×

Network authentication of a geo-fenced volume

  • US 9,866,552 B2
  • Filed: 05/08/2015
  • Issued: 01/09/2018
  • Est. Priority Date: 05/08/2015
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for managing a software defined network, comprising:

  • a memory; and

    a processor in a wireless access point hardware security device in communication with the memory, the processor configured to perform a method comprisingdefining a first geo-fenced volume of the software defined network using a coordinate system that includes a range of latitudes, a range of longitudes, and a range of altitudes, wherein the range of latitudes, the range of longitudes, and the range of altitudes is included in data received from a Global Positioning System,determining a geographic location of a device using a latitude, a longitude, and an altitude within the coordinate system, wherein the latitude, the longitude, and the altitude is included in the data received from the Global Positioning System,accessing a user profile for the device that includes one or more network permissions based on the geographic location of the device relative to the first geo-fenced volume,wherein the one or more network permissions includes access to resources within the first geo-fenced volume,wherein the user profile includes the geographic location of the device and security information of a user,wherein the security information includes at least one of a biometric identify marker scan and an authentication identifier of the user,wherein the biometric identity markers scan is selected from the group consisting of a retinal scan and a fingerprint scan,wherein the authentication identifier is selected from the group consisting of badge access and guarded entries,reconfiguring the one or more network permissions based on the user profile of the device,determining a first condition where the geographic location of the device is within the first geo-fenced volume,granting the one or more network permissions in response to the first condition wherein the device is within the first geo-fenced volume, andproviding physical access to the user to a second geo-fenced volume of the software defined network through a point of access based on the security information, wherein the point of access includes a locked doorway.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×