Controlling access to resources on a network
First Claim
Patent Images
1. A method comprising:
- receiving, in a proxy server, a request from a client device to access a remote resource, wherein the request comprises a device identifier and at least one user credential;
determining, by the proxy server, whether the device identifier and the at least one user credential are authentic;
in response to determining that the device identifier and the at least one user credential are authentic, generating, in the proxy server, a request to authorize the client device;
transmitting, from the proxy server over a network, the request to authorize the client device to a compliance server that is separate from the proxy server, the compliance server configured to determine whether the client device complies with a hardware restriction, a software restriction, and a mobile device management restriction, wherein the software restriction identifies whether the client device is permitted to have screen-capture functionality enabled;
receiving, from the compliance server, an indication of whether the client device is authorized based upon whether the client device complies with the hardware restriction, the software restriction, and the mobile device management restriction;
in response to determining, based upon the indication, that the client device is authorized to access the remote resource, associating, by the proxy server, a resource access credential for accessing the remote resource with the client device; and
providing, from the proxy server, the resource access credential to a remote device associated with the remote resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user credential to access a remote resource, the request may be authenticated according to at least one compliance policy. If the request is authenticated, a resource credential associated with the remote resource may be provided.
82 Citations
17 Claims
-
1. A method comprising:
-
receiving, in a proxy server, a request from a client device to access a remote resource, wherein the request comprises a device identifier and at least one user credential; determining, by the proxy server, whether the device identifier and the at least one user credential are authentic; in response to determining that the device identifier and the at least one user credential are authentic, generating, in the proxy server, a request to authorize the client device; transmitting, from the proxy server over a network, the request to authorize the client device to a compliance server that is separate from the proxy server, the compliance server configured to determine whether the client device complies with a hardware restriction, a software restriction, and a mobile device management restriction, wherein the software restriction identifies whether the client device is permitted to have screen-capture functionality enabled; receiving, from the compliance server, an indication of whether the client device is authorized based upon whether the client device complies with the hardware restriction, the software restriction, and the mobile device management restriction; in response to determining, based upon the indication, that the client device is authorized to access the remote resource, associating, by the proxy server, a resource access credential for accessing the remote resource with the client device; and providing, from the proxy server, the resource access credential to a remote device associated with the remote resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
a memory storage comprising a plurality of computer instructions; and a processing unit coupled to the memory storage, wherein the plurality of computer instructions, upon execution by the processing unit, cause the processing unit to at least; intercept a request for a client device to access a remote resource, wherein the request to access the remote resource comprises a device identifier and a user credential; determine whether the device identifier and the user credential are authentic; in response to determining that the device identifier and the user credential are authentic, generate a request to authorize the client device; transmit, from a proxy server over a network, the request to authorize the client device to a compliance server, the compliance server configured to determine whether the client device complies with a hardware restriction, a software restriction, and a mobile device management restriction, wherein the software restriction identifies whether the client device is permitted to have screen-capture functionality enabled; receive, from the compliance server, an indication of whether the client device is authorized based upon whether the client device complies with the hardware restriction, the software restriction, and the mobile device management restriction; in response to determining, based upon the indication, that the client device is authorized to access the remote resource, associate a resource access credential for accessing the remote resource with the client device; and providing, from the proxy server, the resource access credential to a remote device associated with the remote resource. - View Dependent Claims (13, 14)
-
-
15. A non-transitory computer-readable medium comprising a set of instructions that, when executed by a processor, causes the processor to perform a method, comprising:
-
receiving a request from a client device to access a remote resource, wherein the request comprises a device identifier and at least one user credential; determining whether the device identifier and the at least one user credential are authentic; in response to determining that the device identifier and the user credential are authentic, generate a request to authorize the client device; transmitting, from a proxy server over a network, the request to authorize the client device to a compliance server that is separate from the proxy server, the compliance server configured to determine whether the client device complies a hardware restriction, a software restriction, and a mobile device management restriction, wherein the software restriction identifies whether the client device is permitted to have screen-capture functionality enabled; receiving, from the compliance server, an indication of whether the client device is authorized based upon whether the client device complies with the hardware restriction, the software restriction, and the mobile device management restriction; in response to determining, based upon the indication, that the client device is authorized to access the remote resource, associating a resource access credential for accessing the remote resource with the client device; and providing, from the proxy server, the resource access credential to a remote device associated with the remote resource. - View Dependent Claims (16, 17)
-
Specification