DETECTION OF UNAUTHORIZED WIRELESS ACCESS POINTS
First Claim
Patent Images
1. In a public wireless network where users connect to the network through a wireless access point, a system for detecting unauthorized access points, comprising:
- a monitoring device connected to the network that simulates a user and requests connection to the network through an available access point; and
an authentication server that maintains a configuration file with an identifier associated with each authorized access point for the network;
wherein the monitoring device requests an identifier from the available access point, and wherein the authentication server compares the requested identifier with each identifier in the configuration file, in order to determine whether the available access point is an authorized access point.
5 Assignments
0 Petitions
Accused Products
Abstract
A public wireless network has authorized wireless access points through which users connect to the network. A monitoring client simulates a user and detects available access points, and compares the identity of any available access points to those maintained by an authentication server associated with the network.
58 Citations
17 Claims
-
1. In a public wireless network where users connect to the network through a wireless access point, a system for detecting unauthorized access points, comprising:
-
a monitoring device connected to the network that simulates a user and requests connection to the network through an available access point; and an authentication server that maintains a configuration file with an identifier associated with each authorized access point for the network; wherein the monitoring device requests an identifier from the available access point, and wherein the authentication server compares the requested identifier with each identifier in the configuration file, in order to determine whether the available access point is an authorized access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 10)
-
-
9. The system of claim 9, wherein the network connects a user to the internet.
-
11. A method for detecting unauthorized access points in a public wireless network serving wireless users within a predetermined geographical area, comprising:
-
storing an identifier associated with one or more authorized access points for the network; providing a monitoring client for detecting available wireless access points within the area; determining the identity of the available access points; and comparing the identity of the available access points with the stored identifier associated with the authorized access point. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification