Controlling access to a secure resource based on user credentials and location
First Claim
1. A method for controlling access to a protected network resource comprising the steps of:
- receiving a request for access to the protected network resource and user credentials from a user connected to a network via a network access point located within a restricted area;
checking the user credentials against predetermined user information so as to authenticate the user;
checking whether the user is recorded as being within the restricted area;
allowing the user access to the protected network resource if the user credentials are authenticated and the user is recorded as being within the restricted area;
monitoring, using a computer, the user'"'"'s network connection and on detection that the user is disconnected from the network, recording the user as not located within the restricted area.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for controlling access to a protected network resource is provided. Access is controlled as follows. User credentials received with a request from a user for access to the protected network resource are checked against predetermined user information so as to authenticate the user; The request is made via a network access point located within a restricted area. The recorded location of the user is checked to determine whether the user is recorded as being within the restricted area. Access to the protected network resource is allowed if the user credentials are authenticated and the user is recorded as being within the restricted area. The user'"'"'s network connection is monitored and, on detection that the user is disconnected from the network, the user is recorded as not located within the restricted area. Additional credentials are required from the user to support the user'"'"'s request when the user is not recorded as being within the restricted area.
20 Citations
21 Claims
-
1. A method for controlling access to a protected network resource comprising the steps of:
-
receiving a request for access to the protected network resource and user credentials from a user connected to a network via a network access point located within a restricted area; checking the user credentials against predetermined user information so as to authenticate the user; checking whether the user is recorded as being within the restricted area; allowing the user access to the protected network resource if the user credentials are authenticated and the user is recorded as being within the restricted area; monitoring, using a computer, the user'"'"'s network connection and on detection that the user is disconnected from the network, recording the user as not located within the restricted area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 16)
-
-
10. An access controller for controlling access to a protected network resource in which the access controller is arranged for connection to a network access point located within a restricted area;
-
in which the access controller is arranged to receive a request for access to the protected network resource and user credentials from a user connected to a network via the network access point; in which the access controller is arranged to check the user credentials against predetermined user information so as to authenticate the user and to check information from a restricted area access control system as to whether the user is recorded as being within the restricted area; in which the access controller is arranged to allow the user access to the protected network resource if the user credentials are authenticated and the user is recorded as being within the restricted area; in which the access controller is arranged to monitor the user'"'"'s network connection and on detecting disconnection of the user from the network, the access controller is arranged to record the user as not located within the restricted area. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
17. A system configured to control access to a protected network resource in which the system is arranged for connection to a network access point located within a restricted area, the system comprising:
a computer configured to; receive a request for access to the protected network resource and user credentials from a user connected to a network via the network access point; check the user credentials against predetermined user information so as to authenticate the user and check information from a restricted area access control system as to whether the user is recorded as being within the restricted area; allow the user access to the protected network resource if the user credentials are authenticated and the user is recorded as being within the restricted area; monitor the user'"'"'s network connection; and on detecting disconnection of the user from the network, record the user as not located within the restricted area. - View Dependent Claims (18, 19, 20, 21)
Specification