Systems and Methods for Wireless Security Using Distributed Collaboration of Wireless Clients
First Claim
Patent Images
1. A method for distributed monitoring of a wireless network using a plurality of wireless client devices in communication with the wireless network to gather wireless data from the wireless network, the method comprising the steps of:
- directing one or more of a plurality of wireless client devices in communication with a wireless network to monitor the wireless network and collect data corresponding to wireless traffic on the wireless network at a predetermined range of frequencies, and to store the data for analysis;
receiving collected data from the plurality of wireless client devices at one or more servers, the servers being configured to accumulate the collected data;
storing the received data for analysis; and
analyzing the stored data received from the plurality of wireless client devices so as to identify traffic corresponding to anomalous wireless activity.
9 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for distributed monitoring of a wireless network using a plurality of wireless client devices in communication with the wireless network.
131 Citations
26 Claims
-
1. A method for distributed monitoring of a wireless network using a plurality of wireless client devices in communication with the wireless network to gather wireless data from the wireless network, the method comprising the steps of:
-
directing one or more of a plurality of wireless client devices in communication with a wireless network to monitor the wireless network and collect data corresponding to wireless traffic on the wireless network at a predetermined range of frequencies, and to store the data for analysis;
receiving collected data from the plurality of wireless client devices at one or more servers, the servers being configured to accumulate the collected data;
storing the received data for analysis; and
analyzing the stored data received from the plurality of wireless client devices so as to identify traffic corresponding to anomalous wireless activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A processor based method for monitoring a wireless network with a client equipped with a wireless device, the method comprising the steps of:
-
receiving wireless data from the wireless network at a wireless device responsive to an activation condition, the wireless data comprising wireless traffic transmitted to any receiver, wherein the wireless data is transmitted within a receiver range of the wireless device;
analyzing the data to identify relevant data, events, and statistics, the data, events, and statistics being relevant to a security profile associated with the wireless network;
logging the relevant data, events, and statistics to a log file located on a local data store; and
sending the log file to a server responsive to the wireless device having an available connection to the server. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. One or more computer readable media storing instructions that upon execution by a computer cause the computer to monitor the use of a wireless device with respect to communications that are received at a wireless interface associated with the computer, wherein the monitoring of the wireless interface comprises:
-
receiving wireless data from the wireless network at a wireless device responsive to an activation condition, the wireless data comprising wireless traffic transmitted to any receiver, wherein the wireless data is transmitted within a receiver range of the wireless device;
analyzing the data to identify relevant data, events, and statistics, wherein the data, events, and statistics are relevant based upon a security profile associated with the wireless network;
logging the relevant data, events, and statistics to a log file located on a local data store; and
sending the log file to a server responsive to the wireless device having an available connection to the server.
-
-
25. A computer system having an intrusion protection system agent, the system comprising:
-
a wireless communication interface operable to receive and transmit data on a wireless network;
a data store operable to store a log file associated with analysis of the wireless network; and
a system processor comprising one or more processing elements, wherein the system processor is in communication with the system data store and the wireless communication interface and wherein the system processor is programmed or adapted to;
access the wireless communication interface to collect wireless data responsive to an activation condition, the wireless data being collected without consideration for the intended recipient of the data;
store the collected wireless data in the data store;
perform an analysis of the collected wireless data to identify relevant data, events, and statistics, wherein the identified data, events, and statistics are relevant based upon a security profile associated with the wireless network;
store a log file associated with the analysis of the collected wireless data; and
alert a centralized server via a network connection based upon the analysis of the information. - View Dependent Claims (26)
-
Specification