Resource Identifier Based Access Control in an Enterprise Network
First Claim
Patent Images
1. A method for use in controlling access to an enterprise network of a communication system, the method comprising the steps of:
- temporarily activating an entry in an authentication database of the enterprise network responsive to generation of an alarm by a corresponding product that is part of a set of internal resources of the enterprise network;
supplying a resource identifier based on the activated entry to an external service provider associated with the product; and
granting the external service provider access to the product responsive to submission of the resource identifier by the service provider.
23 Assignments
0 Petitions
Accused Products
Abstract
An entry in an authentication database of an enterprise network is activated responsive to generation of an alarm by a corresponding product that is part of a set of internal resources of the enterprise network. A dynamic URL or other resource identifier based on the activated entry is supplied to an external service provider associated with the product. The external service provider is granted access to the product responsive to submission of the resource identifier by the service provider.
-
Citations
20 Claims
-
1. A method for use in controlling access to an enterprise network of a communication system, the method comprising the steps of:
-
temporarily activating an entry in an authentication database of the enterprise network responsive to generation of an alarm by a corresponding product that is part of a set of internal resources of the enterprise network; supplying a resource identifier based on the activated entry to an external service provider associated with the product; and granting the external service provider access to the product responsive to submission of the resource identifier by the service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus for use in a communication system, the apparatus comprising:
-
at least one processing element comprising a processor coupled to a memory, the processing element being operative to temporarily activate an entry in an authentication database of the enterprise network responsive to generation of an alarm by a corresponding product that is part of a set of internal resources of the enterprise network; wherein a resource identifier based on the activated entry is supplied to an external service provider associated with the product; and wherein the external service provider is granted access to the product responsive to submission of the resource identifier by the service provider. - View Dependent Claims (18, 19)
-
-
20. A system comprising:
-
an enterprise network comprising a set of internal resources including at least one product; and a service provider external to the enterprise network; wherein at least one processing element associated with the enterprise network is operative to temporarily activate an entry in an authentication database of the enterprise network responsive to generation of an alarm by the product; wherein a resource identifier based on the activated entry is supplied to the external service provider; and wherein the external service provider is granted access to the product responsive to submission of the resource identifier by the service provider.
-
Specification