Claims
- 1. A normal-communications inhibitor, comprising:
an electronic device comprising a representation of data; the data comprising a program for inhibiting normal wireless communications via at least one wireless local area network between a wireless device and at least one resource, the wireless local area network being compliant with one or more of the IEEE 802.11 family of specifications; the program being configured to allow or inhibit normal communications between the wireless device and the at least one resource based on a compliance determination of whether the wireless device complies with at least one policy; the compliance determination being based on at least one structure/function determination of at least one aspect of the structure or function of the wireless device performed by a program executed on the wireless device.
- 2. The system of claim 1, wherein the at least one policy is selected from a collection of one or more candidate policies based on an identifier of an access point.
- 3. The system of claim 1, wherein the integrity of software and stored data is verified periodically.
- 4. The system of claim 1, wherein the policy contains information on required versions of the mobile unit software and stored data.
- 5. The system of claim 1, wherein the operation of software and network connections or sessions is periodically verified.
- 6. The system of claim 1 wherein the policy contains information on required versions of the mobile unit hardware.
- 7. The system of claim 1 wherein the operation of mobile unit hardware is periodically verified.
- 8. The system of claim 2 or 99 wherein the identifier of an access point or sub-network is determined from information received via an access point.
- 9. The system of claim 2 or 99 wherein the identifier of an access point or sub-network comprises at least a portion of an IP address.
- 10. The system of claim 2 or 99 wherein the identifier of an access point or sub-network comprises an ESSID.
- 11. The system of claim 1 wherein the normal communications of the mobile unit is inhibited if the mobile unit cannot be authenticated.
- 12. A configuration management system, comprising:
a client program executing on a wireless device; the client program being configured to determine a BSSID of an access point complying with one or more of the IEEE 802.11 family of specifications, through which access point the wireless device may communicate, and based on the determination, select a configuration profile from a collection of one or more configuration profiles and to configure the wireless device in accordance with the configuration profile.
- 13. The configuration management system of claim 12, further comprising:
a policy that the wireless device be configured in accord with a determinable profile; the client program being further configured to provide an indication that the wireless device is configured in accord with the profile in order to cause a normal-communications inhibitor to permit normal communications between the wireless device and at least one server program.
- 14. The system of claim 12 wherein the configuration profile for the wireless device is specific to the type of the mobile unit.
- 15. The system of claim 12 wherein the configuration profile is specific to the role of the wireless device.
- 16. The system of claim 12 wherein the configuration profile is specific to the user of the wireless device.
- 17. The system of claim 12 wherein the integrity of software and stored data is verified periodically.
- 18. The system of claim 12 wherein the configuration profile contains information on required versions of the mobile unit software and stored data.
- 19. The system of claim 12 wherein the operation software and network connections or sessions is periodically verified.
- 20. The system of claim 12 wherein the integrity of hardware is verified periodically.
- 21. The system of claim 12 wherein the configuration management profile contains information on required versions of the wireless device hardware.
- 22. The system of claim 12 wherein the operation of the wireless device hardware is periodically verified.
- 23. The system of claim 12 wherein the selected configuration profile is specified by a configuration management server.
- 24. The system of claim 13 wherein a wireless device not configured in accord with the profile are given limited access to the at least one resource.
- 25. The system of claim 12 wherein the collection of one or more configuration profiles are stored in the wireless device.
- 26. The system of claim 25 wherein the collection of one or more configuration profiles is periodically updated by communicating with one or more servers.
- 27. The system of claim 26 wherein a server authenticates the wireless device before the collection is updated.
- 28. The system of claim 26 wherein the wireless device authenticates the one or more servers before the collection is updated.
- 29. The system of claim 25 wherein the system verifies the integrity of a configuration profile prior to using the configuration profile.
- 30. The system of claim 13 wherein the collection of one or more configuration profiles is updated to include the profile required by the policy.
- 31. The system of claim 26 wherein the one or more servers can load or update software and stored data on the wireless device.
- 32. The system of claim 31 wherein a server authenticates the wireless device before software is loaded or updated.
- 33. The system of claim 32 wherein the wireless device authenticates a server before software is loaded or updated.
- 34. The system of claim 31 wherein the system verifies the integrity of loaded or updated software and stored data prior to using the loaded or updated software and stored data.
- 35. The system of claim 31 wherein a server maintains records used to ensure compliance with software license terms and conditions.
