×

Network authentication of a geo-fenced volume

  • US 9,998,457 B1
  • Filed: 12/13/2017
  • Issued: 06/12/2018
  • Est. Priority Date: 05/08/2015
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method for managing a software defined network by a processor in a wireless access point hardware security device, the method comprising:

  • accessing a user profile for a device that includes one or more network permissions based on a geographic location of the device relative to a first geo-fenced volume of the software defined network,wherein the one or more network permissions includes access to resources within the first geo-fenced volume,wherein the user profile includes the geographic location of the device and security information of a user,wherein the security information includes at least one of a biometric identity marker scan and an authentication identifier of the user,wherein the biometric identity marker scan is selected from the group consisting of a retinal scan and a fingerprint scan,wherein the authentication identifier is selected from the group consisting of badge access and guarded entries;

    determining a first condition where the geographic location of the device is within the first geo-fenced volume;

    granting the one or more network permissions in response to the first condition wherein the device is within the first geo-fenced volume; and

    providing physical access to the user to a second geo-fenced volume of the software defined network through a point of access based on the security information, wherein the point of access includes a locked doorway.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×