Switching between networks
First Claim
1. A method performed by data processing apparatus, the method comprising:
- receiving, by the data processing apparatus over a first connection with a first network that precludes access to secure resources, a request from a user device seeking access to one or more secure resources;
requesting, by the data processing apparatus, login credentials from the user device in response to receiving the request from the user device over the first connection with the first network that precludes access to secure resources seeking access to the one or more secure resources;
receiving, by the data processing apparatus, login credentials from the user device in response to requesting login credentials from the user device;
determining, by the data processing apparatus, whether the received login credentials are valid;
sending, by the data processing apparatus, a device management profile to the user device over the first connection with the first network that precludes access to secure resources in response to determining that the received login credentials are valid, the device management profile configured to be installed on the user device and cause the user device to create a new second connection with a second network that provides access to the secure resources and switch from the first connection with the first network to the new second connection with the second network; and
enabling, by the data processing apparatus, the user device access to the requested one or more secure resources over the new second connection with the second network.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for switching between parallel networks. One of the methods includes maintaining a plurality of parallel networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecured resources and secured resources, enabling a user device access to connect to the first network, receiving input from the user device seeking access to one or more secured resources, in response to the received input, installing a device management profile on the user device, and causing the user device to switch from the connection to the first network to a connection to the second network.
52 Citations
27 Claims
-
1. A method performed by data processing apparatus, the method comprising:
-
receiving, by the data processing apparatus over a first connection with a first network that precludes access to secure resources, a request from a user device seeking access to one or more secure resources; requesting, by the data processing apparatus, login credentials from the user device in response to receiving the request from the user device over the first connection with the first network that precludes access to secure resources seeking access to the one or more secure resources; receiving, by the data processing apparatus, login credentials from the user device in response to requesting login credentials from the user device; determining, by the data processing apparatus, whether the received login credentials are valid; sending, by the data processing apparatus, a device management profile to the user device over the first connection with the first network that precludes access to secure resources in response to determining that the received login credentials are valid, the device management profile configured to be installed on the user device and cause the user device to create a new second connection with a second network that provides access to the secure resources and switch from the first connection with the first network to the new second connection with the second network; and enabling, by the data processing apparatus, the user device access to the requested one or more secure resources over the new second connection with the second network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer storage medium encoded with instructions executable by one or more computers that cause the one or more computers to perform operations comprising:
-
receiving, by the one or more computers over a first connection with a first network that precludes access to secure resources, a request from a user device seeking access to one or more secure resources; requesting, by the one or more computers, login credentials from the user device in response to receiving the request from the user device over the first connection with the first network that precludes access to secure resources seeking access to the one or more secure resources; receiving, by the one or more computers, login credentials from the user device in response to requesting login credentials from the user device; determining, by the one or more computers, whether the received login credentials are valid; sending, by the one or more computers, a device management profile to the user device over the first connection with the first network that precludes access to secure resources in response to determining that the received login credentials are valid, the device management profile configured to be installed on the user device and cause the user device to create a new second connection with a second network that provides access to the secure resources and switch from the first connection with the first network to the new second connection with the second network; and enabling, by the one or more computers, the user device access to the requested one or more secure resources over the new second connection with the second network. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
one or more computers and one or more storage devices storing instructions executable by the one or more computers that cause the one or more computers to perform operations comprising; receiving, by the one or more computers over a first connection with a first network that precludes access to secure resources, a request from a user device seeking access to one or more secure resources; requesting, by the one or more computers, login credentials from the user device in response to receiving the request from the user device over the first connection with the first network that precludes access to secure resources seeking access to the one or more secure resources; receiving, by the one or more computers, login credentials from the user device in response to requesting login credentials from the user device; determining, by the one or more computers, whether the received login credentials are valid; sending, by the one or more computers, a device management profile to the user device over the first connection with the first network that precludes access to secure resources in response to determining that the received login credentials are valid, the device management profile configured to be installed on the user device and cause the user device to create a new second connection with a second network that provides access to the secure resources and switch from the first connection with the first network to the new second connection with the second network; and enabling, by the one or more computers, the user device access to the requested one or more secure resources over the new second connection with the second network. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
Specification