System and method for securing networks
First Claim
Patent Images
1. A method for securing a network, comprising:
- identifying one or more information sources;
using said one or more information sources to identify one or more authorized devices on a first network;
determining that a particular one of the identified authorized devices is bridging the first network and a second network, the second network comprising an adhoc wireless network established between the particular one of the identified authorized devices and a second wirelessly-enabled device; and
identifying the second wirelessly-enabled device communicating via the second network with the particular one of the identified devices; and
determining whether the second wirelessly-enabled device communicating via the second network with the particular one of the identified devices is authorized to be on the first network.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing a network including providing one or more information sources, identifying one or more devices on the network using the information sources and determining whether identified devices are authorized.
241 Citations
47 Claims
-
1. A method for securing a network, comprising:
-
identifying one or more information sources; using said one or more information sources to identify one or more authorized devices on a first network; determining that a particular one of the identified authorized devices is bridging the first network and a second network, the second network comprising an adhoc wireless network established between the particular one of the identified authorized devices and a second wirelessly-enabled device; and identifying the second wirelessly-enabled device communicating via the second network with the particular one of the identified devices; and determining whether the second wirelessly-enabled device communicating via the second network with the particular one of the identified devices is authorized to be on the first network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for securing a network, comprising:
-
a detecting unit for detecting one or more information sources; an identifying unit for identifying one or more authorized devices on a first network, using said one or more information sources; a bridge-detecting unit for determining that a particular one of the identified authorized devices is bridging the first network and a second network, the second network comprising an adhoc wireless network established between the particular one of the identified authorized devices and a second wirelessly-enabled device; the identifying unit further operable to identify the second wirelessly-enabled device communicating via the second network with the particular one of the identified devices; and an authorization-determining unit for determining whether a second wirelessly-enabled device communicating via the second network with the particular one of the identified devices is authorized to be on the first network. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer system comprising:
-
a processor; and a program storage device readable by the computer system, embodying computer executable code for securing a network, the program storage device comprising; code for identifying one or more information sources; code for identifying one or more authorized devices on a first network using said one or more information sources; code for determining that a particular one of the identified authorized devices is bridging the first network and a second network, the second network comprising an adhoc wireless network established between the particular one of the identified authorized devices and a second wirelessly-enabled device; code for identifying the second wirelessly-enabled device communicating via the second network with the particular one of the identified devices; and code for determining whether the second wirelessly-enabled device communicating via the second network with the particular one of the identified devices is authorized to be on the first network. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A computer recording medium including computer executable code for securing a network, comprising:
-
code for identifying one or more information sources; code for identifying one or more authorized devices on a first network, using said one or more information sources; code for determining that a particular one of the identified authorized devices is bridging the first network and a second network, the second network comprising an adhoc wireless network established between the particular one of the identified authorized devices and a second wirelessly-enabled device; and code for identifying the second wirelessly-enabled device communicating via the second network with the particular one of the identified devices; and code for determining whether the second wirelessly-enabled device communicating via the second network with identified devices are authorized to be on the first network. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A method for securing a network, comprising:
-
identifying one or more information sources; using said one or more information sources to identify one or more authorized user computers on a wireline network; determining that a particular one of the identified authorized user computer is wirelessly enabled and bridging the wireline network and a wireless network, the wireless network comprising an unauthorized adhoc wireless network established between the particular one of the identified user computers and a wirelessly-enabled laptop computer; and identifying the wirelessly-enabled laptop computer communicating via the wireless network with the particular one of the identified authorized user computers; and determining that the wirelessly-enabled laptop computer communicating via the unauthorized adhoc wireless network with the particular one of the authorized user computers is not authorized to be on the wireline network.
-
-
45. A system for securing a network, comprising:
-
a detecting unit for detecting one or more information sources; an identifying unit for identifying one or more authorized user computers on a wireline network; a bridge-detecting unit for determining that a particular one of the identified authorized user computer is wirelessly enabled and bridging the wireline network and a wireless network, the wireless network comprising an unauthorized adhoc wireless network established between the particular one of the identified user computers and a wirelessly-enabled laptop computer; the identifying unit further operable to identify the wirelessly-enabled laptop computer communicating via the wireless network with the particular one of the identified authorized user computers; and an authorization-determining unit for that the wirelessly-enabled laptop computer communicating via the unauthorized adhoc wireless network with the particular one of the authorized user computers is not authorized to be on the wireline network.
-
-
46. A computer system comprising:
-
a processor; and a program storage device readable by the computer system, embodying computer executable code for securing a network, the program storage device comprising; code for identifying one or more information sources; code for using said one or more information sources to identify one or more authorized user computers on a wireline network; code for determining that a particular one of the identified authorized user computer is wirelessly enabled and bridging the wireline network and a wireless network, the wireless network comprising an unauthorized adhoc wireless network established between the particular one of the identified user computers and a wirelessly-enabled laptop computer; code for identifying the wirelessly-enabled laptop computer communicating via the wireless network with the particular one of the identified authorized user computers; and code for determining that the wirelessly-enabled laptop computer communicating via the unauthorized adhoc wireless network with the particular one of the authorized user computers is not authorized to be on the wireline network.
-
-
47. A computer recording medium including computer executable code for securing a network, comprising:
-
code for identifying one or more information sources; code for using said one or more information sources to identify one or more authorized user computers on a wireline network; code for determining that a particular one of the identified authorized user computer is wirelessly enabled and bridging the wireline network and a wireless network, the wireless network comprising an unauthorized adhoc wireless network established between the particular one of the identified user computers and a wirelessly-enabled laptop computer; and code for identifying the wirelessly-enabled laptop computer communicating via the wireless network with the particular one of the identified authorized user computers; and code for determining that the wirelessly-enabled laptop computer communicating via the unauthorized adhoc wireless network with the particular one of the authorized user computers is not authorized to be on the wireline network.
-
Specification