon relating to the resource and the GUI providing in one screen the first icon and a second icon relating to an authentication status of the wireless device;
in response to determining, at the server, that the request for access to the resource is related to a restricted resource in the private network;
intercepting the request, at the server, and redirecting the request to an authentication server;
in response to receiving, from the authentication server, a signal indicating that the wireless device has not been authenticated to access the restricted resource;
initiating, at the server, an authentication process to request a user account and a password from the wireless device, the authentication process utilizing a two-factor authentication technique to authenticate the wireless device, the two-factor authentication technique comprising;
processing, at the server, an input stream provided from the wireless device in response to the authentication process, the input stream comprising account data and a password;
sending the input stream to the authentication server for comparison against valid account data associated with the restricted resource; and
in response to receiving, at the server, a response from the authentication server that the input stream matches the valid account data;
authenticating access for the wireless device to the restricted resource;
automatically directing the wireless device to the restricted resource in the private network; and
providing a message to the wireless device, the message causing the wireless device to update the one screen provided by the GUI to indicate through the second icon that the wireless device has been authenticated to access the restricted resource; and
in response to determining, at the server, that the wireless device previously had been authenticated to access the restricted resource, automatically providing the wireless device access to the restricted resource; and
in response to determining, at the server, that the request for access to the resource relates to a non-restricted resource accessible from the first network, automatically providing the wireless device access to the non-restricted resource.
4 Assignments
0 Petitions
Accused Products
Abstract
The disclosure provides a system and method of authenticating a user to a network. For the method, if a request for a resource initiated by the device is related to a restricted resource, then the method: redirects the request to the authentication server; initiates an authentication process at the server to request a user account and a password from the device to authenticate the device if it has not been authenticated; automatically provides the device with access to the restricted resource if the device previously had been authenticated to access the restricted resource; and provides a signal to the device indicating whether it has been authenticated to allow the device to update its graphical user interface to indicate an access status for the restricted resource. If the request relates to a non-restricted resource, then the method automatically provides the device with access to the non-restricted resource.
23 Citations
19 Claims
-
1. A method for controlling access of a wireless device to resources provided through a private network accessed by the wireless device from a first network, the method comprising:
-
receiving, at a server, a request from the wireless device requesting access to a resource, the request being received upon activation of a first icon in a graphical user interface (GUI) on a display of the wireless device, the first icon relating to the resource and the GUI providing in one screen the first icon and a second icon relating to an authentication status of the wireless device; in response to determining, at the server, that the request for access to the resource is related to a restricted resource in the private network; intercepting the request, at the server, and redirecting the request to an authentication server; in response to receiving, from the authentication server, a signal indicating that the wireless device has not been authenticated to access the restricted resource; initiating, at the server, an authentication process to request a user account and a password from the wireless device, the authentication process utilizing a two-factor authentication technique to authenticate the wireless device, the two-factor authentication technique comprising; processing, at the server, an input stream provided from the wireless device in response to the authentication process, the input stream comprising account data and a password; sending the input stream to the authentication server for comparison against valid account data associated with the restricted resource; and in response to receiving, at the server, a response from the authentication server that the input stream matches the valid account data; authenticating access for the wireless device to the restricted resource; automatically directing the wireless device to the restricted resource in the private network; and providing a message to the wireless device, the message causing the wireless device to update the one screen provided by the GUI to indicate through the second icon that the wireless device has been authenticated to access the restricted resource; and in response to determining, at the server, that the wireless device previously had been authenticated to access the restricted resource, automatically providing the wireless device access to the restricted resource; and in response to determining, at the server, that the request for access to the resource relates to a non-restricted resource accessible from the first network, automatically providing the wireless device access to the non-restricted resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 18)
-
-
9. A server for controlling access of a wireless device to resources provided through a private network accessed by the wireless device from a first network, the server comprising:
-
a microprocessor; a memory device containing instructions executable by the microprocessor to receive a request from the wireless device requesting access to a resource, the request being received upon activation of a first icon in a graphical user interface (GUI) on a display of the wireless device, the first icon relating to the resource and the GUI providing in one screen the first icon and a second icon relating to an authentication status of the wireless device; in response to determining that the request for access to the resource is related to a restricted resource in the private network; intercept the request and redirecting the request to an authentication process; in response to receiving, from the authentication server, a signal indicating that the wireless device has not been authenticated to access the restricted resource initiate the authentication process to request a user account and a password from the wireless device, the authentication process utilizing a two-factor authentication technique to authenticate the wireless device, the two-factor authentication technique comprising; process an input stream provided from the wireless device in response to the authentication process, the input stream comprising account data and a password; sending the input stream to the authentication server for comparison against valid account data associated with the restricted resource; in response to receiving a response from the authentication server that the input stream matches the valid account data;
authenticating access for the wireless device to the restricted resource;
automatically directing the wireless device to the restricted resource in the private network;
providing a message to the wireless device, the message causing the wireless device to update the one screen provided by the GUI to indicate through the second icon to indicate that the wireless device has been authenticated to access the restricted resource; andin response to determining that the wireless device previously had been authenticated to access the restricted resource, automatically provide the wireless device with access to the restricted resource; and in response to determining that the request for access to the resource relates to a non-restricted resource accessible from the first network, automatically provide the wireless device with access to the non-restricted resource. - View Dependent Claims (10, 11, 12, 13, 19)
-
-
14. A non-transitory computer readable medium storing computer readable instructions executable by a microprocessor to:
-
receive a request from a wireless device requesting access to a resource provided through a private network accessed by the wireless device from a first network request being received upon activation of a first icon in a graphical user interface (GUI) on a display of the wireless device, the first icon relating to the resource and the GUI providing in one screen the first icon and a second icon relating to an authentication status of the wireless device; in response to determining that the request for access to the resource is related to a restricted resource in the private network; intercept the request and redirecting the request to an authentication server; in response to receiving, from the authentication server, a signal indicating that the wireless device has not been authenticated to access the restricted resource, initiate an authentication process to request a user account and a password from the wireless device, the authentication process utilizing a two-factor authentication technique to authenticate the wireless device, the two-factor authentication technique comprising; processing an input stream provided from the wireless device in response to the authentication process, the input stream comprising account data and a password; sending the input stream to the authentication server for comparison against valid account data associated with the restricted resource; and in response to receiving a response from the authentication server that the input stream matches the valid account data; authenticating access for the wireless device to the restricted resource; automatically directing the wireless device to the restricted resource in the private network; and providing a message to the wireless device, the message causing the wireless device to update the one screen provided by the GUI to indicate through the second icon of the GUI to indicate that the wireless device has been authenticated status to access the restricted resource; in response to determining, at the server, that the wireless device previously had been authenticated to access the restricted resource, automatically provide the wireless device access to the restricted resource; and in response to determining, at the server, that the request for access to the resource relates to a non-restricted resource accessible from the first network, automatically provide the wireless device access to the non-restricted resource. - View Dependent Claims (15, 16, 17)
-
Specification