Threat index based WLAN security and quality of service
First Claim
1. A computer-implemented method comprising:
- receiving a request from a client device connected to a network via a wireless link, wherein the request is communicated from the client device over the wireless link to a wireless access point;
determining, by the wireless access point, a threat index value for the client device, wherein the threat index value is determined based on one or more radio frequency (RF) characteristics of the client device communicating over the wireless link and a reliability index value associated with the client device, wherein the one or more RF characteristics comprise an angle of arrival, a beamforming characteristic, or a received signal strength indicator (RSSI);
determining one or more security policies associated with one or more respective network resources, wherein each security policy applies one or more rules for allocating one of the network resources; and
determining allocation of one or more of the network resources to the client device based on the one or more security policies and the threat index value.
4 Assignments
0 Petitions
Accused Products
Abstract
Implementations generally relate methods, systems, and computer readable media for providing threat index based wireless local area networks (WLAN) security and quality of service. In one implementation, a method includes receiving a request from a client device connected to a network via a network link. The method further includes determining a threat index value for the client device. The method further includes determining one or more security policies associated with one or more respective network resources, where each security policy applies one or more rules for allocating one of the network resources. The method further includes determining allocation of one or more of the network resources to the client device based on the one or more security policies and the threat index value.
-
Citations
17 Claims
-
1. A computer-implemented method comprising:
-
receiving a request from a client device connected to a network via a wireless link, wherein the request is communicated from the client device over the wireless link to a wireless access point; determining, by the wireless access point, a threat index value for the client device, wherein the threat index value is determined based on one or more radio frequency (RF) characteristics of the client device communicating over the wireless link and a reliability index value associated with the client device, wherein the one or more RF characteristics comprise an angle of arrival, a beamforming characteristic, or a received signal strength indicator (RSSI); determining one or more security policies associated with one or more respective network resources, wherein each security policy applies one or more rules for allocating one of the network resources; and determining allocation of one or more of the network resources to the client device based on the one or more security policies and the threat index value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
one or more processors coupled to a computer-readable medium having stored thereon software instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including; receiving a request from a client device connected to a network via a wireless link to a wireless access point, wherein the request is communicated from the client device over the wireless link; determining a threat index value for the client device, wherein the threat index value is determined based on one or more radio frequency (RF) characteristics of the client device communicating over the wireless link and a reliability index value associated with the client device, wherein the one or more RF characteristics comprise an angle of arrival, a beamforming characteristic, or a received signal strength indicator (RSSI); determining one or more security policies associated with one or more respective network resources, wherein each security policy applies one or more rules for allocating one of the network resources; and determining allocation of one or more of the network resources to the client device based on the one or more security policies and the threat index value. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium having stored thereon software instructions that, when executed by one or more processors, cause the one or more processors to perform operations including;
-
receiving a request from a client device connected to a network via a wireless link to a wireless access point, wherein the request is communicated from the client device over the wireless link; determining a threat index value for the client device, wherein the threat index value is determined based on one or more radio frequency (RF) characteristics of the client device communicating over the wireless link and a reliability index value associated with the client device, wherein the one or more RF characteristics comprise an angle of arrival, a beamforming characteristic, or a received signal strength indicator (RSSI); determining one or more security policies associated with one or more respective network resources, wherein each security policy applies one or more rules for allocating one of the network resources; and determining allocation of one or more of the network resources to the client device based on the one or more security policies and the threat index value. - View Dependent Claims (15, 16, 17)
-
Specification