User-based network onboarding
First Claim
1. A method comprising:
- receiving user information of a user requesting access to a network with a first user device of the user;
assigning a first-level security profile to the user based on the user information of the user;
assigning a second-level security profile including first network configuration information to the first user device of the user;
providing a browser extension to the first user device and causing the first user device to install the provided browser extension in a web browser of the first user device;
after assigning the second-level security profile to the first user device, providing a network connectivity file containing the first network configuration information to the first user device and causing the first user device to load the network connectivity file into the browser extension installed in the web browser of the first user device;
enabling the first user device to access the network through the web browser using the first network configuration information included in the network connectivity file loaded into the browser extension.
4 Assignments
0 Petitions
Accused Products
Abstract
A request related to an access to a network by a first user device may be received. The user device may be included in a plurality of user devices associated with a first first-level security profile assigned to the user. An application extension to an application executing on the first user device may be accessed in response to the request related to the access. A network connectivity file may be provided to the application extension. The network connectivity file may include network configuration information for the first user device. The network configuration information may be associated with a first second-level security profile assigned to the first user device. Instructions to configure the first user device to access the network based at least in part on the network configuration information in the network connectivity file may be provided.
90 Citations
20 Claims
-
1. A method comprising:
-
receiving user information of a user requesting access to a network with a first user device of the user; assigning a first-level security profile to the user based on the user information of the user; assigning a second-level security profile including first network configuration information to the first user device of the user; providing a browser extension to the first user device and causing the first user device to install the provided browser extension in a web browser of the first user device; after assigning the second-level security profile to the first user device, providing a network connectivity file containing the first network configuration information to the first user device and causing the first user device to load the network connectivity file into the browser extension installed in the web browser of the first user device; enabling the first user device to access the network through the web browser using the first network configuration information included in the network connectivity file loaded into the browser extension. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more processors; memory storing instructions, when executed by the one or more processors, configured to cause the one or more processors to perform a computer-implemented method, the computer-implemented method comprising; receiving user information of a user requesting access to a network with a first user device of the user; assigning a first-level security profile to the user based on the user information of the user; assigning a second-level security profile including first network configuration information to the first user device of the user; providing a browser extension to the first user device and causing the first user device to install the provided browser extension in a web browser of the first user device; after assigning the second-level security profile to the first user device, providing a network connectivity file containing the first network configuration information to the first user device and causing the first user device to load the network connectivity file into the browser extension installed in the web browser of the first user device; enabling the first user device to access the network through the web browser using the first network configuration information included in the network connectivity file loaded into the browser extension. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification