×

Associating services to perimeters

  • US 9,161,226 B2
  • Filed: 10/17/2011
  • Issued: 10/13/2015
  • Est. Priority Date: 10/17/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of accessing a resource, the method comprising:

  • receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first enterprise perimeter associated with the internal application for accessing the server resource account and a first enterprise identifier and being configured to prevent resources external to the first enterprise perimeter from accessing resources associated with the first enterprise perimeter, and the first device includes the internal application and the resources external to the first enterprise perimeter;

    wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device and associated with the cellular network access between the second device and the cellular network;

    receiving, from the second device, the second enterprise identifier; and

    determining whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second enterprise perimeter based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises;

    comparing the first enterprise identifier to the second enterprise identifier;

    when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the enterprise perimeter; and

    when the first enterprise identifier does not match the second enterprise identifier, generating a separate unknown user perimeter access including resources to access an enterprise service.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×