摘要 |
Methods, apparatus and program products which monitor wireless access points through which data can be exchanged with a network, identify an unauthorized access point, and respond to monitored data flow in a variety of manners including determining the location of the identified unauthorized access point, astablishing filtering, and controlling accounting for access services. |
申请人 |
INTERNATIONAL BUSINESS MACHINES CORPORATION;CHALLENER, DAVID, C.;KUMP, GARRY, M.;NOEL, FRANCIS, E., JR.;SAFFORD, DAVID, R.;SCHALES, DOUGLAS, L.;VAN DOORN, LEENDERT, P. |
发明人 |
CHALLENER, DAVID, C.;KUMP, GARRY, M.;NOEL, FRANCIS, E., JR.;SAFFORD, DAVID, R.;SCHALES, DOUGLAS, L.;VAN DOORN, LEENDERT, P. |