Method and apparatus for intrusion management in a wireless network using physical location determination
First Claim
1. A method for managing a wireless network, comprising:
- receiving radio-frequency signals emitted from a first wireless device communicating with said wireless network and at least one other wireless device coupled to said wireless network;
computing an indication of physical location of said first wireless device with respect to said at least one other wireless device in conformity with characteristics of said received signals; and
evaluating a connection between said first wireless device to said wireless network to determine whether or not said connection is undesirable in conformity with said indication of physical location.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for intrusion management in a wireless network uses distance measurement or location finding techniques to permit an administrator to manage security within a wireless network. A distance measurement or location-finding is performed between devices by transmitting and receiving one or more signals and computing an indication of physical location of a device attempting to connect or communicating within a wireless network. The resulting computed distance or location can be used to alert an administrator, provide a map of connected devices and/or automatically disconnect one or more suspect devices. Alternatively or in combination, changes in received signal amplitudes, time delays and/or other signal characteristics can be used to detect changes in the network due to intrusions.
179 Citations
46 Claims
-
1. A method for managing a wireless network, comprising:
-
receiving radio-frequency signals emitted from a first wireless device communicating with said wireless network and at least one other wireless device coupled to said wireless network;
computing an indication of physical location of said first wireless device with respect to said at least one other wireless device in conformity with characteristics of said received signals; and
evaluating a connection between said first wireless device to said wireless network to determine whether or not said connection is undesirable in conformity with said indication of physical location. - View Dependent Claims (2, 3, 4, 5, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
- 6. The method of claim 6, wherein said method further comprises in response to said other wireless devices receiving said alert, restricting communications within said wireless network.
-
22. A wireless network, comprising:
-
a first wireless communications device coupled to said wireless network;
at least one other wireless communications device coupled to said wireless network, and wherein said at least one other wireless communications device comprises a measurement sub-system for measuring characteristics of signals received at said at least one other wireless device;
a processing sub-system for computing an indication of a physical location of said first wireless device in conformity with said measured characteristics; and
a security sub-system for evaluating a connection between said first wireless device and said wireless network to determine that said connection is undesirable in conformity with said indication of physical location. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A method for managing a wireless network, comprising:
-
receiving radio-frequency signals emitted from a first wireless device connected to said wireless network and at least one other wireless device coupled to said wireless network;
determining that a characteristic of said received signal deviates from an expected characteristic of said received signal; and
evaluating a connection between said first wireless device to said wireless network to determine that said connection is undesirable in conformity with said determination. - View Dependent Claims (42, 43)
-
-
44. A wireless network, comprising:
-
a first wireless communications device coupled to said wireless network;
at least one other wireless communications device coupled to said wireless network, and wherein said at least one other wireless communications device comprises a measurement sub-system for measuring characteristics of signals received at said at least one other wireless device;
a processing sub-system for determining that a characteristic of said received signal deviates from an expected characteristic of said received signal; and
a security sub-system for evaluating a connection between said first wireless device and said wireless network to determine that said connection is undesirable in conformity with said determination by said processing subsystem. - View Dependent Claims (45, 46)
-
Specification