Methods, apparatus and program product for controlling network access accounting
First Claim
Patent Images
1. A method comprising the steps of:
- monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus and program products which monitor access points through which data can be exchanged with a network, identify an unauthorized access point, and accumulate charges for network access and usage passing through the unauthorized access point.
42 Citations
8 Claims
-
1. A method comprising the steps of:
-
monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising the steps of:
-
querying access points through which data can be exchanged with a network and gathering connectivity table information from a queried access point, reporting through the network to a server computer system the information gathered by querying, identifying an unauthorized access point by operation of the server system, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point.
-
-
6. Apparatus comprising:
-
a server computer system, a network interface connected to said system and providing a communication channel between said system and a network, an access point identification program stored accessibly to said system and cooperating therewith when executing to identify unauthorized nodes accessible through said interface, and an accounting control program stored accessibly to said system and cooperating therewith when executing to accumulate charges for access and usage of network resources identified to the identified unauthorized access point.
-
-
7. A program product comprising:
-
a computer readable medium; and
a program stored on said medium accessibly to a computer system, said program when executing on a system;
monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point.
-
-
8. A program product comprising:
-
a computer readable medium; and
a program stored on said medium accessibly to a computer system, said program when executing on a system;
querying access points through which data can be exchanged with a network and gathering connectivity table information from a queried access point, reporting through the network to a server computer system the information gathered by querying, identifying an unauthorized access point by operation of the server system, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point.
-
Specification