Claims
- 1. A method comprising the steps of:
monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point.
- 2. A method according to claim 1 wherein the step of monitoring comprises intermittently and periodically querying network nodes for recent entries into node identifying connectivity tables maintained at the nodes.
- 3. A method according to claim 2 wherein the step of monitoring comprises querying network nodes at predetermined regular intervals.
- 4. A method according to claim 2 wherein the step of monitoring comprises querying network nodes at random irregular intervals.
- 5. A method comprising the steps of:
querying access points through which data can be exchanged with a network and gathering connectivity table information from a queried access point, reporting through the network to a server computer system the information gathered by querying, identifying an unauthorized access point by operation of the server system, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point.
- 6. Apparatus comprising:
a server computer system, a network interface connected to said system and providing a communication channel between said system and a network, an access point identification program stored accessibly to said system and cooperating therewith when executing to identify unauthorized nodes accessible through said interface, and an accounting control program stored accessibly to said system and cooperating therewith when executing to accumulate charges for access and usage of network resources identified to the identified unauthorized access point.
- 7. A program product comprising:
a computer readable medium; and a program stored on said medium accessibly to a computer system, said program when executing on a system: monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point.
- 8. A program product comprising:
a computer readable medium; and a program stored on said medium accessibly to a computer system, said program when executing on a system: querying access points through which data can be exchanged with a network and gathering connectivity table information from a queried access point, reporting through the network to a server computer system the information gathered by querying, identifying an unauthorized access point by operation of the server system, and accumulating charges for access and usage of network resources identified to the identified unauthorized access point.
RELATED APPLICATION
[0001] The invention here described is related to an invention described in co-pending application Ser. No. 10/107,794 filed Mar. 27, 2002 and assigned to common ownership with this application.