WIRELESS DEVICE MONITORING METHODS, WIRELESS DEVICE MONITORING SYSTEMS, AND ARTICLES OF MANUFACTURE
First Claim
1. A wireless device monitoring method comprising:
- accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device;
accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device;
comparing the device configuration information with the stored information; and
indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.
4 Assignments
0 Petitions
Accused Products
Abstract
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.
40 Citations
36 Claims
-
1. A wireless device monitoring method comprising:
-
accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device; accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device; comparing the device configuration information with the stored information; and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A wireless device monitoring method comprising:
-
associating a node device with a secure area; detecting presence of a plurality of wireless devices at the secure area using the node device; communicating with respect to individual ones of the wireless devices after the detecting of the respective ones of the wireless devices using the node device; and using information of the communications, indicating at least one of the wireless devices as being unauthorized at the secure area. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A wireless device monitoring system comprising:
-
an antenna configured to receive wireless communications at a secure area; communications circuitry coupled with the antenna and configured to receive the wireless communications and to output wireless communications using the antenna; and processing circuitry coupled with the communications circuitry and configured to process the wireless communications received by the communications circuitry to detect a presence of a wireless device, to control the outputting of the wireless communications to request information from the wireless device, and to generate an indication of the wireless device as being one of authorized and unauthorized with respect to the secure area after the outputting of the wireless communications. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A wireless device monitoring system comprising:
-
a plurality of node devices associated with respective ones of a plurality of secure areas, wherein the node devices are individually configured to detect the presence of wireless devices at a respective one of the secure areas associated with the individual node device and to obtain information regarding the wireless devices from the wireless devices; and a management device coupled with the node devices and configured to receive the information regarding the wireless devices from the node devices, to analyze the information, and to indicate, for an individual one of the node devices, whether respective ones of the wireless devices are authorized or unauthorized with respect to the respective one of the secure areas. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A wireless device monitoring system comprising:
-
a first organization comprising a secure area; a second organization configured to store information regarding a plurality of wireless devices associated with the second organization; and wherein a monitoring device of the first organization is configured to indicate one of the wireless devices of the second organization as being one of authorized and unauthorized with respect to the secure area of the first organization using the stored information regarding the one of the wireless devices. - View Dependent Claims (32, 33)
-
-
34. An article of manufacture comprising:
media comprising programming configured to cause processing circuitry to perform processing comprising; first accessing information from a wireless device with respect to a secure area; second accessing stored information regarding the wireless device; comparing the accessed information and the stored information to determine whether the wireless device is authorized or unauthorized with respect to the secure area; and indicating the wireless device as being one of authorized and unauthorized with respect to the secure area responsive to the comparison. - View Dependent Claims (35, 36)
Specification