Methods, apparatus and program product for controlling network security
First Claim
Patent Images
1. A method comprising the steps of:
- monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and applying traffic filtering to monitored traffic passing through the identified unauthorized access point.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus and program products which monitor access points through which data can be exchanged with a network, identify an unauthorized access point, and selectively apply filters to the flow of data through an unauthorized access point.
-
Citations
12 Claims
-
1. A method comprising the steps of:
-
monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and applying traffic filtering to monitored traffic passing through the identified unauthorized access point. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising the steps of:
-
querying access points through which data can be exchanged with a network and gathering connectivity table information from a queried access point, reporting through the network to a server computer system the information gathered by querying, identifying an unauthorized access point by operation of the server system, and selectively applying a filter to the traffic exchanged with the network though the identified unauthorized access point.
-
-
8. Apparatus comprising:
-
a server computer system, a network interface connected to said system and providing a communication channel between said system and a network, an access point identification program stored accessibly to said system and cooperating therewith when executing to identify unauthorized nodes accessible through said interface, and a traffic filter controlling program stored accessibly to said system and cooperating therewith when executing to selectively impose a filter on traffic exchanged with the network through an unauthorized node. - View Dependent Claims (9, 10)
-
-
11. A program product comprising:
-
a computer readable medium; and
a program stored on said medium accessibly to a computer system, said program when executing on a system;
monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and applying traffic filtering to monitored traffic passing through the identified unauthorized access point.
-
-
12. A program product comprising:
-
a computer readable medium; and
a program stored on said medium accessibly to a computer system, said program when executing on a system;
querying access points through which data can be exchanged with a network and gathering connectivity table information from a queried access point, reporting through the network to a server computer system the information gathered by querying, identifying an unauthorized access point by operation of the server system, and selectively applying a filter to the traffic exchanged with the network though the identified unauthorized access point.
-
Specification