Containment of rogue systems in wireless network environments
    1.
    发明授权
    Containment of rogue systems in wireless network environments 有权
    在无线网络环境中控制流氓系统

    公开(公告)号:US08000308B2

    公开(公告)日:2011-08-16

    申请号:US12254420

    申请日:2008-10-20

    IPC分类号: H04W4/00

    摘要: Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.

    摘要翻译: 促进在无线计算机网络环境中容纳流氓或未经授权接入点的影响的方法,装置和系统。 本发明的实施例支持一个到多个流氓封闭方法。 第一流氓包围类型涉及识别流氓接入点到有线网络基础设施的物理连接,因此允许禁止该物理连接以包含流氓接入点。 其他流氓遏制方法涉及无线技术,用于包含流氓接入点的影响。 如下所述,本文描述的流氓封锁功能可以应用于各种各样的无线网络系统体系结构。

    Containment of Rogue Systems in Wireless Network Environments
    2.
    发明申请
    Containment of Rogue Systems in Wireless Network Environments 有权
    在无线网络环境中遏制盗贼系统

    公开(公告)号:US20090271864A1

    公开(公告)日:2009-10-29

    申请号:US12254420

    申请日:2008-10-20

    IPC分类号: G06F21/00

    摘要: Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.

    摘要翻译: 促进在无线计算机网络环境中容纳流氓或未经授权接入点的影响的方法,装置和系统。 本发明的实施例支持一个到多个流氓封闭方法。 第一流氓包围类型涉及识别流氓接入点到有线网络基础设施的物理连接,因此允许禁止该物理连接以包含流氓接入点。 其他流氓遏制方法涉及无线技术,用于包含流氓接入点的影响。 如下所述,本文描述的流氓封锁功能可以应用于各种各样的无线网络系统体系结构。

    Discovery of rogue access point location in wireless network environments
    3.
    发明授权
    Discovery of rogue access point location in wireless network environments 有权
    在无线网络环境中发现流氓接入点的位置

    公开(公告)号:US08089974B2

    公开(公告)日:2012-01-03

    申请号:US11965162

    申请日:2007-12-27

    IPC分类号: H04L12/28

    摘要: Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.

    摘要翻译: 在无线计算机网络环境中方便,设备和系统便于定位或遏制流氓或未经授权的接入点。 本发明的实施例支持一个到多个流氓封闭方法。 第一流氓包围类型涉及识别流氓接入点到有线网络基础设施的物理连接,因此允许禁止该物理连接以包含恶意接入点。 其他流氓遏制方法涉及无线技术,用于包含流氓接入点的影响。 在一些实施例中,本发明提供促进流氓接入点的网络位置的方法,装置和系统,以确定是否应该应用一个或多个流氓容纳方法。 如下所述,本文描述的流氓位置和容纳功能可以应用于各种各样的无线网络系统架构。

    Discovery of rogue access point location in wireless network environments
    5.
    发明授权
    Discovery of rogue access point location in wireless network environments 有权
    在无线网络环境中发现流氓接入点的位置

    公开(公告)号:US07336670B1

    公开(公告)日:2008-02-26

    申请号:US10692699

    申请日:2003-10-24

    IPC分类号: H04L12/28

    摘要: Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.

    摘要翻译: 在无线计算机网络环境中方便,设备和系统便于定位或遏制流氓或未经授权的接入点。 本发明的实施例支持一个到多个流氓封闭方法。 第一流氓包围类型涉及识别流氓接入点到有线网络基础设施的物理连接,因此允许禁止该物理连接以包含恶意接入点。 其他流氓遏制方法涉及无线技术,用于包含流氓接入点的影响。 在一些实施例中,本发明提供促进流氓接入点的网络位置的方法,装置和系统,以确定是否应该应用一个或多个流氓容纳方法。 如下所述,本文描述的流氓位置和容纳功能可以应用于各种各样的无线网络系统架构。