Provisioned configuration for automatic wireless connection
First Claim
Patent Images
1. A method for provisioned configuration of a wireless device, the method comprising:
- authenticating a user of the wireless device at an authentication server;
identifying a set of parameters and policies associated with the user and the wireless device, the set of parameters and policies identified from a provisioned configuration database in memory that stores a plurality of parameters and policies;
generating an executable application based on authentication information regarding the user and provided by the wireless device, the generated executable application being executable to install the identified set of parameters and policies, wherein the executable application is generated through execution of an application generation module stored in memory at the authentication server;
transferring the executable application from the authentication server to the wireless device, wherein execution of the executable application by the wireless device configures the wireless device for access to a restricted wireless network, wherein the configuration includes installing at the wireless device the identified set of parameters and policies governing access by the user and the wireless device to the restricted wireless network; and
restricting access of the wireless device to the restricted wireless network at the authentication server, wherein access to the restricted wireless network is allowed based on at least the set of parameters and policies installed on the wireless device as a part of the wireless device configuration by the executable application.
13 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for provisioned configuration of wireless devices to allow access to restricted wireless networks are provided. Using an open wireless or wired network, a user of a wireless device may be authenticated. A configuration application, which includes the parameters and policies of the provisioned configuration, is generated, transferred to, and executed on the wireless device. Following configuration by the application, the wireless device is allowed to access the restricted wireless network within the parameters and policies of the provisioned configuration.
-
Citations
28 Claims
-
1. A method for provisioned configuration of a wireless device, the method comprising:
-
authenticating a user of the wireless device at an authentication server; identifying a set of parameters and policies associated with the user and the wireless device, the set of parameters and policies identified from a provisioned configuration database in memory that stores a plurality of parameters and policies; generating an executable application based on authentication information regarding the user and provided by the wireless device, the generated executable application being executable to install the identified set of parameters and policies, wherein the executable application is generated through execution of an application generation module stored in memory at the authentication server; transferring the executable application from the authentication server to the wireless device, wherein execution of the executable application by the wireless device configures the wireless device for access to a restricted wireless network, wherein the configuration includes installing at the wireless device the identified set of parameters and policies governing access by the user and the wireless device to the restricted wireless network; and restricting access of the wireless device to the restricted wireless network at the authentication server, wherein access to the restricted wireless network is allowed based on at least the set of parameters and policies installed on the wireless device as a part of the wireless device configuration by the executable application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for provisioned configuration of a wireless device, the system comprising:
-
an authentication module stored in memory and executable by a processor to authenticate a user of the wireless device; a provisioned configuration database stored in memory and including a provisioned configuration for the wireless device, the provisioned configuration based on at least authentication information identified by the execution of the authentication module, wherein the provisioned configuration includes parameters and policies for installation in the wireless device, the parameters and policies governing access to a restricted wireless network; and an application generation module stored in memory at an authentication server and executable by the processor to; identify a set of parameters and policies associated with the user and the wireless device, the set of parameters and policies identified from the provisioned configuration database; generate an executable application for the wireless device based on authentication information regarding the user and provided by the wireless device, the executable application being executable by the wireless device to configure the wireless device for access to the restricted wireless network based on at least the provisioned configuration, wherein the configuration includes installing at the wireless device the identified set of parameters and policies governing access by the user and the wireless device to the restricted wireless network, wherein access to the restricted wireless network is allowed based on at least the set of parameters and policies. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a computer processor to perform a method for provisioned configuration of a wireless device, the method comprising:
-
authenticating a user of the wireless device; identifying a set of parameters and policies associated with the user and the wireless device, the set of parameters and policies identified from a provisioned configuration database in memory that stores a plurality of parameters and policies; generating an executable application based on authentication information regarding the user and provided by the wireless device, the generated executable application being executable to install the identified set of parameters and policies, wherein the executable application is generated through execution of an application generation module stored in memory at the authentication server; transferring the executable application to the wireless device, wherein execution of the executable application by the wireless device configures the wireless device for access to a restricted wireless network, wherein the configuration includes installing at the wireless device the identified set of parameters and policies governing access by the user and the wireless device to the restricted wireless network; and restricting access of the wireless device to the restricted wireless network based on at least the set of parameters and policies installed on the wireless device as a part of the wireless device configuration by the executable application.
-
Specification