Systems and methods for detecting rogue client devices connected to wireless hotspots
    1.
    发明授权
    Systems and methods for detecting rogue client devices connected to wireless hotspots 有权
    用于检测连接到无线热点的恶意客户端设备的系统和方法

    公开(公告)号:US09088894B1

    公开(公告)日:2015-07-21

    申请号:US14037343

    申请日:2013-09-25

    CPC classification number: H04W12/06 H04W12/12

    Abstract: A computer-implemented method for detecting rogue client devices connected to wireless hotspots may include maintaining at least one illegitimate authentication identifier that appears to rogue client devices to facilitate authentication with an external network via a wireless hotspot. The method may also include providing the illegitimate authentication identifier to one or more client devices connected to the wireless hotspot. The method may further include receiving an authentication request to authenticate the client device with at least one external network via the wireless hotspot. The method may additionally include determining that the authentication request includes the illegitimate authentication identifier. Finally, the method may include determining that the client device is a rogue device based at least in part on the illegitimate authentication identifier being included in the authentication request. Various other methods, systems, and computer-readable media are also disclosed.

    Abstract translation: 用于检测连接到无线热点的流氓客户端设备的计算机实现的方法可以包括维护至少一个看起来欺骗客户端设备的非法身份验证标识符,以促进经由无线热点与外部网络的认证。 该方法还可以包括向连接到无线热点的一个或多个客户端设备提供非法认证标识符。 该方法还可以包括经由无线热点接收用至少一个外部网络来认证客户端设备的认证请求。 该方法可以另外包括确定认证请求包括非法认证标识符。 最后,该方法可以包括至少部分地基于认证请求中包括的非法认证标识来确定客户端设备是流氓设备。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for detecting rogue client devices connected to wireless hotspots

    公开(公告)号:US09467855B1

    公开(公告)日:2016-10-11

    申请号:US14740226

    申请日:2015-06-15

    CPC classification number: H04W12/06 H04W12/12

    Abstract: A computer-implemented method for detecting rogue client devices connected to wireless hotspots may include maintaining at least one illegitimate authentication identifier that appears to rogue client devices to facilitate authentication with an external network via a wireless hotspot. The method may also include providing the illegitimate authentication identifier to one or more client devices connected to the wireless hotspot. The method may further include receiving an authentication request to authenticate the client device with at least one external network via the wireless hotspot. The method may additionally include determining that the authentication request includes the illegitimate authentication identifier. Finally, the method may include determining that the client device is a rogue device based at least in part on the illegitimate authentication identifier being included in the authentication request. Various other methods, systems, and computer-readable media are also disclosed.

Patent Agency Ranking