System and method for securing networks
First Claim
Patent Images
1. A method for securing a network, comprising:
- providing one or more information sources;
identifying one or more devices on the network using said one or more information sources; and
determining whether identified devices are authorized to be on the network.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing a network including providing one or more information sources, identifying one or more devices on the network using the information sources and determining whether identified devices are authorized.
-
Citations
40 Claims
-
1. A method for securing a network, comprising:
-
providing one or more information sources;
identifying one or more devices on the network using said one or more information sources; and
determining whether identified devices are authorized to be on the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for securing a network, comprising:
-
a providing unit for providing one or more information sources;
an identifying unit for identifying one or more devices on the network using said one or more information sources; and
an authorization-determining unit for determining whether identified devices are authorized to be on the network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer system comprising:
-
a processor; and
a program storage device readable by the computer system, embodying computer executable code for securing a network, the program storage device comprising;
code for providing one or more information sources;
code for identifying one or more devices on the network using said one or more information sources;
code for determining whether identified devices are authorized to be on the network. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer recording medium including computer executable code for securing a network, comprising:
-
code for providing one or more information sources;
code for identifying one or more devices on the network using said one or more information sources; and
code for determining whether identified devices are authorized to be on the network. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification