×

Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices

  • US 20050128989A1
  • Filed: 10/15/2004
  • Published: 06/16/2005
  • Est. Priority Date: 12/08/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for monitoring a selected region of an airspace associated with local area networks of computing devices, the method comprising:

  • providing one or more segments of a legacy local area network to be protected in a selected geographic region, the legacy local area network being characterized by an unsecured airspace within the selected geographic region;

    determining a security policy associated with the one or more segments of the legacy local area network, the security policy at least characterizing a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored;

    connecting one or more sniffer devices into the legacy local area network, the one or more sniffer devices being spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy;

    coupling a security appliance to the legacy local area network;

    determining if at least one of the sniffer devices is coupled to each of the one or more segments of the legacy local area network to be protected;

    determining if the one or more sniffer devices substantially covers the portion of the unsecured airspace to be secured;

    monitoring wireless activity in the airspace using the one or more sniffer devices;

    automatically classifying, using a classification process, a portion of information associated with the monitoring of the wireless activity to at least determine if the wireless activity communicates to at least one of the one or more segments to be protected;

    detecting a violation of the security policy based upon at least the classifying of the portion of the information from the monitoring of the wireless activity; and

    automatically processing an action associated with the violation in accordance to the security policy for the one or more segments in the legacy local area network to be protected.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×