METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED WIRELESS DEVICES
First Claim
Patent Images
1. A method comprising:
- retrieving an identifier of a device from a log of devices connected to a network;
determining whether the device is a wireless device by applying a plurality of criteria to the identifier;
retrieving a list of wireless devices authorized to connect to the network if the device is determined to be a wireless device; and
comparing the identifier with the list to determine whether the device is authorized to connect to the network.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided for detecting unauthorized wireless devices in a network. A platform retrieves an identifier of a device from a log of devices connected to a network, determines whether the device is a wireless device by applying a plurality of criteria to the identifier, retrieving a list of wireless devices authorized to connect to the network if the device is determined to be a wireless device, and compares the identifier with the list to determine whether the device is authorized to connect to the network.
104 Citations
20 Claims
-
1. A method comprising:
-
retrieving an identifier of a device from a log of devices connected to a network; determining whether the device is a wireless device by applying a plurality of criteria to the identifier; retrieving a list of wireless devices authorized to connect to the network if the device is determined to be a wireless device; and comparing the identifier with the list to determine whether the device is authorized to connect to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
a processor configured to retrieve an identifier of a device from a log of devices connected to a network, to determine whether the device is a wireless device by applying a plurality of criteria to the identifier, to retrieve a list of wireless devices authorized to connect to the network if the device is determined to be a wireless device, and to compare the identifier with the list to determine whether device is authorized to connect to the network. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A system comprising:
-
a device detection module configured to detect presence of a wireless device and to determine an identifier of the detected wireless device according to a predetermined criteria; a device log module configured to retrieve log data relating to authorized connectivity to a network; and an authorization module configured to compare the identifier with the retrieved log data to generate authorization information for granting access to the network. - View Dependent Claims (18, 19, 20)
-
Specification