Rogue access point detection and restriction
First Claim
Patent Images
1. A method for securing a network, comprising:
- detecting a rogue access point; and
responsive to said detecting, performing an action on at least one of said network and at least some of a number of clients.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for securing a network having a number of access points which comprises detecting a rogue access point and responsive to the detecting, hindering a client from accessing the network via the rogue access point. The network comprises a number of access points and a first device having stored thereon a list of access points determined to be acceptable access points. The network is structured to enable communication between the first device and a second device through at least one of the number of access points. Furthermore, the network is structured to hinder the second device from accessing the first device via an access point other than an acceptable access point.
-
Citations
30 Claims
-
1. A method for securing a network, comprising:
-
detecting a rogue access point; and
responsive to said detecting, performing an action on at least one of said network and at least some of a number of clients. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A network comprising:
-
a number of access points; and
a first device having stored thereon at least one of a list of access points determined to be acceptable access points and a list of access points determined to be rogue access points;
wherein said network is structured to enable communication between said first device and a second device through at least one of said number of access points determined to be acceptable access points, and wherein said network is structured to hinder said second device from accessing said first device through at least one of said number of access points determined to be a rogue access point. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of controlling access to a wireless network comprising:
-
maintaining at least one of a list of acceptable access points and a list of rogue access points; and
transmitting to a client at least a portion of at least one of a list of acceptable access points and a list of rogue access points. - View Dependent Claims (28, 29, 30)
-
Specification