Device management method and system with tunnel
A device management and tunneling technology, applied in transmission systems, digital transmission systems, machine-to-machine/machine-type communication services, etc., can solve problems such as security loopholes and difficult equipment remote communication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0011] In the following description, various embodiments will be described. For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the embodiments. It will be apparent, however, to one skilled in the art that the embodiments may be practiced without the specific details.
[0012] Furthermore, well-known features may be omitted or simplified in order not to obscure the described embodiments.
[0013] Methods according to various embodiments provide remote device management in an electronic environment. In particular, various embodiments provide centralized credentials providing a system capable of instantiating proxy devices that facilitate remote connections between various computing devices and various client devices.
[0014] In some embodiments, the device management server provides a centralized credential provisioning system capable of instantiating proxy devices that facilitate remote connections b...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


