Network authentication of a geo-fenced volume
First Claim
1. A system for managing a software defined network, comprising:
- a memory; and
a processor in a wireless access point hardware security device in communication with the memory, the processor configured to perform a method comprisingaccessing a user profile for a device that includes one or more network permissions based on a geographic location of the device relative to a first geo-fenced volume of the software defined network,wherein the one or more network permissions includes access to resources within the first geo-fenced volume,wherein the user profile includes the geographic location of the device and security information of a user,wherein the security information includes at least one of a biometric identify marker scan and an authentication identifier of the user,wherein the biometric identity markers scan is selected from the group consisting of a retinal scan and a fingerprint scan,wherein the authentication identifier is selected from the group consisting of badge access and guarded entries,reconfiguring the one or more network permissions based on the user profile of the device,determining a first condition where the geographic location of the device is within the first geo-fenced volume,granting the one or more network permissions in response to the first condition wherein the device is within the first geo-fenced volume, andproviding physical access to the user to a second geo-fenced volume of the software defined network through a point of access based on the security information, wherein the point of access includes a locked doorway.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use a Global Positioning System (GPS) including a range of latitudes, a range of longitudes and a range of altitudes. A resource within the geo-fenced volume can be assigned a location using the GPS coordinates. The resource can be managed by external applications that are operating through the software control layer. To determine an access of a device to the geo-fenced volume, the GPS coordinates, are gathered as a geographical location of the device. A user profile can be accessed to determine an access path of the user. Depending on the geographical location of the device a first condition can be generated based on the device being within the geo-fenced volume. A network permission can be granted to the device based on the first condition.
19 Citations
9 Claims
-
1. A system for managing a software defined network, comprising:
-
a memory; and a processor in a wireless access point hardware security device in communication with the memory, the processor configured to perform a method comprising accessing a user profile for a device that includes one or more network permissions based on a geographic location of the device relative to a first geo-fenced volume of the software defined network, wherein the one or more network permissions includes access to resources within the first geo-fenced volume, wherein the user profile includes the geographic location of the device and security information of a user, wherein the security information includes at least one of a biometric identify marker scan and an authentication identifier of the user, wherein the biometric identity markers scan is selected from the group consisting of a retinal scan and a fingerprint scan, wherein the authentication identifier is selected from the group consisting of badge access and guarded entries, reconfiguring the one or more network permissions based on the user profile of the device, determining a first condition where the geographic location of the device is within the first geo-fenced volume, granting the one or more network permissions in response to the first condition wherein the device is within the first geo-fenced volume, and providing physical access to the user to a second geo-fenced volume of the software defined network through a point of access based on the security information, wherein the point of access includes a locked doorway. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product for managing a software defined network comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor in a wireless access point hardware security device to cause the processor to perform a method comprising:
-
accessing a user profile for a device that includes one or more network permissions based on a geographic location of the device relative to a first geo-fenced volume of the software defined network, wherein the one or more network permissions includes access to resources within the first geo-fenced volume, wherein the user profile includes the geographic location of the device and security information of a user, wherein the security information includes at least one of a biometric identify marker scan and an authentication identifier of the user, wherein the biometric identity markers scan is selected from the group consisting of a retinal scan and a fingerprint scan, wherein the authentication identifier is selected from the group consisting of badge access and guarded entries; reconfiguring the one or more network permissions based on the user profile of the device; determining a first condition where the geographic location of the device is within the first geo-fenced volume; granting the one or more network permissions in response to the first condition wherein the device is within the first geo-fenced volume; and providing physical access to the user to a second geo-fenced volume of the software defined network through a point of access based on the security information, wherein the point of access includes a locked doorway. - View Dependent Claims (6, 7, 8, 9)
-
Specification