Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture
First Claim
1. A wireless device monitoring method comprising:
- monitoring within a secure area for the presence of wireless communications transmitted from a wireless device located within the secure area;
issuing a request for device configuration information to the wireless device upon detection of the presence of the wireless communications;
receiving device configuration information from the wireless device, wherein the received device configuration information complies with a security protocol, compliance with the security protocol including at least one of the received device configuration information being signed with a digital signature and the received device configuration information being encrypted;
accessing stored device configuration information corresponding to the wireless device;
comparing the received device configuration information with the stored device configuration information andindicating the wireless device as one of authorized and unauthorized for presence at the secure area responsive to the comparing.
4 Assignments
0 Petitions
Accused Products
Abstract
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.
39 Citations
29 Claims
-
1. A wireless device monitoring method comprising:
-
monitoring within a secure area for the presence of wireless communications transmitted from a wireless device located within the secure area; issuing a request for device configuration information to the wireless device upon detection of the presence of the wireless communications; receiving device configuration information from the wireless device, wherein the received device configuration information complies with a security protocol, compliance with the security protocol including at least one of the received device configuration information being signed with a digital signature and the received device configuration information being encrypted; accessing stored device configuration information corresponding to the wireless device; comparing the received device configuration information with the stored device configuration information and indicating the wireless device as one of authorized and unauthorized for presence at the secure area responsive to the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A wireless device monitoring system comprising:
-
a plurality of node devices associated with respective ones of a plurality of secure areas, wherein the node devices are individually configured to detect the presence of wireless devices at a respective one of the secure areas associated with the individual node device and receive device configuration information from the wireless devices, wherein the received device configuration information complies with a security protocol, compliance with the security protocol including at least one of the received device configuration information being signed with a digital signature and the received device configuration information being encrypted and transmit the received device configuration information to a management device; and the management device coupled with the node devices and configured to receive the information regarding the wireless devices from the node devices, analyze the information, and to indicate, for an individual one of the node devices, whether respective ones of the wireless devices are authorized or unauthorized with respect to the respective one of the secure areas. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. An article of manufacture comprising:
-
media comprising programming configured to cause processing circuitry to perform processing comprising; monitoring within a secure area for the presence of wireless communications transmitted from a wireless device located within the secure area; issuing a request for device configuration information to the wireless device upon detection of the presence of the wireless communications; receiving device configuration information from the wireless device, wherein the received device configuration information complies with a security protocol, compliance with the security protocol including at least one of the received device configuration information being signed with a digital signature and the received device configuration information being encrypted; accessing stored device configuration information corresponding to the wireless device; comparing the received device configuration information with the stored device configuration information; and indicating the wireless device as one of authorized and unauthorized for presence at the secure area responsive to the comparing. - View Dependent Claims (27, 28, 29)
-
Specification