Claims
- 1. A policy violation detection and enforcement system for use in a wireless network, the system comprising:
a) a system data store (SDS) capable of storing one or more designations of wireless network attributes and configuration data associated with the one or more designations; b) a system processor comprising one or more processing elements, wherein the system processor is in communication with the SDS and wherein the one or more processing elements are programmed or adapted to:
i) detect a wireless network violation, wherein the wireless network violation has an associated set of one or more wireless network attributes; and ii) trigger a corrective action responsive to detecting the violation, wherein the corrective action is based upon the violation detected and the set of wireless network attributes associated with the violation detected.
- 2. The system of claim 1, and further comprising c) an interface allowing communication between the system processor and a device associated with the detected violation and wherein the programming or adaptation to trigger a corrective action comprises programming or adaptation to:
(1) establish a communication channel with the device associated with the detected violation via the interface; and (2) transmit instructions via the communication channel to configure one or more properties of the device, wherein the one or more properties are associated with at least one of the attributes in the set of wireless network attributes associated with the violation detected.
- 3. The system of claim 2, wherein the programming or adaptation to trigger a corrective action further comprises programming or. adaptation to (3) transmit a communication to a monitoring system or to a user.
- 4. The system of claim 1, wherein the corrective action triggered is further based upon configuration data in the SDS associated with the one or more attributes in the set.
- 5. The system of claim 4, and further comprising c) an interface allowing communication between the system processor and a device associated with the detected violation and wherein the programming or adaptation to trigger a corrective action comprises programming or adaptation to:
(1) establish a communication channel with a device associated with the detected violation via the interface; and (2) transmit instructions via the communication channel to configure one or more properties of the device, wherein the one or more properties are associated with a subset of one or more attributes in the set of wireless network attributes associated with the violation detected and wherein the instructions are based upon configuration data in the SDS associated with the subset of one or more attributes.
- 6. The system of claim 1, wherein the programming or adaptation to trigger a corrective action comprises programming or adaptation to transmit a communication to a monitoring system or to a user.
- 7. The system of claim 6, wherein the programming or adaptation to trigger a corrective action further comprises programming or adaptation to prepare a communication for transmission to a monitoring system.
- 8. The system of claim 7, wherein the programming or adaptation to prepare a communication comprises programming or adaptation to embed in the communication information associated with the violation detected.
- 9. The system of claim 8, wherein the information associated with the violation detected comprises an indicator of the violation detected, one or more indicators corresponding to attributes in the set associated with the violation detected, or one or more indicators corresponding to configuration data associated with one or more attributes in the set associated with the violation detected.
- 10. The system of claim 8, wherein the programming or adaptation to prepare a communication comprises further programming or adaptation to embed in the communication instructions that will cause the monitoring system to configure one or more devices in the wireless network based upon the information associated with the violation detected also embedded in the communication.
- 11. The system of claim 7, wherein the programming or adaptation to prepare a communication comprises programming or adaptation to embed instruction in the communication that will cause the monitoring system to log the violation detected.
- 12. The system of claim 6, and further comprising c) an interface allowing communication between the system processor and a device associated with the detected violation and wherein the programming or adaptation to trigger a corrective action comprises further programming or adaptation to establish a communication channel with the device via the interface and to transmit instructions via the communication channel to configure one or more properties of the device, wherein the one or more properties are associated with a subset of one or more attributes in the set of wireless network attributes associated with the violation detected and wherein the instructions are based upon configuration data in the SDS associated with the subset of one or more attributes.
- 13. The system of claim 6, wherein the programming or adaptation to trigger a corrective action further comprises programming or adaptation to prepare a communication that comprises information associated with the violation detected for transmission to a user.
- 14. The system of claim 13, wherein the programming or adaptation to prepare a communication comprises programming or adaptation to embed in the communication a responsive component that allows the user to provide feedback with respect to the communication.
- 15. The system of claim 14, wherein the embedded responsive component allows the user to provided feedback as a selection of an action from a menu of available actions, wherein the menu of available actions comprises ignore, delegate, log, correct or combinations thereof.
- 16. The system of claim 14, the programming or adaptation to transmit a communication comprises programming or adaptation to transmit the communication via one or more platforms selected from the group consisting of telephone, facsimile, pager, electronic mail, SMS, or web page.
- 17. The system of claim 14, and further comprising c) an interface allowing communication between the system processor and a device associated with the detected violation and wherein the embedded responsive component comprises a link created based upon the violation detected, wherein activation of the link by the user triggers establishment of a communication channel with the device via the interface and transmission of instructions via the communication channel to configure one or more properties of the device, wherein the one or more properties are associated with a subset of one or more attributes in the set of wireless network attributes associated with the violation detected and wherein the instructions are based upon configuration data in the SDS associated with the subset of one or more attributes.
- 18. The system of claim 14, wherein the programming or adaptation to trigger a corrective action further comprises programming or adaptation to receive user feedback with respect to the communication via one or more platforms selected from the group consisting of an automated voice or tone telephonic response system, a facsimile transmission followed by character recognition performed on the received transmission, an e-mail response system, an SMS return message or a Web server.
- 19. The system of claim 13, the programming or adaptation to transmit a communication comprises programming or adaptation to transmit the communication via one or more platforms selected from the group consisting of telephone, facsimile, pager, electronic mail, SMS, or web page.
- 20. A method for policy violation detection and enforcement in a wireless network, the method comprising the steps of:
a) detecting a wireless network violation, wherein the wireless network violation has an associated set of one or more wireless network attributes; b) notifying a user or a further system of the detected violation; and c) trigger a corrective action responsive to detecting the violation by at least performing the steps comprising of:
i) determining a device based upon the detected violation, the wireless network attribute set associated therewith or a combination thereof; ii) establishing a communication channel with the determined device; and iii) transmitting instructions via the communication channel to configure one or more properties of the determined device, wherein the one or more properties are based at least in part upon the detected violation, the set of wireless network attributes associated with the detected violation, the determined device or combinations thereof.
- 21. One or more computer readable media storing instruction that upon execution by a system process cause the system processor to perform the steps comprising of:
a) detecting a wireless network violation, wherein the wireless network violation has an associated set of one or more wireless network attributes; b) notifying a user or a further system of the detected violation; and c) triggering a corrective action responsive to detecting the violation by at least performing the steps comprising of:
i) determining an device based upon the detected violation, the wireless network attribute set associated therewith or a combination thereof; ii) establishing a communication channel with the determined device; and iii) transmitting instructions via the communication channel to configure one or more properties of the determined device, wherein the one or more properties are based at least in part upon the detected violation, the set of wireless network attributes associated with the detected violation, the determined device or combinations thereof.
- 22. A policy violation detection and enforcement system for use in a wireless network, the system comprising:
a) storing means for storing one or more designations of wireless network attributes and configuration data associated with the one or more designations; b) detecting means for detecting a wireless network violation, wherein the wireless network violation has an associated set of one or more wireless network attributes from the storing means; c) identification means for identifying a device impacted by the detected violation based upon the detected violation, the wireless network attribute set associated therewith or a combination thereof; d) communication means for allowing communication with the device identified by the identification means; e) enforcement means for selecting instructions based upon the detected violation, the set of wireless network attributes associated with the detected violation, the device identified by the identification means or combinations thereof that upon receipt by the device configure one or more properties of the device and for transmitting the selected instruction to the device via the communication means; and f) notification means for notifying a user or a further system of the detected violation.
CROSS-REFERENCE TO RELATED PATENT APPLICATIONS
[0001] This application claims priority to, and incorporates by reference in its entirety for all purposes, commonly assigned provisional U.S. Patent Application Serial No. 60/464,464, filed Apr. 21, 2003, entitled “SYSTEMS AND METHODS FOR NETWORK SECURITY”.
[0002] This application is further a continuation-in-part of commonly assigned U.S. patent application Ser. No. 10/360,587, filed Feb. 6, 2003, entitled “SYSTEM AND METHOD FOR SENSING WIRELESS LAN ACTIVITY”, which is hereby incorporated by this reference in its entirety, and of the following commonly assigned U.S. Patent Applications filed Jun. 3, 2002, each of which incorporates by this reference in their entirety for all purposes:
1ApplicationNo.Title10/161,142“SYSTEMS AND METHODS FOR NETWORKSECURITY”10/161,440“SYSTEM AND METHOD FOR WIRELESSLAN DYNAMIC CHANNEL CHANGE WITHHONEYPOT TRAP”10/161,443“METHOD AND SYSTEM FOR ACTIVELYDEFENDING A WIRELESS LAN AGAINSTATTACKS”10/160,904“METHODS AND SYSTEMS FOR IDENTIFYINGNODES AND MAPPING THEIRLOCATIONS”10/161,137“METHOD AND SYSTEM FOR ENCRYPTEDNETWORK MANAGEMENT AND INTRUSIONDETECTION”
[0003] These applications in turn claim priority to commonly assigned provisional U.S. Patent Application Serial No. 60/381,829, filed May 20, 2002, entitled “SYSTEMS AND METHODS FOR NETWORK SECURITY”.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60464464 |
Apr 2003 |
US |
Continuation in Parts (6)
|
Number |
Date |
Country |
| Parent |
10360587 |
Feb 2003 |
US |
| Child |
10700842 |
Nov 2003 |
US |
| Parent |
10161440 |
Jun 2002 |
US |
| Child |
10700842 |
Nov 2003 |
US |
| Parent |
10161142 |
Jun 2002 |
US |
| Child |
10700842 |
Nov 2003 |
US |
| Parent |
10161443 |
Jun 2002 |
US |
| Child |
10700842 |
Nov 2003 |
US |
| Parent |
10160904 |
Jun 2002 |
US |
| Child |
10700842 |
Nov 2003 |
US |
| Parent |
10161137 |
Jun 2002 |
US |
| Child |
10700842 |
Nov 2003 |
US |