Signaling managed device presence to control security
First Claim
1. A method for securely downloading files to a managed device, the method comprising the steps of:
- selecting a managed device for interfacing with networks or devices over the Internet;
assigning a unique identification number to the device;
creating a file for the managed device on a database, wherein the file can be downloaded over the Internet to the managed device;
creating an access verification program for downloading the file, wherein the access verification program permits a user of the managed device at a remote location to access the file over the Internet by entering the unique identification number, and wherein the access verification program permits the user to download the file over the Internet for a period of time;
receiving an identification number by from the user;
verifying that the identification number received from the user is the same as the unique identification number;
permitting access to the database by the user for downloading the file for a period of time;
downloading the file from the database to the managed device; and
blocking access to the database for downloading the file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for securely downloading files from a database to a managed device that includes selecting a managed device; affixing a unique identification number to the device; creating a file for the managed device on a database, wherein the file can be downloaded over the Internet; creating an access verification program for downloading the file which permits a user of the managed device to access and download the file over the Internet for a period of time; reading the unique identification number by the user; entering the unique identification number into the access verification program by the user; verifying the unique identification number using the access verification program; permitting access to the database by the user for downloading the file for a period of time; downloading the file from the database to the managed device; and blocking access to the database for downloading the file.
27 Citations
25 Claims
-
1. A method for securely downloading files to a managed device, the method comprising the steps of:
-
selecting a managed device for interfacing with networks or devices over the Internet;
assigning a unique identification number to the device;
creating a file for the managed device on a database, wherein the file can be downloaded over the Internet to the managed device;
creating an access verification program for downloading the file, wherein the access verification program permits a user of the managed device at a remote location to access the file over the Internet by entering the unique identification number, and wherein the access verification program permits the user to download the file over the Internet for a period of time;
receiving an identification number by from the user;
verifying that the identification number received from the user is the same as the unique identification number;
permitting access to the database by the user for downloading the file for a period of time;
downloading the file from the database to the managed device; and
blocking access to the database for downloading the file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 25)
-
-
16. A method for securely downloading files to a router, the method comprising the steps of:
-
selecting a router for interfacing with networks or devices over the Internet;
assigning a unique identification number to the router;
assigning a unique password to the router;
creating a configuration file for the router on a database, wherein the configuration file can be downloaded over the Internet to the router;
creating an access verification program for downloading the configuration file, wherein the access verification program permits a user of the router at a remote location to access the configuration file over the Internet by entering the unique identification number and password, and wherein the access verification program permits the user to download the configuration file over the Internet for a period of time;
receiving an identification number and a password from the user;
verifying that the identification number and the password received from the user are the same as the unique identification number and the unique password;
permitting access to the database by the user for downloading the configuration file for a period of time;
downloading the configuration file from the database to the router; and
blocking access to the database for downloading the configuration file after the file has been downloaded or the period of time has expired. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
Specification