User-based network onboarding
First Claim
1. A method comprising:
- receiving user information of a user requesting access to a network with a first user device of the user;
assigning a first-level security profile to the user based on the user information of the user;
assigning a first second-level security profile including first network configuration information to the first user device of the user;
configuring the first user device to access the network using the first network configuration information included in the first second-level security profile assigned to the first user device;
requesting a listing of user devices associated with the first-level security profile, the listing including a second user device of the user associated with the first-level security profile assigned to the user as part of user-based device onboarding;
presenting the listing of the user devices associated with the first-level security profile to the user;
selecting the second user device from the listing of the user devices based on input received from the user in response to presenting the listing of the user devices to the user;
assigning a second second-level security profile including second network configuration information to the second user device;
configuring the second user device to access the network using the second network configuration information included in the second second-level security profile assigned to the second user device.
4 Assignments
0 Petitions
Accused Products
Abstract
A request related to an access to a network by a first user device may be received. The user device may be included in a plurality of user devices associated with a first first-level security profile assigned to the user. An application extension to an application executing on the first user device may be accessed in response to the request related to the access. A network connectivity file may be provided to the application extension. The network connectivity file may include network configuration information for the first user device. The network configuration information may be associated with a first second-level security profile assigned to the first user device. Instructions to configure the first user device to access the network based at least in part on the network configuration information in the network connectivity file may be provided.
-
Citations
17 Claims
-
1. A method comprising:
-
receiving user information of a user requesting access to a network with a first user device of the user; assigning a first-level security profile to the user based on the user information of the user; assigning a first second-level security profile including first network configuration information to the first user device of the user; configuring the first user device to access the network using the first network configuration information included in the first second-level security profile assigned to the first user device; requesting a listing of user devices associated with the first-level security profile, the listing including a second user device of the user associated with the first-level security profile assigned to the user as part of user-based device onboarding; presenting the listing of the user devices associated with the first-level security profile to the user; selecting the second user device from the listing of the user devices based on input received from the user in response to presenting the listing of the user devices to the user; assigning a second second-level security profile including second network configuration information to the second user device; configuring the second user device to access the network using the second network configuration information included in the second second-level security profile assigned to the second user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a network access system management engine configured to receive user information of a user requesting access to a network with a first user device of the user; a first level engine configured to assign a first-level security profile to the user based on the user information of the user; a second level engine configured to assign a first second-level security profile including first network configuration information to the first user device of the user; a device network configuration engine implemented to configure the first user device to access the network using the first network configuration information included in the first second-level security profile assigned to the first user device; a web portal request engine configured to request a listing of user devices associated with the first-level security profile, the listing including a second user device of the user associated with the first-level security profile assigned to the user as part of user-based device onboarding; a device listing engine configured to present the listing of the user devices associated with the first-level security profile to the user; a device selection engine configured to select the second user device from the listing of the user devices based on input received from the user in response to presenting the listing of the user devices to the user; wherein the second level engine is further configured to assign a second second-level security profile including second network configuration information to the second user device; wherein the device network configuration engine is further implemented to configure the second user device to access the network using the second network configuration information included in the second second-level security profile assigned to the second user device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification