BackgroundCheck.run
Search For

David S Safford, 6113255 Red Deer Trl, Broomfield, CO 80020

David Safford Phones & Addresses

Broomfield, CO   

Lafayette, CO   

Mc Kinney, TX   

Littleton, CO   

Austin, TX   

Murrieta, CA   

Temecula, CA   

Foster City, CA   

Hays, TX   

Mentions for David S Safford

David Safford resumes & CV records

Resumes

David Safford Photo 39

David Safford

David Safford Photo 40

David Safford

Publications & IP owners

Us Patents

Identification Of Unauthorized Or Misconfigured Wireless Access Point Using Distributed Endpoints

US Patent:
2013029, Oct 31, 2013
Filed:
Apr 25, 2012
Appl. No.:
13/455419
Inventors:
Terry Dwain Escamilla - Lafayette CO, US
Charles Steven Lingafelt - Durham NC, US
David Robert Safford - Brewster NY, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 21/00
H04W 8/00
US Classification:
726 4
Abstract:
A system for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes multiple network endpoints and multiple agents running on endpoints. The agents are adapted to periodically locate WAPs and to report located WAPs to a central entity. The system further includes a central entity operative to receive information from the agents regarding located WAPs, to determine whether at least a given one of the located WAPs needs to be probed, and to initiate active probing of located WAPs when it is determined that the given one of the located WAPs needs to be probed.

Identification Of Unauthorized Or Misconfigured Wireless Access Point Using Distributed Endpoints

US Patent:
2013029, Oct 31, 2013
Filed:
Apr 30, 2012
Appl. No.:
13/459383
Inventors:
Terry Dwain Escamilla - Lafayette CO, US
Charles Steven Lingafelt - Durham NC, US
David Robert Safford - Brewster NY, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 21/00
H04W 12/00
US Classification:
726 4
Abstract:
A method for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes the steps of: an agent running on an endpoint in the communication network locating one or more WAPs in the communication network; the agent reporting at least one located WAP to a central entity; and the central entity performing steps of applying prescribed criteria to determine whether the located WAP needs to be probed, and initiating active probing of the located WAP when it is determined that the located WAP needs to be probed to thereby determine whether the located WAP is unauthorized and/or misconfigured.

Isbn (Books And Publications)

A Practical Guide To Trusted Computing

Author:
David Safford
ISBN #:
0132398427

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.