Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System and method for identifying unauthorized or misconfigured wireless access point

A wireless access point, unauthorized technology used in wireless communications, security devices, electrical components, etc. to reduce data loss and possibility

Inactive Publication Date: 2013-10-30
IBM CORP
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Despite current efforts to control access via WAP, there are still a number of problems with traditional methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for identifying unauthorized or misconfigured wireless access point
  • System and method for identifying unauthorized or misconfigured wireless access point
  • System and method for identifying unauthorized or misconfigured wireless access point

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Aspects of the invention will be described herein in the context of an exemplary apparatus and method for identifying unauthorized or misconfigured wireless access points (WAPs) in a communications network (eg, a corporate intranet) that includes multiple endpoints. To this end, exemplary embodiments of the present invention advantageously place agents on multiple endpoints and then, based on the information received from the endpoints and the application of prescribed criteria (e.g., business rules), cause at least a subset of said endpoints to execute Certain operations, such as active probing operations, yield sufficient information to identify misconfigured and / or inappropriate WAPs in the network. Accordingly, techniques in accordance with exemplary embodiments of the present invention advantageously perform WAP monitoring and probing to identify unauthorized or misconfigured WAPs.

[0023] It is to be understood, however, that the invention is not limited to the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for identifying unauthorized and / or misconfigured wireless access points (WAPs) in a communication network includes multiple network endpoints and multiple agents running on endpoints. The agents are adapted to periodically locate WAPs and to report located WAPs to a central entity. The system further includes a central entity operative to receive information from the agents regarding located WAPs, to determine whether at least a given one of the located WAPs needs to be probed, and to initiate active probing of located WAPs when it is determined that the given one of the located WAPs needs to be probed.

Description

technical field [0001] The present invention relates generally to the fields of electricity, electronics and computers. More specifically, the present invention relates to secure wireless communications. Background technique [0002] Wireless networks have become a popular communication medium. Businesses of all sizes build wireless networks (for example, using the IEEE 802.11 protocol standard or similar) for a number of reasons, including—but not limited to—reducing wiring costs, providing connectivity throughout a large office or warehouse space, Facilitate employee communication, provide guests with network connectivity, provide remote data access capabilities, and more. However, with the increasing reliance on wireless communication systems as a means of transmitting important business information, vulnerabilities in such systems have been exploited to gain access to important business information and systems. [0003] The security challenges associated with wireless...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W24/04H04W24/10
CPCH04W12/08H04W24/10H04W24/04H04W12/12H04W24/06H04W12/128H04W12/122
Inventor T·D·埃斯卡米拉C·S·林戈菲尔特D·R·萨弗尔德
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products