×

Rogue router hunter

  • US 7,991,877 B2
  • Filed: 10/05/2007
  • Issued: 08/02/2011
  • Est. Priority Date: 10/05/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method for detecting unauthorized routers in a distributed network, the computer implemented method comprising:

  • obtaining a physical address of a destination device;

    creating, by a source device, a data packet comprising at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address to cause the destination device receiving the data packet to route the data packet if the destination device is configured for routing, and wherein the time-to-live field comprises a value indicating the data packet has already exceeded a time limit to cause the destination device receiving the data packet to return a time exceeded message to the source device;

    sending the data packet to the destination device using the physical address in the destination media access control field; and

    responsive to receiving the time exceeded message from the destination device, determining that the destination device is enabled for routing.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×