MAPPING OF PHYSICAL AND LOGICAL COORDINATES OF USERS WITH THAT OF THE NETWORK ELEMENTS
First Claim
Patent Images
1. A method of providing security comprising:
- determining a physical coordinate of a user;
determining a physical coordinate of an asset;
determining a probability that the user and the asset are close to one another based on the physical coordinates of the user and the asset; and
,deciding whether to permit the user access to the asset based on the probability.
1 Assignment
0 Petitions
Accused Products
Abstract
Physical coordinates of a user and an asset are determined. A probability that the user and the asset are close to one another is determined based on the physical coordinates of the user and the asset. Permission for the user to access to the asset is decided based on the probability. Additionally or alternatively, logical coordinates of a user and an asset are determined. The logical coordinates of the user and the asset are compared, and permission for the user to access to the asset is decided based on the comparison.
65 Citations
21 Claims
-
1. A method of providing security comprising:
-
determining a physical coordinate of a user; determining a physical coordinate of an asset; determining a probability that the user and the asset are close to one another based on the physical coordinates of the user and the asset; and
,deciding whether to permit the user access to the asset based on the probability. - View Dependent Claims (2, 3)
-
-
4. A method providing security comprising:
-
determining a logical coordinate of a user; determining a logical coordinate of an asset; comparing the logical coordinates of the user and the asset; and
,deciding whether to permit the user access to the asset based on the comparison. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of providing security comprising:
-
setting privileges of a user; changing the privileges of the user; adding/deleting new/existing users; and
,attributing the changes in the privileges of the user and addition/deletion of users to person who made the changes.
-
-
14. A method of providing security comprising:
-
determining a physical coordinate of a user; determining a physical coordinate of an asset; determining a logical coordinate of a user; determining a logical coordinate of an asset; comparing the physical and logical coordinates of the user and the asset in various combinations; and
,deciding whether to permit the user access to the asset based on the results of the comparison. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification