×

Network authentication of a geo-fenced volume

  • US 9,882,898 B2
  • Filed: 02/26/2016
  • Issued: 01/30/2018
  • Est. Priority Date: 05/08/2015
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method for managing a software defined network by a processor in a wireless access point hardware security device, the method comprising:

  • defining a first geo-fenced volume of the software defined network using a coordinate system that includes a range of latitudes, a range of longitudes, and a range of altitudes, wherein the range of latitudes, the range of longitudes, and the range of altitudes is included in data received from a Global Positioning System;

    determining a geographic location of a device using a latitude, a longitude, and an altitude within the coordinate system, wherein the latitude, the longitude, and the altitude is included in the data received from the Global Positioning System;

    accessing a user profile for the device that includes one or more network permissions based on the geographic location of the device relative to the first geo-fenced volume,wherein the one or more network permissions includes access to resources within the first geo-fenced volume,wherein the user profile includes the geographic location of the device and security information of a user,wherein the security information includes at least one of a biometric identity marker scan and an authentication identifier of the user,wherein the biometric identity markers scan is selected from the group consisting of a retinal scan and a fingerprint scan,wherein the authentication identifier is selected from the group consisting of badge access and guarded entries;

    determining a first condition where the geographic location of the device is within the first geo-fenced volume;

    granting the one or more network permissions in response to the first condition wherein the device is within the first geo-fenced volume; and

    providing physical access to the user to a second geo-fenced volume of the software defined network through a point of access based on the security information, wherein the point of access includes a locked doorway.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×