×

Method and system for providing wireless vulnerability management for local area computer networks

  • US 8,032,939 B2
  • Filed: 12/14/2007
  • Issued: 10/04/2011
  • Est. Priority Date: 11/06/2007
  • Status: Active Grant
First Claim
Patent Images

1. A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks, the method comprising:

  • providing a security server, the security server being hosted by a service provider entity, the security server being coupled to the Internet and having an address in the Internet, the security server being adapted to provide analysis of data associated with wireless vulnerability management, concurrently for a plurality of local area computer networks of a plurality of distinct customer entities, respectively;

    creating a first workspace for wireless vulnerability management for a first customer entity and a second workspace for wireless vulnerability management for a second customer entity on the security server, the creating the workspace being responsive to a first request from the first customer entity and a second request from the second customer entity to subscribe to wireless vulnerability management, the first and the second customer entities being distinct from one another;

    receiving configuration information associated with the first workspace for the first customer entity at the security server, the configuration information including identification of a first physical location hierarchy associated with premises of the first customer entity;

    receiving configuration information associated with the second workspace for the second customer entity at the security server, the configuration information including identification of a second physical location hierarchy associated with premises of the second customer entity;

    associating identities of a first one or more sniffers to be utilized for wireless vulnerability management for the first customer entity with the first workspace and identities of a second one or more sniffers to be utilized for wireless vulnerability management for the second customer entity with the second workspace;

    supplying the first one or more sniffers to the first customer entity and the second one or more sniffers to the second customer entity;

    receiving a plurality of connection requests at the security server over the Internet from a plurality of sniffers, respectively, subsequent to the plurality of sniffers being deployed at premises of their respective customer entities;

    identifying automatically from the plurality of connection requests a first set of connection requests associated with the first customer entity based at least upon the identities of the first one or more sniffers associated with the first workspace and a second set of connection requests associated with the second customer entity based at least upon the identities of the second one or more sniffers associated with the second workspace;

    displaying the first one or more sniffers as active within the first workspace for the first customer entity and the second one or more sniffers as active within the second workspace for the second customer entity, based at least upon the identified first and second set of connection requests;

    receiving input from the first customer entity for associating the first one or more sniffers with one or more locations, respectively, in the first physical location hierarchy associated with the first workspace for the first customer entity;

    receiving input from the second customer entity for associating the second one or more sniffers with one or more locations, respectively, in the second physical location hierarchy associated with the second workspace for the second customer entity;

    receiving at the security server a first information associated with wireless activity monitored by the first one or more sniffers at premises of the first customer entity, the receiving being receiving over the Internet;

    processing the received first information associated with wireless activity within the first workspace for the first customer entity using the security server;

    receiving at the security server a second information associated with wireless activity monitored by the second one or more sniffers at premises of the second customer entity, the receiving being receiving over the Internet;

    processing the received second information associated with wireless activity within the second workspace for the second customer entity using the security server; and

    metering usage of the first workspace and the second workspace for wireless vulnerability management for the first customer entity and the second customer entity, respectively.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×