×

System and method for identifying unauthorized endpoints

DC
  • US 8,479,267 B2
  • Filed: 06/30/2009
  • Issued: 07/02/2013
  • Est. Priority Date: 06/30/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product embodied in a non-transitory computer readable medium that, when executing on one or more computers, performs the steps of:

  • collecting active endpoint information from each of a plurality of network devices other than active endpoints in a computer network, wherein the active endpoint information includes address information from each of a plurality of active endpoint computing facilities communicating through at least one of the plurality of network devices;

    forming an active endpoint list in a datastore wherein the address information is maintained as a list of media access control (MAC) addresses for active endpoints communicating with each of the plurality of network devices and wherein the contents of the data store are formed from Address Resolution Protocol (ARP) data collected from the plurality of network devices;

    collecting authorized endpoint information to the datastore from one or more authorized endpoints, wherein the authorized endpoint information is received from a security agent operating on each of a plurality of authorized endpoints that have been verified as being compliant with a security policy and have been authorized to access the computer network;

    forming an authorized endpoint list, wherein each authorized endpoint is represented by the authorized endpoint'"'"'s media access control (MAC) address; and

    comparing the active endpoint list to the authorized endpoint list to identify an unauthorized endpoint, wherein the unauthorized endpoint is one of the active endpoints but is not one of the authorized endpoints.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×