Network control security
First Claim
1. A method to allow a network element to retrieve a control command, the method comprising:
- associating, by a network controller device, an identifier with the control command;
sending, by the network controller device, the identifier and the associated control command over a first network with a first level of security to a computing device;
sending, by the network controller device, an activation signal to the network element over a second network with a second level of security different from the first level of security; and
sending, by the network controller device, the identifier to the network element over the second network, wherein the identifier is effective to allow the network element to retrieve the control command.
4 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a network controller device may associate an identifier with the control command. The network controller device may send the identifier and the associated control command over a first network with a first level of security to a computing device. The network controller device may send an activation signal to the network element over a second network with a second level of security different from the first level of security. The network controller device may send the identifier to the network element over the second network. The identifier may be effective to allow the network element to retrieve the control command.
32 Citations
20 Claims
-
1. A method to allow a network element to retrieve a control command, the method comprising:
-
associating, by a network controller device, an identifier with the control command; sending, by the network controller device, the identifier and the associated control command over a first network with a first level of security to a computing device; sending, by the network controller device, an activation signal to the network element over a second network with a second level of security different from the first level of security; and sending, by the network controller device, the identifier to the network element over the second network, wherein the identifier is effective to allow the network element to retrieve the control command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A network communication system comprising:
-
a network controller device; a computing device configured to be in communication with the network controller device over a first network with a first level of security; and a network element configured to be in communication with the network controller device and the computing device, wherein the network controller device is effective to; send an identifier and associated control command over the first network to the computing device; the computing device effective to store the identifier and the associated control command in a memory of the computing device; the network controller device further effective to; send an activation signal to the network element over a second network with a second level of security different from the first level of security; and send a copy of the identifier to the network element over the second network; the network element effective to, in response to receipt of the activation signal, send the copy of the identifier to the computing device; and the computing device further effective to, in response to receipt of the copy of the identifier, send the control command associated with the identifier to the network element. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A network controller device, comprising:
-
a processor; and a memory configured to be in communication with the processor and effective to store one or more instructions, wherein the processor effective to, in accordance with the one or more instructions; send an identifier and control command over a first network with a first level of security to a computing device; send an activation signal to a network element over a second network with a second level of security different from the first level of security; and send a copy of the identifier to the network element over the second network, wherein the network element is effective to receive the control command from the computing device. - View Dependent Claims (17, 18, 19, 20)
-
Specification