Associating services to perimeters
First Claim
1. A method, comprising:
- receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first set of resources and resources external to the first set of resources, the first set of resources associated with the internal application for accessing the server resource account and a first enterprise identifier;
wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second set of resources included in the second device and associated with the cellular network access between the second device and the cellular network;
receiving, from the second device, the second enterprise identifier; and
determining whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second set of resources based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises;
comparing the first enterprise identifier to the second enterprise identifier;
when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the first set of resources; and
when the first enterprise identifier does not match the second enterprise identifier, generating a separate set of resources including resources for an unknown user to access an enterprise service.
4 Assignments
0 Petitions
Accused Products
Abstract
In some implementations, a method includes receiving, from a user of a first device, a request to enable access, through a second device, to a server resource account of an enterprise. The first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource. A request is wirelessly transmit, to the second device, to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device. Whether to grant access to the internal resource is determined based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device.
245 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first set of resources and resources external to the first set of resources, the first set of resources associated with the internal application for accessing the server resource account and a first enterprise identifier; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second set of resources included in the second device and associated with the cellular network access between the second device and the cellular network; receiving, from the second device, the second enterprise identifier; and determining whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second set of resources based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises; comparing the first enterprise identifier to the second enterprise identifier; when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the first set of resources; and when the first enterprise identifier does not match the second enterprise identifier, generating a separate set of resources including resources for an unknown user to access an enterprise service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile device, comprising:
one or more processors configured to; receive, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first set of resources and resources external to the first set of resources, the first set of resources associated with the internal application for accessing the server resource account and a first enterprise identifier; wirelessly transmit, to the second device, a request to the second device for a second enterprise identifier assigned to a second set of resources included in the second device and associated with the cellular network access between the second device and the cellular network; receive, from the second device, the second enterprise identifier; and determine whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second set of resources based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises; compare the first enterprise identifier to the second enterprise identifier; when the first enterprise identifier matches the second enterprise identifier, grant access to the internal application in the first set of resources; and when the first enterprise identifier does not match the second enterprise identifier, generate a separate set of resources including resources for an unknown user to access an enterprise service. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A computer program product encoded on a tangible, non-transitory storage medium, the product comprising computer readable instructions for causing one or more processors to perform operations comprising:
-
receiving, by a first device, from an internal application executing on the first device, a request to enable the first device to access a server resource account of an enterprise through a direct wireless connection with a second device and cellular network access between the second device and a cellular network, wherein the first device includes a first set of resources and resources external to the first set of resources, the first set of resources associated with the internal application for accessing the server resource account and a first enterprise identifier; wirelessly transmitting, to the second device, a request to the second device for a second enterprise identifier assigned to a second set of resources included in the second device and associated with the cellular network access between the second device and the cellular network; receiving, from the second device, the second enterprise identifier; and determining whether to grant access to the internal application for accessing the server resource account through the direct wireless connection with the second device and the cellular network access of the second set of resources based on a first enterprise identifier assigned to the first device and the second enterprise identifier assigned to the second device, wherein the determining whether to grant access comprises; comparing the first enterprise identifier to the second enterprise identifier; when the first enterprise identifier matches the second enterprise identifier, granting access to the internal application in the first set of resources; and when the first enterprise identifier does not match the second enterprise identifier, generating a separate set of resources including resources for an unknown user to access an enterprise service. - View Dependent Claims (18, 19, 20)
-
Specification