Wireless networks security system
First Claim
1. An IEEE 802.11 security system for monitoring wireless networks and detecting, neutralizing and locating unauthorized or threatening IEEE 802.11 devices, said security system comprising a network appliance subsystem and a portable computing subsystem, wherein, said network appliance subsystem comprises:
- signal processing means for detecting and monitoring IEEE 802.11 signals;
analytical means for analysing information gathered from said unauthorized or threatening IEEE 802.11 devices and determining nature of security breach; and
alerting means for alarming administrative staff of said unauthorized or threatening IEEE 802.11 devices;
and said portable computing subsystem comprises;
a directional antenna for locating said unauthorized or threatening IEEE 802.11 devices; and
signal processing means for managing IEEE 802.11 interface and interpreting information gathered by said directional antenna and data means to interface between said network appliance subsystem and said portable computing subsystem.
0 Assignments
0 Petitions
Accused Products
Abstract
An IEEE 802.11 security system for monitoring wireless networks with a view to detecting and locating unauthorized or threatening IEEE 802.11 devices entering a user'"'"'s wireless network environment or a facility not intended to support wireless networks is disclosed. The security system comprises a network appliance subsystem and a portable computing subsystem with data means to interface between the two systems. Optionally, counter-measuring means for launching neutralizing and/or disabling counter-measures against a suspected device upon activation can be incorporated into the security system. A method of operation of the IEEE 802.11 security system is also disclosed.
-
Citations
18 Claims
-
1. An IEEE 802.11 security system for monitoring wireless networks and detecting, neutralizing and locating unauthorized or threatening IEEE 802.11 devices, said security system comprising a network appliance subsystem and a portable computing subsystem, wherein,
said network appliance subsystem comprises: -
signal processing means for detecting and monitoring IEEE 802.11 signals;
analytical means for analysing information gathered from said unauthorized or threatening IEEE 802.11 devices and determining nature of security breach; and
alerting means for alarming administrative staff of said unauthorized or threatening IEEE 802.11 devices;
and said portable computing subsystem comprises;
a directional antenna for locating said unauthorized or threatening IEEE 802.11 devices; and
signal processing means for managing IEEE 802.11 interface and interpreting information gathered by said directional antenna and data means to interface between said network appliance subsystem and said portable computing subsystem. - View Dependent Claims (3, 5, 7, 9, 11)
-
-
2. An IEEE 802.11 security system for monitoring wireless networks and detecting, neutralizing and locating unauthorized or threatening IEEE 802.11 devices, said security system comprising a network appliance subsystem and a portable computing subsystem, wherein,
said network appliance subsystem comprises: -
signal processing means for detecting and monitoring IEEE 802.11 signals;
analytical means for analysing information gathered from said unauthorized or threatening IEEE 802.11 devices and determining nature of security breach;
alerting means for alarming administrative staff of said unauthorized or threatening IEEE 802.11 devices;
decoying means for distracting and alluring the attention of said unauthorized or threatening IEEE 802.11 devices; and
deceptive means for tricking lurking, unauthorized or eavesdropping IEEE 802.11 devices into revealing themselves by attempted associations with said decoying means;
and said portable computing subsystem comprises;
a directional antenna for locating said unauthorized or threatening IEEE 802.11 devices; and
signal processing means for managing IEEE 802.11 interface and interpreting information gathered by said directional antenna and data means to interface between said network appliance subsystem and said portable computing subsystem. - View Dependent Claims (4, 6, 8, 10, 12)
-
-
13. A method for monitoring IEEE 802.11 wireless networks and detecting, neutralizing and locating unauthorized or threatening IEEE 802.11 devices, said method comprising interfacing between a network appliance subsystem and a portable computing subsystem, wherein,
operation of said network appliance subsystem consists of: -
sensing an interference or attack from the unauthorized or threatening IEEE 802.11 device;
detecting and monitoring IEEE 802.11 signals with a signal processing means;
analysing information gathered from said unauthorized or threatening IEEE 802.11 devices and determining nature of security breach by an analytical means; and
alarming a user presence of said unauthorized or threatening IEEE 802.11 devices through an alerting means;
and operation of said portable computing subsystem consists of;
locating said unauthorized or threatening IEEE 802.11 devices through a directional antenna; and
managing IEEE 802.11 interface and interpreting information gathered by said directional antenna via a signal processing means. - View Dependent Claims (15, 17)
-
-
14. A method for monitoring IEEE 802.11 wireless networks and detecting, neutralizing and locating unauthorized or threatening IEEE 802.11 devices entering said wireless networks, said method comprising interfacing between a network appliance subsystem and a portable computing subsystem, wherein,
operation of said network appliance subsystem consists of: -
sensing an interference or attack from the unauthorized or threatening IEEE 802.11 device via a real-time alerting mechanism;
detecting and monitoring IEEE 802.11 signals with a signal processing means;
analysing information gathered from said unauthorized or threatening IEEE 802.11 devices and determining nature of security breach by an analytical means;
alarming a user presence of said unauthorized or threatening IEEE 802.11 devices through an alerting means; and
distracting and alluring the attention of said unauthorized or threatening IEEE 802.11 devices with decoying means;
and operation of said portable computing subsystem consists of;
locating said unauthorized or threatening IEEE 802.11 devices through a directional antenna; and
managing IEEE 802.11 interface and interpreting information gathered by said directional antenna via a signal processing means. - View Dependent Claims (16, 18)
-
Specification