System and method for determining location of rogue wireless access point
First Claim
1. A method for determining a location of an unauthorized wireless access point (“
- AP”
) accessing a communication network, comprising;
upon notification of existence of the unauthorized AP, tracking a beacon of the unauthorized AP using at least three authorized APs of the communication network;
generating a tracking data record partially based on information obtained in the tracking step, the tracking record including a location of each of the authorized APs and at least one of (i) a first strength data corresponding to a strength of the tracking beacon as measured by each of the authorized APs and (ii) a first time data corresponding to a time period that it takes for the tracking beacon to arrive at each of the authorized APs; and
determining the location of the unauthorized AP as a function of at least one of (i) the tracking record and (ii) a calibrating record, the calibrating record including (a) at least one of a second strength data corresponding to a strength of a calibrating beacon as transmitted from a predetermined location within the communication network and received by each of the authorized APs and a second time data corresponding to a time period that it takes for the calibrating beacon to arrive from the predetermined location to each of the authorized AP, (b) the predetermined location and (c) the location of each of the authorized AP.
11 Assignments
0 Petitions
Accused Products
Abstract
Described are a method and system for determining a location of an unauthorized wireless access point (“AP”) accessing a communication network. Upon notification of existence of the unauthorized AP, at least three authorized APs of the communication network initiate tracking a beacon of the unauthorized AP. A tracking data record is generated partially based on information obtained during the tracking of the tracking beacon. The tracking record may include a location of each of the authorized APs and at least one of (i) a first strength data corresponding to a strength of the tracking beacon as measured by each of the authorized APs and (ii) a first time data corresponding to a time period that it takes for the tracking beacon to arrive at each of the authorized APs. The location of the unauthorized AP is determined as a function of at least one of (i) the tracking record and (ii) a calibrating record. The calibrating record may include (a) at least one of a second strength data corresponding to a strength of a calibrating beacon as transmitted from a predetermined location within the communication network and received by each of the authorized APs and a second time data corresponding to a time period that it takes for the calibrating beacon to arrive from the predetermined location to each of the authorized AP, (b) the predetermined location and (c) the location of each of the authorized AP.
48 Citations
19 Claims
-
1. A method for determining a location of an unauthorized wireless access point (“
- AP”
) accessing a communication network, comprising;
upon notification of existence of the unauthorized AP, tracking a beacon of the unauthorized AP using at least three authorized APs of the communication network;
generating a tracking data record partially based on information obtained in the tracking step, the tracking record including a location of each of the authorized APs and at least one of (i) a first strength data corresponding to a strength of the tracking beacon as measured by each of the authorized APs and (ii) a first time data corresponding to a time period that it takes for the tracking beacon to arrive at each of the authorized APs; and
determining the location of the unauthorized AP as a function of at least one of (i) the tracking record and (ii) a calibrating record, the calibrating record including (a) at least one of a second strength data corresponding to a strength of a calibrating beacon as transmitted from a predetermined location within the communication network and received by each of the authorized APs and a second time data corresponding to a time period that it takes for the calibrating beacon to arrive from the predetermined location to each of the authorized AP, (b) the predetermined location and (c) the location of each of the authorized AP. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- AP”
-
9. A system for determining a location of an unauthorized wireless access point (“
- AP”
) accessing a communication network, comprising;
a plurality of authorized APs; and
a computing arrangement, wherein upon notification of existence of the unauthorized AP, at least three authorized APs of the plurality of the authorized APs track a beacon of the unauthorized AP, the at least three authorized APs generating a tracking data record which includes a location of each of the authorized APs and at least one (i) a first strength data corresponding to a strength of the tracking beacon as measured by each of the authorized APs and (ii) a first time data corresponding to a time period that it takes for the tracking beacon to arrive at each of the authorized APs, and wherein the computer determines the precise location of the unauthorized AP as a function of the tracking record and a calibrating data record, the calibrating record including (a) at least one of (i) a second strength data corresponding to a strength of a calibrating beacon as transmitted from a predetermined location within the communication network and received by each of the authorized APs and (ii) a second time data corresponding to a time period that it takes for the calibrating beacon to arrive from the predetermined location at each of the authorized APS, (b) the predetermined location and (c) the location of each of the authorized APS. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
- AP”
-
19. A computing device for determining a location of an unauthorized wireless access point (“
- AP”
) accessing a communication network, comprising;
a memory arrangement storing a calibrating data record;
a communication arrangement communicating with the authorized APs; and
a processor determining the precise location of the unauthorized AP as a function of at least one of a tracking data record and the calibrating data record, wherein the tracking record is generated by at least three authorized APs of a plurality of authorized APs during tracking of the unauthorized AP, the data record including a location of each of the authorized APs and at least one (i) a first strength data corresponding to a strength of a tracking beacon as measured by each of the authorized APs and (ii) a first time data corresponding to a time period that it takes for the tracking beacon to arrive at each of the authorized APs, and wherein the calibrating record includes (a) at least one of (i) a second strength data corresponding to a strength of a calibrating beacon as transmitted from a predetermined location within the communication network and received by each of the authorized APs and (ii) a second time data corresponding to a time period that it takes for the calibrating beacon to arrive from the predetermined location at each of the authorized APs,(b) the predetermined location and (c) the location of each of the authorized APs.
- AP”
Specification