Method and apparatus for token-based packet prioritization
First Claim
1. An apparatus comprising a processor operable to:
- receive a request from a user of a device to access a resource;
receive a hard token comprising a device identifier that identifies the device;
receive a subject token indicating that the user is a high priority user, wherein the subject token includes a user identifier associated with the high priority user;
correlate the hard token with the subject token to indicate that the device is associated with the high priority user;
apply a token-based rule that facilitates packet prioritization in response to receiving the subject token indicating a high priority user;
check if the device is compliant to consume the resource prior to granting access to the resource, wherein compliance is checked by ensuring that the device contains one of a compliant version of firmware, a compliant operating system, and hardware compliant with a hardware requirement;
if the device is not compliant to consume the resource, deny access to the resource;
if the device is compliant to consume the resource, in response to applying the token-based rule, communicate a notification token to at least one network component, wherein the notification token includes the user identifier associated with the high priority user, the device identifier associated with the device associated with the high priority user, and instructions to prioritize any packet communications associated with the user identifier or the device identifier; and
communicate at least one token to facilitate the provisioning of a container to the device associated with the high priority user, wherein the container comprises a virtual machine associated with the device.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment, an apparatus may receive a hard token that identifies a device and a subject token indicating that a user is a high priority user. The subject token may include a user identifier associated with the high priority user. The apparatus may apply a token-based rule that facilitates packet prioritization in response to receiving the subject token. In response to applying the token-based rule, the apparatus may communicate a notification token to at least one network component. The notification token may include the user identifier associated with the high priority user, the device identifier associated with the device, and instructions to prioritize any packet communications associated with the user identifier or the device identifier. The apparatus may then communicate at least one token to facilitate the provisioning of a container to the device associated with the high priority user.
-
Citations
18 Claims
-
1. An apparatus comprising a processor operable to:
-
receive a request from a user of a device to access a resource; receive a hard token comprising a device identifier that identifies the device; receive a subject token indicating that the user is a high priority user, wherein the subject token includes a user identifier associated with the high priority user; correlate the hard token with the subject token to indicate that the device is associated with the high priority user; apply a token-based rule that facilitates packet prioritization in response to receiving the subject token indicating a high priority user; check if the device is compliant to consume the resource prior to granting access to the resource, wherein compliance is checked by ensuring that the device contains one of a compliant version of firmware, a compliant operating system, and hardware compliant with a hardware requirement; if the device is not compliant to consume the resource, deny access to the resource; if the device is compliant to consume the resource, in response to applying the token-based rule, communicate a notification token to at least one network component, wherein the notification token includes the user identifier associated with the high priority user, the device identifier associated with the device associated with the high priority user, and instructions to prioritize any packet communications associated with the user identifier or the device identifier; and communicate at least one token to facilitate the provisioning of a container to the device associated with the high priority user, wherein the container comprises a virtual machine associated with the device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for implementing token-based prioritization of packets, comprising:
-
receiving a request from a user of a device to access a resource; receiving a hard token comprising a device identifier that identifies the device; receiving a subject token indicating that the user is a high priority user, wherein the subject token includes a user identifier associated with the high priority user; correlating the hard token with the subject token to indicate that the device is associated with the high priority user; applying a token-based rule that facilitates packet prioritization in response to receiving the subject token indicating a high priority user; checking if the device is compliant to consume the resource prior to granting access to the resource, wherein compliance is checked by ensuring that the device contains one of a compliant version of firmware, a compliant operating system, and hardware compliant with a hardware requirement; if the device is not compliant to consume the resource, denying access to the resource; if the device is compliant to consume the resource, in response to applying the token-based rule, communicating a notification token to at least one network component, wherein the notification token includes the user identifier associated with the high priority user, the device identifier associated with the device associated with the high priority user, and instructions to prioritize any packet communications associated with the user identifier or the device identifier; and communicating at least one token to facilitate the provisioning of a container to the device associated with the high priority user, wherein the container comprises a virtual machine associated with the device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
receive a request from a user of a device to access a resource; receive a hard token comprising a device identifier that identifies the device; receive a subject token indicating that the user is a high priority user, wherein the subject token includes a user identifier associated with the high priority user; correlate the hard token with the subject token to indicate that the device is associated with the high priority user; apply a token-based rule that facilitates packet prioritization in response to receiving the subject token indicating a high priority user; check if the device is compliant to consume the resource prior to granting access to the resource, wherein compliance is checked by ensuring that the device contains one of a compliant version of firmware, a compliant operating system, and hardware compliant with a hardware requirement; if the device is not compliant to consume the resource, deny access to the resource; if the device is compliant to consume the resource, in response to applying the token-based rule, communicate a notification token to at least one network component, wherein the notification token includes the user identifier associated with the high priority user, the device identifier associated with the device associated with the high priority user, and instructions to prioritize any packet communications associated with the user identifier or the device identifier; and communicate at least one token to facilitate the provisioning of a container to the device associated with the high priority user, wherein the container comprises a virtual machine associated with the device. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification