×

Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices

  • US 7,804,808 B2
  • Filed: 09/18/2006
  • Issued: 09/28/2010
  • Est. Priority Date: 12/08/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for monitoring at least a part of an airspace associated with a network of computing devices, the method comprising:

  • providing a network to be protected, the network being associated with at least a part of an airspace;

    using a security policy associated with the network, the security policy at least characterizing a first type of wireless activity in at least the part of the airspace to be permitted, a second type of wireless activity in at least the part of the airspace to be denied, and a third type of wireless activity in at least the part of the airspace to be ignored;

    providing one or more sniffer devices, the one or more sniffer devices being spatially disposed to cause at least the part of the airspace to be secured based on at least information associated with the security policy;

    determining if the one or more sniffer devices substantially cover at least the part of the airspace to be secured;

    monitoring at least a wireless activity in at least the part of the airspace using the one or more sniffer devices, the wireless activity being associated with at least a wireless device other than the one or more sniffer devices;

    performing a connectivity test to determine information associated with a connectivity status of the wireless device to the network to be protected, the connectivity test including transferring one or more marker packets at least from wired side of the network to be protected or at least through wireless side of the wireless device; and

    determining whether the monitored wireless activity is permitted, denied, or ignored based on at least the information associated with the security policy,wherein determining whether the monitored wireless activity is denied or ignored is further based on at least the information associated with the connectivity status of the wireless device to the network to be protected.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×