System and method for managing wireless devices in an enterprise
First Claim
Patent Images
1. A method for managing a wireless device in a network, the method comprising:
- identifying a plurality of authorized logical wireless access points within a network;
detecting a plurality of physical wireless access points within the network;
determining, by a computer, for each of the plurality of physical wireless access points, whether the physical wireless access point is associated with one of the plurality of authorized logical wireless access points; and
reporting each physical wireless access point that is not associated with an authorized logical wireless access points.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for managing wireless devices in an enterprise. A first exemplary method manages the physical access points of a wireless network in an enterprise. A second exemplary method manages the assets of wireless devices in an enterprise. A third exemplary method enables virus detection within wireless devices. A fourth exemplary method manages wireless device data backup.
-
Citations
17 Claims
-
1. A method for managing a wireless device in a network, the method comprising:
-
identifying a plurality of authorized logical wireless access points within a network; detecting a plurality of physical wireless access points within the network; determining, by a computer, for each of the plurality of physical wireless access points, whether the physical wireless access point is associated with one of the plurality of authorized logical wireless access points; and reporting each physical wireless access point that is not associated with an authorized logical wireless access points. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for managing a wireless device in a network, the method comprising:
-
defining a set of authorized assets associated with a wireless device on a network; detecting the wireless device on the network; determining the actual assets associated with the wireless device; analyzing, by a computer, the set of authorized assets and the actual assets to identify at least one flagged asset; and reporting the at least one flagged asset. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification