×

Systems and methods for deployment of mission plans using access control technologies

  • US 10,122,708 B2
  • Filed: 11/21/2013
  • Issued: 11/06/2018
  • Est. Priority Date: 11/21/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for configuring a computer network, the method comprising:

  • receiving first access control information input to a first network node of the computer network by a first user assigned to a first mission, said first access control information comprising user authentication information required for obtaining access to the first network node;

    verifying that the first user of the first network node has a right to have access to the computer network based on the first access control information;

    granting the first user access to the computer network in response to the verifying;

    obtaining first mission related information by the first network node in response to the first user being granted access to the computer network, the first mission related information associated with the first user and at least identifying a first mission plan specifying a manner in which an assigned value for at least one first identity parameter is to be dynamically modified by at least one node of the computer network;

    configuring the first network node or a second network node of the computer network to operate in accordance with the first mission plan during a first time period;

    obtaining second mission related information based on second access control information input to the first network node by a second user; and

    re-configuring the first network node or the second network node to operate in accordance with the second mission related information during a second time period, the second mission related information at least identifying a second mission plan that is different from the first mission plan;

    wherein configuration and re-configuration of the first or second network node'"'"'s mission specific operations are tied to at least one access control technique employed by the first or second network node.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×