Method and system for securing and monitoring a wireless network
First Claim
1. A method comprising:
- detecting entities accessing a wireless network;
identifying a detected entity is unauthorized on the wireless network;
enabling security settings within an access point to the wireless network to restrict the unauthorized entity'"'"'s access to the wireless network.
0 Assignments
0 Petitions
Accused Products
Abstract
A common software interface simplifies a process of configuring the network security features provided by network controlled devices. A real-time threat entity detection system automatically scans the network using various protocols and builds entity profile data for each detection. The entity profile data is saved and updated every time the entity is detected on the network. Once the scan is complete, the system user is prompted to classify each newly detected node as a member or non-member of the network. The system user can then define automatic actions to take upon identification of the existence of the defined threat entity on the network at any point in the future. For example, a typical action could include notifying the threat entity of its detection or sending continuous requests to the threat entity over the network to effectively eliminate the usefulness of its membership on the network. The software also contacts the network gateway or router and configures MAC address filtering and disables broadcast of the router'"'"'s SSID, effectively making the network invisible to any devices other than the devices allowed on the network. Additionally, the solution provides a process to add new members to the network while security features are enabled.
-
Citations
6 Claims
-
1. A method comprising:
-
detecting entities accessing a wireless network;
identifying a detected entity is unauthorized on the wireless network;
enabling security settings within an access point to the wireless network to restrict the unauthorized entity'"'"'s access to the wireless network. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification