Associating services to perimeters
First Claim
1. A method of accessing a resource, the method comprising:
- receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first enterprise perimeter associated with the internal application for accessing the server resource account and a first enterprise identifier and being configured to prevent resources external to the first enterprise perimeter from accessing resources associated with the first enterprise perimeter, and the first device includes the internal application and the resources external to the first enterprise perimeter;
wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device and associated with the cellular network access between the second device and the cellular network;
receiving, from the second device, the second enterprise identifier; and
determining whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second enterprise perimeter based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises;
comparing the first enterprise identifier to the second enterprise identifier;
when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the enterprise perimeter; and
when the first enterprise identifier does not match the second enterprise identifier, generating a separate unknown user perimeter access including resources to access an enterprise service.
4 Assignments
0 Petitions
Accused Products
Abstract
In some implementations, a method includes receiving, from a user of a first device, a request to enable access, through a second device, to a server resource account of an enterprise. The first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource. A request is wirelessly transmit, to the second device, to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device. Whether to grant access to the internal resource is determined based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device.
-
Citations
20 Claims
-
1. A method of accessing a resource, the method comprising:
-
receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first enterprise perimeter associated with the internal application for accessing the server resource account and a first enterprise identifier and being configured to prevent resources external to the first enterprise perimeter from accessing resources associated with the first enterprise perimeter, and the first device includes the internal application and the resources external to the first enterprise perimeter; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device and associated with the cellular network access between the second device and the cellular network; receiving, from the second device, the second enterprise identifier; and determining whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second enterprise perimeter based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises; comparing the first enterprise identifier to the second enterprise identifier; when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the enterprise perimeter; and when the first enterprise identifier does not match the second enterprise identifier, generating a separate unknown user perimeter access including resources to access an enterprise service. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A mobile device, comprising:
one or more processors operable to; receiving, by the mobile device, from an internal application executing on the mobile device, a request to enable the mobile device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the mobile device includes a first enterprise perimeter associated with the internal application for accessing the server resource account and a first enterprise identifier and being configured to prevent resources external to the first enterprise perimeter from accessing resources associated with the first enterprise perimeter, and the mobile device includes the internal application and the resources external to the first enterprise perimeter; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device and associated with the cellular network access between the second device and the cellular network; receiving, from the second device, the second enterprise identifier and determining whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second enterprise perimeter based on a first enterprise identifier assigned to the mobile device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises; comparing the first enterprise identifier to the second enterprise identifier; when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the enterprise perimeter; and when the first enterprise identifier does not match the second enterprise identifier, generating a separate unknown user perimeter access including resources to access an enterprise service. - View Dependent Claims (7, 8, 9, 10)
-
11. A computer program product encoded on a tangible, non-transitory storage medium, the product comprising computer readable instructions for causing one or more processors to perform operations comprising:
-
receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first enterprise perimeter associated with the internal application for accessing the server resource account and a first enterprise identifier and being configured to prevent resources external to the first enterprise perimeter from accessing resources associated with the first enterprise perimeter, and the first device includes the internal application and the resources external to the first enterprise perimeter; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device and associated with the cellular network access between the second device and the cellular network; receiving, from the second device, the second enterprise identifier; and determining whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second enterprise perimeter based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises; comparing the first enterprise identifier to the second enterprise identifier; when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the enterprise perimeter; and when the first enterprise identifier does not match the second enterprise identifier, generating a separate unknown user perimeter access including resources to access an enterprise service. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system, comprising:
-
a first mobile device configured to receive, from an internal application executing on the first mobile device, a request to enable access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first mobile device includes a first enterprise perimeter associated with the internal application for accessing the server resource account and a first enterprise identifier and configured to prevent resources external to the first enterprise perimeter from accessing resources associated with the first enterprise perimeter, and the first device includes the internal application and the resources external to the first enterprise perimeter, wirelessly transmit a request to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device and associated with the cellular network access between the second device and the cellular network, receive, from the second device, the second enterprise identifier; and
determine whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second enterprise perimeter based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, where the determination of whether to grant access comprises;comparing the first enterprise identifier to the second enterprise identifier; when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the enterprise perimeter; and when the first enterprise identifier does not match the second enterprise identifier, generating a separate unknown user perimeter access including resources to access an enterprise service; and the second device configured to connect the first mobile device to the cellular network. - View Dependent Claims (17, 18, 19, 20)
-
Specification