Alarm-driven access control in an enterprise network
First Claim
1. An apparatus for use in a communication system, the apparatus comprising:
- at least one processing element comprising a processor coupled to a memory, the processing element implementing an alarm access controller operative to control access to an enterprise network of the system;
wherein the alarm access controller is configured to receive an alarm from a product that is part of a set of internal resources of the enterprise network, to identify an external service provider for handling the alarm, and to provide temporary authenticated access of the service provider to the product.
25 Assignments
0 Petitions
Accused Products
Abstract
An alarm access controller is operative to control access to an enterprise network of a communication system responsive to alarms generated by products that are part of a set of internal resources of the enterprise network. In one aspect, the alarm access controller is implemented by a server or other processing element comprising a processor coupled to a memory. The alarm access controller is configured to receive an alarm from one of the products, to identify an external service provider for handling the alarm, and to provide temporary authenticated access of the service provider to the product. By limiting service provider access to an alarm-generating product in accordance with specified time periods or other conditions determined based at least in part on the alarm itself, system security is considerably improved and access control is made more flexible and efficient.
-
Citations
22 Claims
-
1. An apparatus for use in a communication system, the apparatus comprising:
-
at least one processing element comprising a processor coupled to a memory, the processing element implementing an alarm access controller operative to control access to an enterprise network of the system; wherein the alarm access controller is configured to receive an alarm from a product that is part of a set of internal resources of the enterprise network, to identify an external service provider for handling the alarm, and to provide temporary authenticated access of the service provider to the product. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
an enterprise network comprising a set of internal resources including at least one product; and an alarm access controller operative to control access to the enterprise network; wherein the alarm access controller is configured to receive an alarm from the product, to identify an external service provider for handling the alarm, and to provide temporary authenticated access of the service provider to the product.
-
-
19. A method for use in controlling access to an enterprise network of a communication system, the method comprising the steps of:
-
receiving an alarm from a product that is part of a set of internal resources of the enterprise network; identifying an external service provider for handling the alarm; and providing temporary authenticated access of the service provider to the product. - View Dependent Claims (20, 21, 22)
-
Specification