Detection of unauthorized wireless access points
First Claim
Patent Images
1. In a public wireless network where users connect to the network through a wireless access point, a system for detecting unauthorized access points, comprising:
- a monitoring device connected to the network that simulates a user and requests connection to the network through an available access point; and
an authentication server that authenticates users and maintains a configuration file with an identifier associated with each authorized access point for the network;
wherein the monitoring device requests an identifier from the available access point, the requested identifier identifying the available access point, and wherein the authentication server compares the requested identifier with each identifier in the configuration file, in order to determine whether the available access point is an authorized access point.
5 Assignments
0 Petitions
Accused Products
Abstract
A public wireless network has authorized wireless access points through which users connect to the network. A system for detecting the unauthorized access points comprises a monitoring client simulating a user and detecting available access points. The system further comprises an authentication server that maintains a configuration file with an identifier associated with each authorized access point. The system is adapted to compare the identity of any available access point(s) to those maintained by the authentication server to detect unauthorized access points.
-
Citations
19 Claims
-
1. In a public wireless network where users connect to the network through a wireless access point, a system for detecting unauthorized access points, comprising:
-
a monitoring device connected to the network that simulates a user and requests connection to the network through an available access point; and an authentication server that authenticates users and maintains a configuration file with an identifier associated with each authorized access point for the network; wherein the monitoring device requests an identifier from the available access point, the requested identifier identifying the available access point, and wherein the authentication server compares the requested identifier with each identifier in the configuration file, in order to determine whether the available access point is an authorized access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 18)
-
-
11. A method for detecting unauthorized access points in a public wireless network serving wireless users within a predetermined geographical area, comprising:
-
storing an identifier associated with one or more authorized access points for the network; providing a monitoring client that simulates a user for detecting available wireless access points within the area; requesting, with the monitoring client, an identifier from an available access point, wherein the identifier identifies the available access point; determining an identity of the available access point, based at least in part on the identifier; comparing, with an authentication server, the identity of the available access point with the stored identifier associated with the authorized access point; and authenticating users, with the authentication server. - View Dependent Claims (12, 13, 14, 15, 16, 17, 19)
-
Specification