System and method for detection of a rouge wireless access point in a wireless communication network
First Claim
1. A device, comprising:
- a communications arrangement detecting a beacon transmitted by an access point in a communications network, the beacon including identification information of the access point; and
a processor verifying the identification information with a preexisting database, the preexisting database including identification information of a plurality of access points authorized to access the communications network, wherein when the verification of the identification information fails, the processor identifies the access point as an unauthorized access point and sets conditions for which the unauthorized access point is allowed to access the communication network.
10 Assignments
0 Petitions
Accused Products
Abstract
Described are a system and method for detecting an unauthorized access point accessing a communication network. An authorized access point and/or an authorized mobile unit detects a beacon generated by a transmitting access point. The beacon includes identification information of the transmitting access point. A computing arrangement verifies the identification information of the transmitting access point with a preexisting database of the communication network. The preexisting database includes data corresponding to identification information of a plurality of authorized access points. The computing arrangement initiates a tracking procedure to determine a location of the unauthorized access point where the verification of the transmitting access point identification information with the preexisting database fails.
91 Citations
20 Claims
-
1. A device, comprising:
-
a communications arrangement detecting a beacon transmitted by an access point in a communications network, the beacon including identification information of the access point; and
a processor verifying the identification information with a preexisting database, the preexisting database including identification information of a plurality of access points authorized to access the communications network, wherein when the verification of the identification information fails, the processor identifies the access point as an unauthorized access point and sets conditions for which the unauthorized access point is allowed to access the communication network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing arrangement,
a communications arrangement communicating with a plurality of access points authorized to communicate on a communications network; -
a memory storing identification information of an access point that was received in a beacon from the access point by at least one of the plurality of authorized access points, the memory further storing a preexisting database including identification information of the plurality of authorized access points; and
a processor performing a verification procedure by comparing the identification information of the access point to the identification information in the preexisting database, wherein when the verification fails, the processor identifies the access point as an unauthorized access point and sets conditions for which the unauthorized access point is allowed to access the communications network. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
scanning a plurality of radio frequency channels in a wireless communications network to detect a beacon from an access point, the beacon including identification information of the access point;
transmitting the identification information to a computing arrangement for performing a verification procedure, the verification procedure including a comparison of the identification information to a preexisting database of identification information of a plurality of access points authorized to communicate on the communications network; and
if the access point fails the verification procedure, generating an activity record of activities of the access point. - View Dependent Claims (17, 18, 19)
-
-
20. An arrangement, comprising:
-
a communications means for detecting a beacon transmitted by an access point in a communications network, the beacon including corresponding identification information of the access point; and
a processing means for verifying the identification information with a preexisting database, the preexisting database including identification information for a plurality of access points authorized to access the communications network, wherein when the verification of the identification information fails, the access point is an unauthorized access point, the processing means sets conditions for allowing the unauthorized access point to access the communications network.
-
Specification