Switching between networks
First Claim
1. A method performed by a data processing apparatus, the method comprising:
- maintaining a plurality of networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecure resources and the secure resources;
enabling, by the data processing apparatus, a user device to create a first connection with the first network that precludes access to the secure resources;
receiving, by the data processing apparatus, a request from the user device over the first connection with the first network that precludes access to secure resources seeking access to one or more of the secure resources;
in response to receiving the request from the user device over the first connection with the first network that precludes access to secure resources seeking access to the one or more of the secure resources, sending, by the data processing apparatus, a device management profile to the user device over the first network that precludes access to secure resources, the device management profile configured to be installed on the user device and cause the user device to create a new second connection to the second network that provides access to the secure resources and switch from the first connection to the first network to the new second connection to the second network; and
enabling, by the data processing apparatus, the user device access to the requested one or more of the secure resources over the second network.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for switching between parallel networks. One of the methods includes maintaining a plurality of parallel networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecured resources and secured resources, enabling a user device access to connect to the first network, receiving input from the user device seeking access to one or more secured resources, in response to the received input, installing a device management profile on the user device, and causing the user device to switch from the connection to the first network to a connection to the second network.
53 Citations
30 Claims
-
1. A method performed by a data processing apparatus, the method comprising:
-
maintaining a plurality of networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecure resources and the secure resources; enabling, by the data processing apparatus, a user device to create a first connection with the first network that precludes access to the secure resources; receiving, by the data processing apparatus, a request from the user device over the first connection with the first network that precludes access to secure resources seeking access to one or more of the secure resources; in response to receiving the request from the user device over the first connection with the first network that precludes access to secure resources seeking access to the one or more of the secure resources, sending, by the data processing apparatus, a device management profile to the user device over the first network that precludes access to secure resources, the device management profile configured to be installed on the user device and cause the user device to create a new second connection to the second network that provides access to the secure resources and switch from the first connection to the first network to the new second connection to the second network; and enabling, by the data processing apparatus, the user device access to the requested one or more of the secure resources over the second network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer storage medium encoded with instructions executable by one or more computers that cause the one or more computers to perform operations comprising:
-
maintaining a plurality of networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecure resources and the secure resources; enabling, by the one or more computers, a user device to create a first connection with the first network that precludes access to the secure resources; receiving, by the one or more computers, a request from the user device over the first connection with the first network that precludes access to secure resources seeking access to one or more of the secure resources; in response to receiving the request from the user device over the first connection with the first network that precludes access to secure resources seeking access to the one or more of the secure resources, sending, by the one or more computers, a device management profile to the user device over the first network that precludes access to secure resources, the device management profile configured to be installed on the user device and cause the user device to create a new second connection to the second network that provides access to the secure resources and switch from the first connection to the first network to the new second connection to the second network; and enabling, by the one or more computers, the user device access to the requested one or more of the secure resources over the second network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
- one or more computers and one or more storage devices storing instructions executable by the one or more computers that cause the one or more computers to perform operations comprising;
maintaining a plurality of networks including a first network that precludes access to secure resources, and a second network that provides access both to unsecure resources and the secure resources; enabling, by the one or more computers, a user device to create a first connection with the first network that precludes access to the secure resources; receiving, by the one or more computers, a request from the user device over the first connection with the first network that precludes access to secure resources seeking access to one or more of the secure resources; in response to receiving the request from the user device over the first connection with the first network that precludes access to secure resources seeking access to the one or more of the secure resources, sending, by the one or more computers, a device management profile to the user device over the first network that precludes access to secure resources, the device management profile configured to be installed on the user device and cause the user device to create a new second connection to the second network that provides access to the secure resources and switch from the first connection to the first network to the new second connection to the second network; and enabling, by the one or more computers, the user device access to the requested one or more of the secure resources over the second network. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
- one or more computers and one or more storage devices storing instructions executable by the one or more computers that cause the one or more computers to perform operations comprising;
Specification