Native application hotspot
First Claim
1. A method comprising:
- by a computing device, detecting interception, by a default network resource, of data sent to a communication network;
by the computing device, in response to the detected interception of data, determining that the communication network is administered by a particular domain associated with an application of the computing device;
by the computing device, automatically generating a request to access the communication network that identifies a network resource of the particular domain in response to the determination that the communication network is administered by the particular domain associated with the application of the computing device, the network resource of the particular domain being configured to authenticate a user to the particular domain of the communication network; and
by the computing device, redirecting the request from the default network resource to the network resource of the particular domain.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes detecting interception of data sent by the computing device to a first network resource through a communication network. The first network resource corresponds to a particular domain of the communication network. The method also includes determining whether the communication network is administered by the particular domain; and automatically generating a request to access the communication network that identifies a second network resource based at least in part on the determination. The second network resource is configured to authenticate a user to the particular domain of the communication network. The method also includes sending the request to the second network resource to access the communication network.
-
Citations
24 Claims
-
1. A method comprising:
-
by a computing device, detecting interception, by a default network resource, of data sent to a communication network; by the computing device, in response to the detected interception of data, determining that the communication network is administered by a particular domain associated with an application of the computing device; by the computing device, automatically generating a request to access the communication network that identifies a network resource of the particular domain in response to the determination that the communication network is administered by the particular domain associated with the application of the computing device, the network resource of the particular domain being configured to authenticate a user to the particular domain of the communication network; and by the computing device, redirecting the request from the default network resource to the network resource of the particular domain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more computer-readable non-transitory storage media embodying software configured when executed to:
-
detect interception, by a default network resource, of data sent to a communication network; in response to the detected interception of data, determine that the communication network is administered by a particular domain associated with an application of a computing device; automatically generate a request to access the communication network that identifies a network resource of the particular domain in response to determining that the communication network is administered by the particular domain associated with the application of the computing device, the network resource of the particular domain being configured to authenticate a user to the particular domain of the communication network; and redirect the request from the default network resource to the network resource of the particular domain. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A device comprising:
-
a processor; and one or more computer-readable non-transitory storage media coupled to the processor and embodying software that is operable when executed to; detect interception, by a default network resource, of data sent to a communication network; in response to the detected interception of data, determine that the communication network is administered by a particular domain associated with an application of the device; automatically generate a request to access the communication network that identifies a network resource of the particular domain in response to determining that the communication network is administered by the particular domain associated with the application of the device, the network resource of the particular domain being configured to authenticate a user to the particular domain of the communication network; and redirect the request from the default network resource to the network resource of the particular domain. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification