会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD AND SYSTEM FOR MONITORING A SELECTED REGION OF AN AIRSPACE ASSOCIATED WITH LOCAL AREA NETWORKS OF COMPUTING DEVICES
    • 用于监视与计算设备的局域网相关联的空域的选定区域的方法和系统
    • WO2005057233A2
    • 2005-06-23
    • PCT/US2004/041296
    • 2004-12-08
    • AIRTIGHT NETWORKS, INC.BHAGWAT, PravinCHASKAR, HemantKING, David, C.RAWAT, Jai
    • BHAGWAT, PravinCHASKAR, HemantKING, David, C.RAWAT, Jai
    • G01S
    • H04W12/12H04K3/65H04K3/86H04K3/94H04K2203/18H04L29/12028H04L29/12367H04L41/28H04L61/103H04L61/2514H04L63/102H04L63/1408H04L63/1416H04L63/1466H04W12/06H04W12/08
    • A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy. Moreover, the method includes coupling a security appliance to the legacy local area network. The method also includes determining if the one or more sniffer devices substantially covers the portion of the unsecured airspace to be secured. The method additionally includes monitoring wireless activity in the airspace using the one or more sniffer devices, and automatically classifying, using a classification process, a portion of information associated with the monitoring of the wireless activity to at least determine if the wireless activity communicates to at least one of the one or more segments to be protected. Further, the method includes detecting a violation of the security policy based upon at least the classifying of the portion of the information from the monitoring of the wireless activity, and automatically processing an action associated with the violation in accordance to the security policy for the one or more segments in the legacy local area network to be protected.
    • 提供了一种用于监视与计算设备的局域网相关联的空域的选定区域的方法。 该方法包括提供要在选定地理区域中保护的传统局域网的一个或多个分段。 传统局域网的特点是在选定的地理区域内有一个不安全的空域。 该方法包括确定与传统局域网的一个或多个段相关联的安全策略。 安全策略至少表征了在不安全的空域中的一种类型的无线活动被允许,拒绝或忽略。 另外,该方法包括将一个或多个嗅探设备连接到传统局域网。 所述一个或多个嗅探器设备在空间上布置在所选择的地理区域内,以根据所述安全策略来使所述非安全空域的至少一部分安全。 此外,该方法包括将安全设备耦合到传统局域网。 该方法还包括确定一个或多个嗅探装置是否基本上覆盖了待固定的未固定空间的一部分。 该方法另外包括使用一个或多个嗅探器设备监测空域中的无线活动,并且使用分类过程来自动分类与监测无线活动相关联的信息的一部分,以至少确定无线活动是否与 要保护的一个或多个分段中的至少一个。 此外,该方法包括至少基于对来自监视无线活动的信息部分的分类来检测对安全策略的违反,并且根据针对该无线活动的安全策略自动处理与该违规相关联的动作 或者传统局域网中的更多分段被保护。