US 7,322,044 B2 | ||
Systems and methods for automated network policy exception detection and correction | ||
Scott E. Hrastar, Duluth, Ga. (US) | ||
Assigned to AirDefense, Inc., Alpharetta, Ga. (US) | ||
Filed on Nov. 04, 2003, as Appl. No. 10/700,842. | ||
Application 10/700842 is a continuation in part of application No. 10/360587, filed on Feb. 06, 2003. | ||
Application 10/360587 is a continuation in part of application No. 10/161440, filed on Jun. 03, 2002, granted, now 7,042,852. | ||
Application 10/161440 is a continuation in part of application No. 10/161142, filed on Jun. 03, 2002, granted, now 7,086,089. | ||
Application 10/161142 is a continuation in part of application No. 10/161443, filed on Jun. 03, 2002, granted, now 7,058,796. | ||
Application 10/161443 is a continuation in part of application No. 10/160904, filed on Jun. 03, 2002. | ||
Application 10/160904 is a continuation in part of application No. 10/161137, filed on Jun. 03, 2002. | ||
Claims priority of provisional application 60/464464, filed on Apr. 21, 2003. | ||
Prior Publication US 2004/0098610 A1, May 20, 2004 | ||
Int. Cl. G06F 11/00 (2006.01) |
U.S. Cl. 726—22 | 22 Claims |
1. A policy violation detection and enforcement system for use in a wireless network, the system comprising:
a) a system data store (SDS) capable of storing one or more designations of wireless network attributes of wireless network
policy and configuration data associated with the one or more designations, wherein the wireless network attributes comprise
wireless channel settings, authentication settings, encryption settings, SSID broadcast settings, and rate settings;
b) a system processor comprising one or more processing elements, wherein the system processor is in communication with the
SDS and wherein the one or more processing elements are programmed or adapted to:
i) detect a wireless network policy violation of a device, wherein the wireless network policy violation comprises a deviation
from a set of one or more wireless network attributes associated with the policy violation detected; and
ii) trigger an automated corrective action responsive to detecting the policy violation, wherein the corrective action is
based upon the policy violation detected and the set of wireless network attributes associated with the policy violation detected,
and wherein the corrective action is configured to modify settings of the device in order for the device to operate according
to the set of one or more wireless network attributes associated with the policy violation detected.
|