摘要:
A technique is disclosed for detecting hidden wireless routers that constitute security threats in telecommunications networks that comprise a wireless network portion and a wireline network portion. In accordance with the illustrative embodiment of the invention, a test station is used in the wireless portion of a network to detect the presence of a hidden wireless router. Furthermore, in some embodiments, a test server is used in the wireline portion of the network in order to detect packets that are illegitimately routed from the wireless portion to the wireline portion of the network through the hidden wireless router.
摘要:
A method and apparatus are provided for network security based on a security status of a device. A security update status of a device is evaluated; and one or more of a plurality of security policies are selected to apply to the device based on the security update status. The available security philosophies may include, for example, a “protect the good” philosophy, an “encourage the busy” philosophy and a “shut off the non-compliant” philosophy. The security update status can evaluate, for example, a version level of one or more security features installed on the device or can be based on a flag indicating whether the device satisfies predefined criteria for maintaining one or more computer security protection features up-to-date.
摘要:
A technique is disclosed for detecting hidden wireless routers that constitute security threats in telecommunications networks that comprise a wireless network portion and a wireline network portion. In accordance with the illustrative embodiment of the invention, a test station is used in the wireless portion of a network to detect the presence of a hidden wireless router. Furthermore, in some embodiments, a test server is used in the wireline portion of the network in order to detect packets that are illegitimately routed from the wireless portion to the wireline portion of the network through the hidden wireless router.
摘要:
A method and apparatus are provided for obtaining a signal strength model for an access point at an arbitrary location, q, at a site. Signal strength measurements are obtained for each of n sampling points; the signal strength received at the arbitrary location, q, is computed from each of said sampling points (for example, using reciprocity principles); signal strength estimates corresponding to the signal received at the sampling points from the arbitrary location are computed; and a signal strength model is determined for an access point positioned at the arbitrary location, q.
摘要:
A method for providing priority access to 802.11 endpoints. The method includes the steps of sending a Clear To Send (CTS) frame from a designated station, without requiring a Request to Send (RTS) frame from a first station. The CTS frame includes a field identifying the first station for commencing transmission, and a field indicating a duration of transmission. A deferring step is also performed for deferring any transmissions of stations other than the first station until after the duration indicated in the CTS frame has passed.
摘要:
A method and apparatus are provided for authenticating the contents of a device requesting access to a first network, such as an enterprise network. If a device has connected to at least one other network then the content of the device is evaluated prior to obtaining access. The scope of the content evaluation may be based, for example, on properties of the other network or on one or more defined content authentication rules. If a device attempts to access a network, the content of the device is evaluated and the device may be restricted to accessing only one or more restoration services if the content fails to satisfy one or more predefined criteria, such as a content item that is out of date or a determination that the device connected to one or more external networks. The restoration service(s) can update a content item that is out of date, reinstall one or more programs or return configuration settings to default values.
摘要:
A method and apparatus are provided for obtaining a signal strength model for an access point at an arbitrary location, q, at a site. Signal strength measurements are obtained for each of n sampling points; the signal strength received at the arbitrary location, q, is computed from each of the sampling points (for example, using reciprocity principles); signal strength estimates corresponding to the signal received at the sampling points from the arbitrary location are computed; and a signal strength model is determined for an access point positioned at the arbitrary location, q.
摘要:
A method and apparatus are provided for authenticating the contents of a device requesting access to a first network, such as an enterprise network. If a device has connected to at least one other network then the content of the device is evaluated prior to obtaining access. The scope of the content evaluation may be based, for example, on properties of the other network or on one or more defined content authentication rules. If a device attempts to access a network, the content of the device is evaluated and the device may be restricted to accessing only one or more restoration services if the content fails to satisfy one or more predefined criteria, such as a content item that is out of date or a determination that the device connected to one or more external networks. The restoration service(s) can update a content item that is out of date, reinstall one or more programs or return configuration settings to default values.
摘要:
A method and apparatus are disclosed that enable a data-processing system, such as a server, to determine whether or not to grant a telecommunications terminal one or more privileges, without some of the disadvantages of the prior art. Specifically, in accordance with the illustrative embodiments of the present invention, a call-processing server transmits, to a first terminal, a first signal for verifying a second terminal, such as one that has been designated by a user. The user is then required to transmit a second signal to the call-processing server via the second terminal. The call-processing server then examines the received second signal with respect to the first signal and determines whether or not to grant the second terminal a privilege (e.g., handling calls on behalf of the user, etc.), based on the relationship between the first and second signals.
摘要:
A method and apparatus are provided for authenticating the contents of a device requesting access to a first network, such as an enterprise network. If a device has connected to at least one other network then the content of the device is evaluated prior to obtaining access. The scope of the content evaluation may be based, for example, on properties of the other network or on one or more defined content authentication rules. If a device attempts to access a network, the content of the device is evaluated and the device may be restricted to accessing only one or more restoration services if the content fails to satisfy one or more predefined criteria, such as a content item that is out of date or a determination that the device connected to one or more external networks. The restoration service(s) can update a content item that is out of date, reinstall one or more programs or return configuration settings to default values.