System and apparatus for rogue VoIP phone detection and managing VoIP phone mobility
First Claim
Patent Images
1. A method for detecting presence of an unauthorized device on a communications network, comprising:
- compiling address and switch port data for a plurality of devices authorized to access a communications network;
detecting an attempted call on the communications network;
detecting an address and switch port data for the device initiating the attempted call;
comparing said detected address and switch port data to said compiled address and switch port data;
detecting a match of said detected address and one of the compiled addresses;
determining that said detected switch port data for the detected address does not match the port data for the compiled address that matches said detected address; and
identifying said device having the detected address as an unauthorized device.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and a system track network access information for authorized network devices. The access information facilitates tracking movement of the device throughout the network. In addition the access information can be used to detect when an unauthorized device attempts to access the network, posing as an authorized device.
73 Citations
7 Claims
-
1. A method for detecting presence of an unauthorized device on a communications network, comprising:
-
compiling address and switch port data for a plurality of devices authorized to access a communications network;
detecting an attempted call on the communications network;
detecting an address and switch port data for the device initiating the attempted call;
comparing said detected address and switch port data to said compiled address and switch port data;
detecting a match of said detected address and one of the compiled addresses;
determining that said detected switch port data for the detected address does not match the port data for the compiled address that matches said detected address; and
identifying said device having the detected address as an unauthorized device. - View Dependent Claims (2, 3, 4)
-
-
5. A method for blocking a rogue IP phone from access to an IP communications network, comprising:
-
detecting an address of an IP phone;
comparing said detected address to a list of authorized IP phones to find an IP phone having an address matching said detected address;
comparing switch data associated with said IP phone to switch data associated with the IP phone having the matching address;
determining said IP phone to be a rogue IP phone based on said comparison of switch data; and
tearing down a communication connection from said rogue phone.
-
-
6. A method for tracking movement of an IP telephone in a communications network, comprising:
-
detecting a connection of an IP phone to a port of a switch within a network;
determining an address of the detected IP phone;
determining, with reference to an access list and the determined address, that the detected phone has previously been connected to and then disconnected from another port within the network;
identifying the detected phone as a moved phone; and
updating the access list to reflect information about the detected phone including current port connection information. - View Dependent Claims (7)
-
Specification