- 36. The system of claim 31 wherein software is loaded or updated on the wireless device so that it can be configured in accord with the configuration profile.
- 37. The system of claim 23 wherein two or more configuration management servers are organized in a hierarchy.
- 38. The system of claim 37 wherein the configuration management policies from a higher level in the hierarchy can be modified at lower levels.
- 39. The system of claim 37 wherein new configuration management policies can be created on servers at any level in the hierarchy.
- 40. The system of claims 37 wherein configuration management policies set at a higher level in the hierarchy cannot be modified at lower levels in the hierarchy.
- 41. The system of claim 12 wherein a user of the wireless device can create and modify one or more configuration profiles for the wireless device.
- 42. The system of claim 23 wherein the selected configuration profile cannot be modified by users of the wireless device.
- 43. The system of claim 13 wherein the normal communications of the mobile unit is inhibited if the mobile unit cannot be authenticated.
- 44. The system of claim 26 wherein the configuration profile server also manages the configurations of access points.
- 45 The system of claim 26 wherein the configuration profile server also manages the configurations of other network infrastructure devices.
- 46. A normal-communications inhibitor, comprising:
an electronic device comprising a representation of data; the data comprising a program for inhibiting normal wireless communications via at least one wireless local area network between a wireless device and at least one resource, the wireless area network being compliant with one or more of the IEEE 802.11 family of specifications; the program being configured to allow or inhibit normal communications between the wireless device and the at least one resource based on the existence of data representing a policy corresponding to an identifier of an access point or sub-network.
- 47. A system for the enforcement of configurations of mobile units, comprising
a configuration management software client on the mobile units, one or more servers for controlling the hardware, software and stored data configurations on the mobile units, one or more sub-networks connected to the one or more servers, one or more configuration profiles specific to some of the one or more of the sub-networks on which the mobile units can roam, one or more wireless access points connected to each of the one or more sub-networks and capable of communicating with the mobile units.
- 48. The system of claim 47 wherein the one or more configuration profile for the mobile unit is specific to the type of the mobile unit.
- 49. The system of claim 47 wherein the one or more configuration profile is specific to the role of the mobile unit.
- 50. The system of claim 47 wherein the one or more configuration profile is specific to the user of the mobile unit.
- 51. The system of claim 47 wherein mobile unit software and stored data configurations are under configuration management.
- 52. The system of claim 51 wherein the integrity of software and stored data is verified periodically.
- 53. The system of claim 51 wherein the one or more configuration profile contains information on required versions of the mobile unit software and stored data.
- 54. The system of claim 51 wherein the operation software and network connections or sessions is periodically verified.
- 55. The system of claim 47 wherein mobile unit hardware configurations are under configuration management.
- 56. The system of claim 47 wherein the integrity of hardware is verified periodically.
- 57. The system of claim 47 wherein the one or more configuration profile contains information on required versions of the mobile unit hardware.
- 58. The system of claim 47 wherein the operation of mobile unit hardware is periodically verified.
- 59. The system of claim 47 wherein a configuration management server determines the profile to be used by the access point the mobile unit associates with.
- 60. The system of claim 47 wherein the client on the mobile unit determines the identity of the sub-network from information received via the access points.
- 61. The system of claim 60 wherein the sub-network identifier is the IP sub-network address mask.
- 62. The system of claim 60 wherein the sub-network is identified by the ESSID as specified in the IEEE 802.11 family of protocols
- 63. The system of claim 47 wherein mobile units not able to meet the configuration management requirements for a particular sub-network are not allowed to associate with that sub-network.
- 64. The system of claim 47 wherein mobile units not able to meet the configuration management requirements for a particular sub-network are given limited access to the applications, data, connections and services on that sub-network.
- 65. The system of claim 47 wherein one or more configuration profiles are stored in the mobile unit and are invoked when the mobile unit roams to a specific sub-network of the one or more sub-networks.
- 66. The system of claim 65 wherein the one or more configuration profiles are periodically synchronized between the one or more servers and each mobile unit.
- 67. The system of claim 66 wherein a server authenticates the mobile unit before the one or more configuration profiles are synchronized.
- 68. The system of claim 66 wherein the mobile unit authenticates a server before the one or more configuration profiles are synchronized.
- 69. The system of claim 66 wherein the system verifies the integrity of loaded one or more configuration profiles prior to their use.
