System and method for providing variable security level in a wireless communication system
First Claim
1. A method for providing variable level security in a wireless communication system, the method comprising:
- a. establishing a first security level for trusted devices operating within a trust zone of the wireless communication system;
b. scanning the trust zone to detect the presence of intruders; and
c. establishing a second security level when an intruder is detected, wherein the second security level is higher than the first security level.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
30 Citations
48 Claims
-
1. A method for providing variable level security in a wireless communication system, the method comprising:
-
a. establishing a first security level for trusted devices operating within a trust zone of the wireless communication system;
b. scanning the trust zone to detect the presence of intruders; and
c. establishing a second security level when an intruder is detected, wherein the second security level is higher than the first security level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for providing variable level security in a wireless communication system, the method comprising:
-
a. establishing a first security level for trusted devices operating within a trust zone of the wireless communication system;
b. scanning the trust zone to detect the presence of intruders;
c. detecting the presence of an intruder;
d. establishing a second security level when an intruder is detected, wherein the second security level is higher than the first security level;
e. identifying the detected intruder;
f. determining whether the detected intruder is trusted or not trusted; and
g. establishing a third security level based on the determination of whether the detected intruder is trusted or not trusted. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A wireless communication system for providing variable level security, the system comprising;
-
a. at least one node including;
i. an intruder detector configured to detect intruders within a trust zone;
ii. an intruder identifier configured to identify detected intruders and determine whether the identified intruder is trusted or not trusted; and
iii. a security level controller configured to adjust the security level based on said determination; and
b. at least one security sensor configured to detect intruders and notify the intruder detector of the at least one node when an intruder is detected. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37)
-
-
38. A wireless node for providing variable level security comprising:
-
a. an intruder detector configured to detect intruders within a trust zone;
b. an intruder identifier configured to identify detected intruders and determine whether the identified intruder is trusted or not trusted; and
c. a security level controller configured to adjust the security level based on said determination. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. An integrated for providing:
-
a. an intruder detector configured to detect intruders within a trust zone;
b. an intruder identifier configured to identify detected intruders and determine whether the identified intruder is trusted or not trusted; and
c. a security level controller configured to adjust the security level based on said determination.
-
Specification