System and method for detection of a rogue wireless access point in a wireless communication network
First Claim
1. A method for detecting an unauthorized access point accessing a communication network, comprising the steps of:
- (a) detecting a beacon generated by a transmitting access point, the beacon including corresponding identification information of the transmitting access point;
(b) verifying the identification information of the transmitting access point with a preexisting database of the communication network, the preexisting database including corresponding identification information of a plurality of access points authorized to access the communication network; and
(c) initiating a tracking procedure to determine a location of the unauthorized access point where the verification of the transmitting access point identification information with the preexisting database fails.
11 Assignments
0 Petitions
Accused Products
Abstract
Described are a system and method for detecting an unauthorized access point accessing a communication network. An authorized access point and/or an authorized mobile unit detects a beacon generated by a transmitting access point. The beacon includes identification information of the transmitting access point. A computing arrangement verifies the identification information of the transmitting access point with a preexisting database of the communication network. The preexisting database includes data corresponding to identification information of a plurality of authorized access points. The computing arrangement initiates a tracking procedure to determine a location of the unauthorized access point where the verification of the transmitting access point identification information with the preexisting database fails.
-
Citations
24 Claims
-
1. A method for detecting an unauthorized access point accessing a communication network, comprising the steps of:
-
(a) detecting a beacon generated by a transmitting access point, the beacon including corresponding identification information of the transmitting access point;
(b) verifying the identification information of the transmitting access point with a preexisting database of the communication network, the preexisting database including corresponding identification information of a plurality of access points authorized to access the communication network; and
(c) initiating a tracking procedure to determine a location of the unauthorized access point where the verification of the transmitting access point identification information with the preexisting database fails. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for detecting an unauthorized access point accessing a communication network, the unauthorized access point generating a beacon including corresponding identification information, the system comprising:
-
a plurality of access points which are authorized to access the communication network, at least one authorized access point receiving beacons generated by a transmitting access point, the beacons including corresponding identification information of the transmitting access point; and
a computing arrangement performing a verification procedure by comparing the identification information of the transmitting access point to a preexisting database of the communication network, the preexisting database including identification information of the plurality of authorized access points, wherein if the verification procedure fails, the transmitting access point is the unauthorized access point and the computing arrangement initiates a tracking procedure to determine a location of the unauthorized access point. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification