SYSTEMS AND METHODS FOR DEPLOYMENT OF MISSION PLANS USING ACCESS CONTROL TECHNOLOGIES
First Claim
1. A method for configuring a computer network, the method comprising:
- receiving first access control information input to a first network node of the computer network by a first user assigned to a first mission;
verifying that the first user has a right to have access to the computer network based on the first access control information;
granting the first user access to the computer network in response to the verifying;
obtaining first mission related information by the first network node, the first mission related information associated with the first user and at least identifying a first mission plan specifying a manner in which an assigned value for at least one first identity parameter is to be dynamically modified by at least one node of the computer network; and
configuring the first network node or a second network node of the computer network to operate in accordance with the first mission plan.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems (100) and methods (1900) for configuring a computer network (“CN”). The methods comprise: receiving Access Control Information (“ACI”) input to a first network node (101-103, 105-107) by a user assigned to a mission; verifying that the user has a right to have access to the CN (100) based on the ACI; granting the user access to CN in response to the verifying; and obtaining Mission Related Information (“MRI”) by the first network node. The MRI is associated with the user and at least identifies a first mission plan (120) specifying a manner in which an assigned value for at least one first identity parameter is to be dynamically modified by at least one node (105-107, 113, 114) of CN. Thereafter, the first network node or a second network node (105-107, 113, 114) of CN is configured to operate in accordance with the first mission plan.
-
Citations
20 Claims
-
1. A method for configuring a computer network, the method comprising:
-
receiving first access control information input to a first network node of the computer network by a first user assigned to a first mission; verifying that the first user has a right to have access to the computer network based on the first access control information; granting the first user access to the computer network in response to the verifying; obtaining first mission related information by the first network node, the first mission related information associated with the first user and at least identifying a first mission plan specifying a manner in which an assigned value for at least one first identity parameter is to be dynamically modified by at least one node of the computer network; and configuring the first network node or a second network node of the computer network to operate in accordance with the first mission plan. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer network, comprising:
a first network node operative to; receive first access control information input by a first user assigned to a first mission; verify that the first user has a right to have access to the computer network based on the first access control information; grant the first user access to the computer network in response to the verifying; obtain first mission related information by the first network node, the first mission related information associated with the first user and at least identifying a first mission plan specifying a manner in which an assigned value for at least one first identity parameter is to be dynamically modified by at least one node of the computer network; and configure the first network node or a second network node of the computer network to operate in accordance with the first mission plan. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
Specification