Claims
- 1. A method comprising:
determining, by one or more trusted network devices within a data network infrastructure, a physical location of a client device requesting access to the data network infrastructure to generate a trusted physical location; and storing an association of the trusted physical location with the client device.
- 2. The method of claim 1 further comprising determining whether a network device within the data network is a trusted network device according to a likelihood that the network device can be modified to provide false physical location data.
- 3. The method of claim 1 further comprising limiting physical access to the trusted network devices within the data network.
- 4. The method of claim 1 wherein the one or more trusted network devices are each associated with a level of trust not less than a threshold.
- 5. The method of claim 4 wherein the threshold depends on a type of request by the client device.
- 6. The method of claim 1 wherein the trusted physical location is associated with a level of trust.
- 7. The method of claim 6 further comprising determining the level of trust of the trusted physical location using levels of trust of the one or more trusted network devices.
- 8. The method of claim 7 wherein determining the level of trust comprises determining the level of trust based on a method of communication between the one or more trusted network devices and the client device.
- 9. The method of claim 1 further comprising policing network activities of the client using the trusted physical location.
- 10. The method of claim 1 further comprising determining a response for an access request by the client using the trusted physical location.
- 11. The method of claim 1 further comprising controlling network resources provided to the client using the trusted physical location.
- 12. The method of claim 11 wherein controlling network resources includes restricting access to said network resources.
- 13. The method of claim 1 further comprising transmitting the trusted physical location to an emergency response authority.
- 14. The method of claim 1 further comprising providing information to the client using the trusted physical location.
- 15. The method of claim 14 wherein providing information comprises selecting said information using the trusted physical location.
- 16. A method comprising:
transmitting first location information from a trusted source within a data network infrastructure; receiving second location information from a client device requesting access to the network, the second location information using the first location information; and determining a trusted location using the first and second location information.
- 17. The method of claim 16 further comprising policing network activities of the client using the trusted physical location.
- 18. The method of claim 16 further comprising controlling network resources provided to the client using the trusted physical location.
- 19. A method comprising:
determining a value characterizing a physical location of a device; determining a level of trust corresponding to the determined value; and associating the level of trust with the value of the physical location.
- 20. The method of claim 19 wherein determining a level of trust further comprises determining a level of trust using a precision of a technique used for determining the value of the physical location.
- 21. The method of claim 19 wherein determining a level of trust further comprises determining a level of trust using a granularity of a range of possible values used for determining the value of the physical location.
- 22. The method of claim 19 wherein determining a level of trust further comprises determining a level of trust using a probability that determining a value can produce a false value for the physical location.
- 23. The method of claim 19 wherein determining a level of trust further comprises determining a level of trust using a level of trust of a network device determining the value of the physical location.
- 24. A system comprising a trusted network device within a data network infrastructure, the network device including a location module configured to determine a trusted physical location of a client device requesting access to the network infrastructure and to associate the trusted physical location with the client device.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority under 35 USC §119(e) to the following U.S. Provisional Patent Application Serial No. 60/361,419, titled “A System for Network Definition Based on Device Location”, filed on Mar. 1, 2002; Serial No. 60/361,421, titled “A System to Regulate Access as a Function of Device Location”, filed on Mar. 1, 2002; Serial No. 60/361,420, titled “Systems and Methods to Define Location of a Network Device or a Networked Device”, filed on Mar. 1, 2002; Serial No. 60/361,380, titled “A System and Method to Provide Security in a Network Based on Device Location Information”, filed on Mar. 1, 2002; Serial No. 60/387,331, titled “Location Discovery and Configuration Provisioning Server”, filed on Jun. 10, 2002; and Serial No. 60/387,330, titled “System and Method for Switch Based Location Discovery and Configuration Provisioning of Network Attached Devices”, filed on Jun. 10, 2002. The entire contents of each of these applications are hereby incorporated by reference.
[0002] This application is also related to International Application Serial Number ______, titled “Location Aware Networking”, being filed concurrently with this application. This International Application is also incorporated herein by reference.
Provisional Applications (6)
|
Number |
Date |
Country |
|
60361419 |
Mar 2002 |
US |
|
60361421 |
Mar 2002 |
US |
|
60361420 |
Mar 2002 |
US |
|
60361380 |
Mar 2002 |
US |
|
60387331 |
Jun 2002 |
US |
|
60387330 |
Jun 2002 |
US |