Methods apparatus and program products for wireless access points
First Claim
Patent Images
1. A method comprisingmonitoring access points through which data can be exchanged with a network;
- identifying an unauthorized access point;
in response to an unauthorized access point being identified, determining make, model and default configuration password of said identified unauthorized access point by monitoring traffic passing through said identified unauthorized access point;
addressing said identified unauthorized access point using said determined default configuration password; and
after gaining access thereto, reconfiguring said unauthorized access point to add an identity of said identified unauthorized access point to registers of ports for which charges are allocated such that access charges can be accumulated against said identity.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus and program products which monitor wireless access points (12, 16) through which data can be exchanged with a network (10), identify an unauthorized access point (16), and respond to monitored data flow in a variety of manners including determining the location of the identified unauthorized access point, establishing filtering, and controlling accounting for access services.
-
Citations
23 Claims
-
1. A method comprising
monitoring access points through which data can be exchanged with a network; -
identifying an unauthorized access point; in response to an unauthorized access point being identified, determining make, model and default configuration password of said identified unauthorized access point by monitoring traffic passing through said identified unauthorized access point; addressing said identified unauthorized access point using said determined default configuration password; and after gaining access thereto, reconfiguring said unauthorized access point to add an identity of said identified unauthorized access point to registers of ports for which charges are allocated such that access charges can be accumulated against said identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a computer system; a network interface connected to said computer system to provide a communication channel between said computer system and a network; means for monitoring access points through which data can be exchanged with said network; means for identifying an unauthorized access point; means for, in response to an unauthorized access point being identified, determining make, model and default configuration password of said identified unauthorized access point by monitoring traffic passing through said identified unauthorized access point; means for addressing said identified unauthorized access point using said determined default configuration password; and means for, after gaining access thereto, reconfiguring said unauthorized access point to add an identity of said identified unauthorized access point to registers of ports for which charges are allocated such that access charges can be accumulated against said identity. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer storage medium having a computer program product comprising:
-
computer program code for monitoring access points through which data can be exchanged with a network; computer program code for identifying an unauthorized access point; computer program code for, in response to an unauthorized access point being identified, determining make, model and default configuration password of said identified unauthorized access point by monitoring traffic passing through said identified unauthorized access point; computer program code for addressing said identified unauthorized access point using said determined default configuration password; and computer program code for, after gaining access thereto, reconfiguring said unauthorized access point to add an identity of said identified unauthorized access point to registers of ports for which charges are allocated such that access charges can be accumulated against said identity. - View Dependent Claims (20, 21, 22, 23)
-
Specification