Enterprise access configuration
First Claim
1. A method for configuring access from a wireless network device to an enterprise, comprising:
- retrieving a security file location from a server external to the enterprise;
retrieving a security file from a server internal to the enterprise using said security file location;
programming said security file into the wireless network device; and
forwarding any remaining security parameters to the wireless network device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a solution in which a script containing general security parameters and access policies in a file is placed on an appropriate internal server. The location of the script may then be stored on an external server. When an end-user within the organization decides to purchase a wireless network device, he may attach it to his existing computer. The computer then may retrieve the security file location from the external server, retrieve the security file from the internal server using the security file location, and program the security file into the wireless device.
7 Citations
48 Claims
-
1. A method for configuring access from a wireless network device to an enterprise, comprising:
-
retrieving a security file location from a server external to the enterprise;
retrieving a security file from a server internal to the enterprise using said security file location;
programming said security file into the wireless network device; and
forwarding any remaining security parameters to the wireless network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for accessing an enterprise from a wireless network device by using a computer, comprising:
-
retrieving a security file location from a server external to the enterprise;
retrieving a security file from a server internal to the enterprise using said security file location;
coupling the wireless network device to the computer; and
programming said security file into the wireless network device. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. An apparatus for configuring access from a wireless network device to an enterprise, comprising:
-
a security file location external server retriever;
a security file internal server retriever coupled to said security file location external server retriever;
a security file wireless network device programmer coupled to said security file internal server retriever; and
a remaining security parameters wireless network device forwarder coupled to said security file internal server retriever. - View Dependent Claims (24)
-
-
25. An apparatus for configuring access from a wireless network device to an enterprise, comprising:
-
means for retrieving a security file location from a server external to the enterprise;
means for retrieving a security file from a server internal to the enterprise using said security file location;
means for programming said security file into the wireless network device; and
means for forwarding any remaining security parameters to the wireless network device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. An apparatus for accessing an enterprise from a wireless network device by using a computer, comprising:
-
means for retrieving a security file location from a server external to the enterprise;
means for retrieving a security file from a server internal to the enterprise using said security file location;
means for coupling the wireless network device to the computer; and
means for programming said security file into the wireless network device. - View Dependent Claims (42, 43, 44, 45, 46)
-
-
47. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform a method for configuring access from a wireless network device to an enterprise, comprising:
-
retrieving a security file location from a server external to the enterprise;
retrieving a security file from a server internal to the enterprise using said security file location;
programming said security file into the wireless network device; and
forwarding any remaining security parameters to the wireless network device.
-
-
48. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform a method for accessing an enterprise from a wireless network device by using a computer, comprising:
-
retrieving a security file location from a server external to the enterprise;
retrieving a security file from a server internal to the enterprise using said security file location;
coupling the wireless network device to the computer; and
programming said security file into the wireless network device.
-
Specification