Methods, apparatus and program products which monitor wireless access points (12, 16) through which data can be exchanged with a network (10), identify an unauthorized access point (16), and respond to monitored data flow in a variety of manners including determining the location of the identified unauthorized access point, establishing filtering, and controlling accounting for access services.

 
Web www.patentalert.com

< Dynamic controls for use in computing applications

> Computationally-efficient estimation of the location of a wireless terminal based on pattern matching

~ 00436