Methods, apparatus and program product for monitoring network security
First Claim
Patent Images
1. A method comprising the steps of:
- monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, and determining the location of the identified unauthorized access point.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus and program products which monitor access points through which data can be exchanged with a network, identify an unauthorized access point, and determine the location of the identified unauthorized access point.
87 Citations
26 Claims
-
1. A method comprising the steps of:
-
monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, and determining the location of the identified unauthorized access point. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising the steps of:
-
monitoring with a suitably equipped computer device access points through which data can be exchanged with a network and gathering information about a monitored access point, reporting through the network to a server computer system the information gathered by monitoring, and identifying an unauthorized access point by operation of the server system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising the steps of:
-
equipping each of a plurality of computer devices to detect access points accessible to the device through which data can be exchanged with a network and to report to a server computer system the identity of detected access points;
comparing the identity of reported access points with a list of authorized access points and identifying an unauthorized access point; and
comparing the locations of a plurality of computer devices all of which report detection of an identified unauthorized access point. - View Dependent Claims (16, 17)
-
-
18. Apparatus comprising:
-
a workstation computer system;
a network interface connected to said system and providing a communication channel between said system and a network;
an access point identification program stored accessibly to said system and cooperating therewith when executing on said system to identify points accessible through said interface; and
a reporting program stored accessibly to said system and cooperating with said identification program and with said system when executing on said system to report through said interface to a remote server computer system the identity of accessed points. - View Dependent Claims (19, 20, 21, 22)
-
-
23. Apparatus comprising:
-
a server computer system, a network interface connected to said system and providing a communication channel between said system and a network, an access point identification program stored accessibly to said system and cooperating therewith when executing to identify nodes accessible through said interface, and a node identification database stored accessibly to said system and said program and cooperating therewith when said program is executing on said system to identify unauthorized access points accessible to said system through said interface. - View Dependent Claims (24)
-
-
25. A program product comprising:
-
a computer readable medium; and
a program stored on said medium accessibly to a computer system, said program when executing on a system;
monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, and determining the location of the identified unauthorized access point.
-
-
26. A program product comprising:
-
a computer readable medium; and
a program stored on said medium accessibly to a computer system, said program when executing on a system;
monitoring access points through which data can be exchanged with a network, identifying an access point, and reporting to a remote server computer system the identified access point.
-
Specification