Seamless location aware network connectivity
First Claim
1. A method performed on a computing device that includes at least one processor and memory, the method comprising:
- intercepting, by the computing device from a client endpoint device of a user, an outgoing communication directed to a destination network;
determining, by the computing device based on a location of the client endpoint device and on a location of the destination network, access methods that are each configured for establishing a connection between the client endpoint device and the destination network on behalf of the user;
establishing, by the computing device via a first of the access methods, the connection between the client endpoint device and the destination network on behalf of the user; and
verifying, by the computing device, the connection between the client endpoint device and the destination network.
2 Assignments
0 Petitions
Accused Products
Abstract
Described is a technology by which a seamless automatic connection to an (e.g., corporate) network is made for a client device. Upon detecting a need for a connection to a network, such as by intercepting a communication directed towards a network destination, a list of available connection methods is automatically obtained based on the device'"'"'s current location data (e.g., LAN or remote) and policy information. An available connection method from the list is selected, e.g., in order, and an attempt is made to establish a connection via that connection method. If the attempt fails, another attempt is made with a different connection method, and so on, until a connection method succeeds. Additional seamlessness from the user'"'"'s perspective is provided via a credentials vault, by which stored credentials may be retrieved and used in association with the access method being attempted.
19 Citations
20 Claims
-
1. A method performed on a computing device that includes at least one processor and memory, the method comprising:
-
intercepting, by the computing device from a client endpoint device of a user, an outgoing communication directed to a destination network; determining, by the computing device based on a location of the client endpoint device and on a location of the destination network, access methods that are each configured for establishing a connection between the client endpoint device and the destination network on behalf of the user; establishing, by the computing device via a first of the access methods, the connection between the client endpoint device and the destination network on behalf of the user; and verifying, by the computing device, the connection between the client endpoint device and the destination network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one computer storage device comprising computer-executable instructions that, based on by a computing device that includes at least one processor and memory, configure the computing device to perform actions comprising:
-
intercepting, by the computing device from a client endpoint device of a user, an outgoing communication directed to a destination network; determining, by the computing device based on a location of the client endpoint device and on a location of the destination network, access methods that are each configured to establish a connection between the client endpoint device and the destination network on behalf of the user; establishing, by the computing device via a first of the access methods, the connection between the client endpoint device and the destination network on behalf of the user; and verifying, by the computing device in response to the attempting succeeding or, the connection between the client endpoint device and the destination network. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device comprising:
-
at least one processor; memory coupled to the at least ne processor; a communication interceptor mechanism implemented at least in part by the at least one processor and configured to intercept, from a client endpoint device of a user, an outgoing communication directed to a destination network; a policy advisor implemented at least in part by the at least one processor and configured to determine obtaining, based on a location of the client endpoint device and on a location of the destination network, access methods that are each configured to establish a connection between the client endpoint device and the destination network on behalf of the user; a connectivity establisher mechanism implemented at least in part by the at least one processor and configured to establish, via a first of the access methods, the connection between the client endpoint device and the destination network on behalf of the user; and the connectivity establisher mechanism further configured to verify the connection between the client endpoint device and the destination network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification