Aircraft wireless network for fixed aircraft components
First Claim
Patent Images
1. An aircraft wireless network for fixed aircraft components, comprising:
- a wireless access point located in the aircraft and defining the boundaries of the wireless network;
a wireless remote node fixedly located within the aircraft and communicating with the wireless network, located within the boundaries of the wireless network, and whose communication defines a radio frequency (RF) fingerprint; and
more than one fixed security nodes located within the boundaries of the wireless network, having a database of authorized RF fingerprints, and receiving communications of the wireless network;
wherein the more than one fixed security nodes compare the RF fingerprint of the received remote node communication with the database,wherein the more than one fixed security nodes a level of access of the wireless remote node to the wireless network based at least partially on the comparison of the RF fingerprint with the database based on repeated received communication, andwherein the more than one fixed security nodes triangulate the received communications to determine the location of the wireless remote node within the boundaries of the wireless network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for managing security in a wireless network for fixed aircraft components, having a wireless access point located in the aircraft and defining the boundaries of the wireless network, a wireless remote node fixedly located within the aircraft and communicating with the wireless network, and a fixed security node.
15 Citations
16 Claims
-
1. An aircraft wireless network for fixed aircraft components, comprising:
-
a wireless access point located in the aircraft and defining the boundaries of the wireless network; a wireless remote node fixedly located within the aircraft and communicating with the wireless network, located within the boundaries of the wireless network, and whose communication defines a radio frequency (RF) fingerprint; and more than one fixed security nodes located within the boundaries of the wireless network, having a database of authorized RF fingerprints, and receiving communications of the wireless network; wherein the more than one fixed security nodes compare the RF fingerprint of the received remote node communication with the database, wherein the more than one fixed security nodes a level of access of the wireless remote node to the wireless network based at least partially on the comparison of the RF fingerprint with the database based on repeated received communication, and wherein the more than one fixed security nodes triangulate the received communications to determine the location of the wireless remote node within the boundaries of the wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for managing security in a wireless network having a wireless access point located in the aircraft and defining the boundaries of the wireless network, a wireless remote node fixedly located within the aircraft and communicating with the wireless network, and a fixed security node, the method comprising:
-
receiving, in the fixed security node, a communication from the wireless remote node; creating an RF fingerprint of the wireless remote node based on the received communication; comparing the RF fingerprint with a database of authorized remote node RF fingerprints; determining if the wireless remote node is an authorized wireless remote node based on the comparison, authorizing, in the fixed security node, a level of access of the wireless remote node to the wireless network, the authorizing based at least partially on the comparison of the RF fingerprint with the database; providing indicia to a user based upon a determination that a remote node is unauthorized; receiving, in the fixed security node, a user input to update the database to include the unauthorized wireless remote node RF fingerprint; and learning an RF fingerprint variance of an authorized wireless remote node based on repeated received communication, wherein authorizing a level of access comprises at least one of granting full access, granting limited access, granting temporary access and denying access, wherein the database comprises a computer-searchable database of information, the computer-searchable database of information including memory and one or more processors, and wherein receiving, in the fixed security node, comprises receiving at least one communication in multiple fixed security nodes from the wireless remote node, and triangulating the at least one communication in the multiple fixed security nodes the location of the wireless remote node within the boundaries of the wireless network. - View Dependent Claims (14, 15, 16)
-
Specification