- 70. The system of claim 66 wherein one or more configuration profiles are loaded or updated on the mobile unit so that the profile required for a sub-network become available.
- 71. The system of claim 47 wherein the one or more servers can update software and stored data on the mobile units
- 72. The system of claim 71 wherein a server authenticates the mobile unit before software is loaded.
- 73. The system of claim 71 wherein the mobile unit authenticates a server before software is loaded.
- 74. The system of claim 71 wherein the system verifies the integrity of loaded software and stored data prior to its use.
- 75. The system of claim 71 wherein the server maintains records used to ensure compliance with software license terms and conditions.
- 76. The system of claim 71 wherein software is loaded or updated on the mobile unit so that it can meet the configuration management requirements for a particular sub-network.
- 77. The system of claim 47 wherein two or more configuration management servers are organized in a hierarchy.
- 78. The system of claim 77 wherein the configuration management policies from a higher level in the hierarchy can be modified at lower levels.
- 79. The system of claim 77 wherein new configuration management policies can be created on servers at any level in the hierarchy.
- 80. The system of claims 78 or 79 wherein configuration management policies set at a higher level in the hierarchy cannot be modified at lower levels in the hierarchy.
- 81. The system of claim 46 wherein users of individual mobile units can create and modify the one or more configuration profiles for their mobile unit.
- 82. The system of claim 81 wherein the configuration management policies set by the one or more servers cannot be modified by users.
- 83. The system of claim 47 wherein the wireless network uses radio frequency signals.
- 84. The system of claim 83 wherein the wireless local area network conforms to the IEEE 802.11 family of specifications.
- 85. The system of claim 83 wherein the wireless local area network conforms to the specifications promulgated by the Bluetooth SIG, Inc.
- 86. The system of claim 12, 46, or 47 wherein the configuration profile comprises security information, the security information further comprising one or more master keys, pre-shared keys, tokens, and/or certificates.
- 87. The system of claim 12, 46, or 47 wherein the configuration profile comprises radio information, the radio information further comprising one or more country codes, transmit signal strength indications, and/or channel indications.
- 88. The system of claim 12, 46, or 47 wherein the configuration profile comprises hardware information, the hardware information further comprising one or more operating system indications, and/or network interface indications.
- 89. The system of claim 12, 46, or 47 wherein the configuration profile comprises software information, the software information further comprising one or more network interface firmware indications, applications software indications, network interface driver indications, protocol enable/disable indications, anti-virus software indications, virtual private network indications, file sharing indications, and/or printer sharing indications.
- 90. The system of claim 59 or 60 wherein the normal communications of the mobile unit is inhibited if the mobile unit cannot be authenticated.
- 91. The system of claim 47 wherein the configuration profile server also manages the configurations of access points.
- 92. The system of claim 47 wherein the configuration profile server also manages the configurations of other network infrastructure devices.
- 93. The system of claim 47 wherein the access points are adapted to authenticate the mobile units.
- 94. The system of claim 47 wherein the access points are adapted to act as proxy servers for one or more security servers.
- 95. The system of claim, 1 wherein the policy comprises security information, the security information further comprising one or more master keys, pre-shared keys, tokens, and/or certificates.
- 96. The system of claim, 1 wherein the policy comprises radio information, the radio information further comprising one or more country codes, transmit signal strength indications, and/or channel indications.
- 97. The system of claim, 1 wherein the policy comprises hardware information, the hardware information further comprising one or more operating system indications, and/or network interface indications.
- 98. The system of claim, 1 wherein the policy comprises software information, the software information further comprising one or more network interface firmware indications, applications software indications, network interface driver indications, protocol enable/disable indications, anti-virus software indications, virtual private network indications, file sharing indications, and/or printer sharing indications.
- 99. The system of claim 1, wherein the at least one policy is selected from a collection of one or more candidate policies based on an identifier of a sub-network.
Parent Case Info
[0001] This application is a continuation-in-part of U.S. patent application Ser. No. 10/215,701 entitled Mobile Unit Configuration Management for WLANS, filed Aug. 9, 2002, which is hereby incorporated by reference in its entirety for each of its teachings and embodiments.
Continuation in Parts (1)
|
Number |
Date |
Country |
| Parent |
10215701 |
Aug 2002 |
US |
| Child |
10252849 |
Sep 2002 |
US |