Network deployment techniques employing radio frequency identification (RFID)
First Claim
1. A method for facilitating connection between a network associated with an entity and a first electronic device, the method comprising:
- receiving, using an RFID (radio frequency identification) reader associated with said first electronic device, a first file from an RFID tag, said RFID tag being provided by said entity;
parsing said first file to obtain a type field, said type field indicating whether connection information for performing said connection is stored in said RFID tag or stored in a policy server on said network, said connection information including at least one of a security policy and a network configuration;
determining, based on said type field obtained from said first file, whether to further parse said first file to extract said connection information or to connect said first device to said policy server to download said connection information through a one-way channel, said one-way channel prohibiting said first electronic device from writing to said network;
obtaining, based on a result of said determining, said connection information from at least one of said first file and said policy server; and
enabling a login via said first electronic device into said network using said connection information and using a connection modality different from a wireless modality employed to receive said first file from said RFID tag,wherein said type field includes a data string providing at least a download status about said security policy, said download status indicating whether said security policy has been completely downloaded to said first electronic device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for facilitating connection between an entity'"'"'s network and a first electronic device is provided. The method includes receiving, using an RFID (radio frequency identification) reader associated with the first electronic device, a first file from an RFID tag, the RFID tag being provided by the entity. The method also includes obtaining connection information from the first file, the connection information including at least one of a security policy and network configuration. The method further includes enabling a user to attempt to log in via the first electronic device, using the connection information, into the network, wherein the log in is attempted using a different connection modality than that employed to receive the first file from the RFID tag.
-
Citations
19 Claims
-
1. A method for facilitating connection between a network associated with an entity and a first electronic device, the method comprising:
-
receiving, using an RFID (radio frequency identification) reader associated with said first electronic device, a first file from an RFID tag, said RFID tag being provided by said entity; parsing said first file to obtain a type field, said type field indicating whether connection information for performing said connection is stored in said RFID tag or stored in a policy server on said network, said connection information including at least one of a security policy and a network configuration; determining, based on said type field obtained from said first file, whether to further parse said first file to extract said connection information or to connect said first device to said policy server to download said connection information through a one-way channel, said one-way channel prohibiting said first electronic device from writing to said network; obtaining, based on a result of said determining, said connection information from at least one of said first file and said policy server; and enabling a login via said first electronic device into said network using said connection information and using a connection modality different from a wireless modality employed to receive said first file from said RFID tag, wherein said type field includes a data string providing at least a download status about said security policy, said download status indicating whether said security policy has been completely downloaded to said first electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for facilitating connection between a network associated with an entity and a first electronic device, the arrangement comprising:
-
an RFID (radio frequency identification) tag, said RFID tag being provided by said entity; an RFID reader, said RFID reader being associated with said first electronic device, said RFID reader being configured to receive a first file from said RFID tag; a deployment application program, said deployment application program executing on said first electronic device and being configured to parse said first file to obtain a type field, said type field indicating whether connection information for performing said connection is stored in said RFID tag or stored in a policy server on said network, said connection information including at least one of a security policy and a network configuration; first code for determining, based on said type field obtained from said first file, whether to further parse said first file to extract said connection information; second code for further parsing, based on a result of said determining, said first file to obtain said connection information from at least said first file; third code for enabling a login via said first electronic device into said network using said connection information and using a connection modality different from a wireless modality employed to receive said first file from said RFID tag; and circuits for performing one or more tasks associated with one or more of said deployment application program, said first code, said second code, and said third code; wherein said type field includes a data string providing a download status about said security policy, said download status indicating whether said security policy has been completely downloaded to said first electronic device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method for facilitating connection between a network associated with an entity and a first electronic device, the method comprising:
-
receiving, using an RFID (radio frequency identification) reader associated with said first electronic device, a first file from an RFID tag, said RFID tag being provided by said entity; parsing said first file, using a deployment application program, to obtain a type field, said deployment application program executing on said first electronic device, said deployment application program being configured to facilitate interaction between said first electronic device and said RFID tag, said type field indicating whether connection information for performing said connection is stored in said RFID tag or stored in a policy server on said network, said connection information including at least one of a security policy and a network configuration; identifying a first application identification (ID) for authenticating said first file; comparing said first application ID against a set of application IDs, said set of application IDs being unique identifiers associated with said entity, said set of application IDs being included in said deployment application program executing on said first electronic device; determining, based on said type field obtained from said first file, whether to further parse said first file to extract said connection information or to connect said first device to said policy server to download said connection information through a one-way channel, said one-way channel prohibiting said first electronic device from writing to said network; obtaining, based on a result of said determining, said connection information from at least one of said first file and said policy server; and enabling a login via said first electronic device into said network using said connection information and using a connection modality different from a wireless modality employed to receive said first file from said RFID tag; wherein said type field includes a data string providing at least a download status about said security policy, said download status indicating whether said security policy has been completely downloaded to said first electronic device. - View Dependent Claims (16, 17, 18, 19)
-
Specification