SWITCHING BETWEEN NETWORKS
First Claim
1. A method performed by data processing apparatus, the method comprising:
- maintaining a plurality of networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecure resources and the secure resources;
enabling a user device to create a connection with the first network that precludes access to the secure resources;
receiving a request over the first network from the user device seeking access to one or more of the secure resources;
in response to receiving the request over the first network from the user device seeking access to the one or more of the secure resources, sending a device management profile to the user device over the first network, the device management profile configured to be installed on the user device and cause the user device to switch from the connection to the first network to a connection to the second network; and
enabling the user device access to the requested one or more of the secure resources over the second network.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for switching between parallel networks. One of the methods includes maintaining a plurality of parallel networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecured resources and secured resources, enabling a user device access to connect to the first network, receiving input from the user device seeking access to one or more secured resources, in response to the received input, installing a device management profile on the user device, and causing the user device to switch from the connection to the first network to a connection to the second network.
19 Citations
30 Claims
-
1. A method performed by data processing apparatus, the method comprising:
-
maintaining a plurality of networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecure resources and the secure resources; enabling a user device to create a connection with the first network that precludes access to the secure resources; receiving a request over the first network from the user device seeking access to one or more of the secure resources; in response to receiving the request over the first network from the user device seeking access to the one or more of the secure resources, sending a device management profile to the user device over the first network, the device management profile configured to be installed on the user device and cause the user device to switch from the connection to the first network to a connection to the second network; and enabling the user device access to the requested one or more of the secure resources over the second network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer storage medium encoded with instructions that, when executed by one or more computers, cause the one or more computers to perform operations comprising:
-
maintaining a plurality of networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecure resources and the secure resources; enabling a user device to create a connection with the first network that precludes access to the secure resources; receiving a request over the first network from the user device seeking access to one or more of the secure resources; in response to receiving the request over the first network from the user device seeking access to the one or more of the secure resources, sending a device management profile to the user device over the first network, the device management profile configured to be installed on the user device and cause the user device to switch from the connection to the first network to a connection to the second network; and enabling the user device access to the requested one or more of the secure resources over the second network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; maintaining a plurality of networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecure resources and the secure resources; enabling a user device to create a connection with the first network that precludes access to the secure resources; receiving a request over the first network from the user device seeking access to one or more of the secure resources; in response to receiving the request over the first network from the user device seeking access to the one or more of the secure resources, sending a device management profile to the user device over the first network, the device management profile configured to be installed on the user device and cause the user device to switch from the connection to the first network to a connection to the second network; and enabling the user device access to the requested one or more of the secure resources over the second network. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
Specification