APPARATUS AND METHOD FOR MONITORING NETWORK EQUIPMENT
First Claim
Patent Images
1. A computer-readable storage medium, comprising computer instructions for:
- receiving an actuation signal at a network plug-in device;
obtaining location information associated with the network plug-in device based on receipt of the actuation signal;
transmitting a monitoring signal to a remote server from the network plug-in device, the monitoring signal comprising the location information and identification information associated with the network plug-in device; and
transmitting a security signal when the network plug-in device is within a pre-determined distance of a security device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to receive a monitoring signal from a network plug-in device where the monitoring signal includes location and identification information associated with the network plug-in device and where the server is remote from the network plug-in device, and determine whether the network plug-in device is in an unauthorized location based at least in part on the monitoring signal. Other embodiments are disclosed.
46 Citations
25 Claims
-
1. A computer-readable storage medium, comprising computer instructions for:
-
receiving an actuation signal at a network plug-in device; obtaining location information associated with the network plug-in device based on receipt of the actuation signal; transmitting a monitoring signal to a remote server from the network plug-in device, the monitoring signal comprising the location information and identification information associated with the network plug-in device; and transmitting a security signal when the network plug-in device is within a pre-determined distance of a security device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A server comprising a controller to:
-
receive a monitoring signal from a network plug-in device, the monitoring signal comprising location and identification information associated with the network plug-in device, the location information being generated by the network plug-in device; receive access information associated with an individual in proximity to the network plug-in device; and determine whether the network plug-in device is in an unauthorized location based at least in part on the monitoring signal and the access information. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A server comprising a controller to:
-
receive a monitoring signal from a network plug-in device, the monitoring signal comprising location and identification information associated with the network plug-in device, the server being remote from the network plug-in device, wherein the network plug-in device is part of a communication link between first and second user devices; and determine whether the network plug-in device is in an unauthorized location based at least in part on the monitoring signal. - View Dependent Claims (16, 17, 18)
-
-
19. A network plug-in device comprising a controller to:
-
generate location information associated with the network plug-in device based on receipt of an actuation signal; transmit a monitoring signal to a remote server, the monitoring signal comprising the location information and identification information associated with the network plug-in device; and transmit a security signal when the network plug-in device is within a pre-determined distance of a security device. - View Dependent Claims (20, 21, 22)
-
-
23. A method, comprising:
-
obtaining location information associated with a network plug-in device; transmitting a monitoring signal to a remote server from the network plug-in device, the monitoring signal comprising the location information and identification information associated with the network plug-in device; and transmitting to the server at least one of a security signal and access information, the security signal being transmitted when the network plug-in device is within a pre-determined distance of a security device, the access information being associated with an individual in proximity to the network plug-in device. - View Dependent Claims (24, 25)
-
Specification