Controlling access to an accessible object with an online access control list
First Claim
1. A computer-implemented method, comprising operations of:
- receiving configuration data at a router that specifies a social networking service as a source for authentication according to an authentication protocol;
receiving packet data from a client device for a destination other than the social networking service;
causing software on the client device to request login for the social networking service;
transmitting to the social networking service login data responsive to the login request;
receiving an authorization code following a successful login by a user identified on an access control list (ACL); and
transmitting the packet data to the destination.
2 Assignments
0 Petitions
Accused Products
Abstract
Software on a router receives configuration data that specifies a social networking service as a source for authentication according to an authentication protocol. Subsequently, the router software receives packet data from a client device for a destination other than the social networking service. The router software causes software on the client device to display a login view for the social networking service. The router software transmits the login data entered in the login view to the social networking service. And the router software receives an authorization code following a successful login by a user identified on an access control list (ACL). Then the router software transmits the packet data to the destination.
-
Citations
18 Claims
-
1. A computer-implemented method, comprising operations of:
-
receiving configuration data at a router that specifies a social networking service as a source for authentication according to an authentication protocol; receiving packet data from a client device for a destination other than the social networking service; causing software on the client device to request login for the social networking service; transmitting to the social networking service login data responsive to the login request; receiving an authorization code following a successful login by a user identified on an access control list (ACL); and transmitting the packet data to the destination. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable storage medium persistently storing a program, wherein the program, when executed, instructs a processor to perform the following operations:
-
receive configuration data at a router that specifies a social networking service as a source for authentication according to an authentication protocol; receive packet data from a client device for a destination other than the social networking service; cause software on the client device to request login for the social networking service; transmit to the social networking service login data responsive to the login request; receive an authorization code following a successful login by a user identified on an access control list (ACL) maintained by the social networking service; and transmit the packet data to the destination. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
one or more processors; and a memory disposed in communication with the one or more processors and storing processor-executable instructions, the instructions comprising instructions to; receive configuration data at a router that specifies a social networking service as a source for authentication according to an authentication protocol; receive packet data from a client device for a destination other than the social networking service; cause software on the client device to request login for the social networking service; transmit to the social networking service login data responsive to the login request; receive an authorization code following a successful login by a user identified on an access control list (ACL) maintained by the social networking service; and transmit the packet data to the destination. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification