Distributed wireless security system
First Claim
Patent Images
1. A wireless client card for use with a wireless client in a network for maintaining wireless network security, the card comprising:
- a processor; and
a computer readable memory, wherein the memory stores instructions which, when executed, cause the processor to perform the operations of;
setting up a data base containing profile information from all clients within range of said wireless client;
sharing files and messages with a network access point according to an agreed protocol, wherein a portion of said files includes policies and rules for implementing wireless intrusion detection;
transmitting said files to said access point;
monitoring said network to detect intrusion;
notifying said access point upon detecting an intrusion; and
updating said data base in response to messages exchanged with said access point.
1 Assignment
0 Petitions
Accused Products
Abstract
A low-cost security management system for a wireless network utilizes client software having one component that runs on trusted access points and another that runs on wireless client cards on a client PC and/or laptop that enables an administrator to log in and check the status of network security from any client pc. The software monitors the state of the wireless network and reports on unauthorized connections or hacking attack, denial of service attack and potential threats to the security of the network.
-
Citations
20 Claims
-
1. A wireless client card for use with a wireless client in a network for maintaining wireless network security, the card comprising:
-
a processor; and a computer readable memory, wherein the memory stores instructions which, when executed, cause the processor to perform the operations of; setting up a data base containing profile information from all clients within range of said wireless client; sharing files and messages with a network access point according to an agreed protocol, wherein a portion of said files includes policies and rules for implementing wireless intrusion detection; transmitting said files to said access point; monitoring said network to detect intrusion; notifying said access point upon detecting an intrusion; and updating said data base in response to messages exchanged with said access point. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A wireless access point for maintaining wireless network security, comprising:
-
means for receiving from a wireless client policies and rules for implementing wireless intrusion detection; means for exchanging said policies and rules over a secure link with other access points; and means for notifying all wireless client within range when an intrusion has been detected. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A wireless client programmed to administer network security, the client comprising:
-
a processor; and a computer readable memory, wherein the memory stores instructions which, when executed, cause the processor to perform the operations of; setting up an internal data base containing profile information from all access points within range of said wireless client; configuring security policy violation rules; obtaining from an access point a message indicating a violation of said security policy violation rules; and updating said data base in response to said message. - View Dependent Claims (12)
-
-
13. A wireless access point comprising:
-
a processor; and a computer readable memory configured to store instructions for executing, by the processor, a method of administering a wireless network, the instructions comprising; setting up on a wireless client a data base containing profile information of all other wireless clients and access points within range of the network; determining which of said clients and access points are trusted; and communicating with at least one trusted one of said access points at least a portion of said data base.
-
-
14. A wireless access point comprising:
-
a processor; and a computer readable memory configured to store instructions for executing, by the processor, a method of administering a wireless network, the instructions comprising; executing a method of administering a wireless network storing in a database on said access point security violation rules and communications protocols from a wireless client, said data base identifying trusted ones of said wireless clients; scanning all wireless clients within range; and creating a log when a wireless client not listed in said data base is detected. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification