Determination of Spoofing of a Unique Machine Identifier
First Claim
Patent Images
1. A method, comprising:
- receiving current information from an edge network device, the received current information associated with a media access control (MAC) address of an end user device;
comparing the received information with stored historical information associated with the MAC address of the end user device; and
determining, based on the c parison, if the MAC address of the end user device has been spoofed.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed.
16 Citations
15 Claims
-
1. A method, comprising:
-
receiving current information from an edge network device, the received current information associated with a media access control (MAC) address of an end user device; comparing the received information with stored historical information associated with the MAC address of the end user device; and determining, based on the c parison, if the MAC address of the end user device has been spoofed. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a memory, storing a set of instructions; and a processor, to execute the stored set of instructions, the processor to; analyze historical and current information associated with a unique machine identifier of an end user device; compare current information associated with the unique machine identifier to historical information associated with the unique machine identifier analyzed by the analyzer to determine, based on a result of the comparison, if the unique machine identifier of the end user device has been spoofed. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium, storing a set of instructions, executable by a processor, to perform a method to:
-
receive, at an edge network device, a request from an end user device; extract information related to the request; associate the extracted information with a unique machine identifier of the end user device; store, in a storage, the extracted information; and transmit the received request to a remote network device for processing. - View Dependent Claims (14, 15)
-
Specification