| CPC H04L 63/0876 (2013.01) [H04L 63/0853 (2013.01); H04W 12/06 (2013.01); H04W 12/72 (2021.01)] | 20 Claims |

|
1. A method performed at an electronic device, the method comprising:
(a) when the electronic device is unable to communicate with a server:
(i) allowing a management device to be coupled to the electronic device via a management interface of the electronic device;
(ii) establishing an aggregated tunnel with the server through the management device using an identity of the management device;
(iii) sending, with identity information, a request for a configuration to the server through the aggregated tunnel via the management device;
(iv) after the request is received with the identity information by the server, receiving the configuration from the server through the aggregated tunnel via the management device;
(v) authenticating the configuration whether the configuration is valid or not; and
(vi) when the configuration is valid, configuring the electronic device with the configuration via the management device;
(b) after configuring the electronic device with the configuration, starting to send and receive data with the server;
wherein:
the aggregated tunnel is established by aggregating a plurality of connections established between the management device and the server;
the configuration is sent by the server according to the identity information;
the identity information is based on one of: the identity of the management device or an identity of the electronic device;
the management device is coupled to the electronic device through one of: a wired connection or a wireless connection;
the management device comprises a help button to diagnose the electronic device;
the management device is configured to diagnose the electronic device to detect problems of the electronic device when the help button of the management device is used;
the configuration comprises authentication information for authentication;
the configuration is authenticated by extracting contents of the configuration with the electronic device by using a password with the authentication information; and
the configuration is valid if the password is able to extract the contents of the configuration.
|