Enterprise access configuration
First Claim
Patent Images
1. A method for configuring access from a wireless network device to an enterprise, comprising:
- retrieving a security file location from a server external to the enterprise;
retrieving a security file from a server internal to the enterprise using said security file location;
programming said security file into the wireless network device; and
forwarding any remaining security parameters to the wireless network device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a solution in which a script containing general security parameters and access policies in a file is placed on an appropriate internal server. The location of the script may then be stored on an external server. When an end-user within the organization decides to purchase a wireless network device, he may attach it to his existing computer. The computer then may retrieve the security file location from the external server, retrieve the security file from the internal server using the security file location, and program the security file into the wireless device.
5 Citations
46 Claims
-
1. A method for configuring access from a wireless network device to an enterprise, comprising:
-
retrieving a security file location from a server external to the enterprise; retrieving a security file from a server internal to the enterprise using said security file location; programming said security file into the wireless network device; and forwarding any remaining security parameters to the wireless network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for accessing an enterprise from a wireless network device by using a computer, comprising:
-
retrieving a security file location from a server external to the enterprise; retrieving a security file from a server internal to the enterprise using said security file location; coupling the wireless network device to the computer; and programming said security file into the wireless network device. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A computer system for configuring access from a wireless network device to an enterprise, comprising:
-
means for retrieving a security file location from a server external to the enterprise; means for retrieving a security file from a server internal to the enterprise using said security file location; means for programming said security file into the wireless network device; and means for forwarding any remaining security parameters to the wireless network device. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer system for accessing an enterprise from a wireless network device by, comprising:
-
means for retrieving a security file location from a server external to the enterprise; means for retrieving a security file from a server internal to the enterprise using said security file location; means for coupling the wireless network device to a computer; and means for programming said security file into the wireless network device. - View Dependent Claims (40, 41, 42, 43, 44)
-
-
45. A program storage device readable by a machine, comprising a program of instructions executable by the machine to perform a method for configuring access from a wireless network device to an enterprise, the method comprising:
-
retrieving a security file location from a server external to the enterprise; retrieving a security file from a server internal to the enterprise using said security file location; programming said security file into the wireless network device; and forwarding any remaining security parameters to the wireless network device.
-
-
46. A program storage device readable by a machine, comprising a program of instructions executable by the machine to perform a method for accessing an enterprise from a wireless network device by using a computer, the method comprising:
-
retrieving a security file location from a server external to the enterprise; retrieving a security file from a server internal to the enterprise using said security file location; coupling the wireless network device to the computer; and programming said security file into the wireless network device.
-
Specification