WIRELESS MANAGER AND METHOD FOR CONFIGURING AND SECURING WIRELESS ACCESS TO A NETWORK
First Claim
1. A processor for executing a wireless manager to configure and secure wireless access to a network, wherein the processor is configured to:
- display a graphical user interface that includes a map associated with a location in a network and multiple access points associated with the location in the network;
generate an access zone that identifies a geographic space associated with the location in the network in response to one or more inputs to the graphical user interface, wherein the one or more inputs to the graphical user interface define a polygon region that corresponds to the geographic space associated with the access zone;
triangulate a physical position associated with a client device that requested wireless access to the network relative to the geographic space associated with the access zone, wherein the access zone includes one or more security parameters that control wireless access to the network relative to the geographic space associated with the access zone; and
authorize the client device to wirelessly access the network if the physical position associated with the client device does not violate the one or more security parameters associated with the access zone that control wireless access to the network.
3 Assignments
0 Petitions
Accused Products
Abstract
The disclosure provides a wireless manager operable to receive a request from a mobile device to wirelessly communicate with a network, wherein the request may include information to dynamically identify a location associated with the mobile device. The wireless manager may be further operable to automatically associate the mobile device with an access zone comprising one or more physical or logical characteristics, compare the location associated with the mobile device to the access zone, and authorize the mobile device to wirelessly communicate with the network if the location associated with the mobile device indicates that the mobile device does not violate the access zone.
-
Citations
18 Claims
-
1. A processor for executing a wireless manager to configure and secure wireless access to a network, wherein the processor is configured to:
-
display a graphical user interface that includes a map associated with a location in a network and multiple access points associated with the location in the network; generate an access zone that identifies a geographic space associated with the location in the network in response to one or more inputs to the graphical user interface, wherein the one or more inputs to the graphical user interface define a polygon region that corresponds to the geographic space associated with the access zone; triangulate a physical position associated with a client device that requested wireless access to the network relative to the geographic space associated with the access zone, wherein the access zone includes one or more security parameters that control wireless access to the network relative to the geographic space associated with the access zone; and authorize the client device to wirelessly access the network if the physical position associated with the client device does not violate the one or more security parameters associated with the access zone that control wireless access to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for configuring and securing wireless access to a network, comprising:
-
displaying a graphical user interface that includes a map associated with a location in a network and multiple access points associated with the location in the network; generating, by a processor executing a wireless manager, an access zone that identifies a geographic space associated with the location in the network in response to one or more inputs to the graphical user interface that define a polygon region that corresponds to the geographic space associated with the access zone; triangulating, by the processor executing the wireless manager, a physical position associated with a client device that requested wireless access to the network relative to the geographic space associated with the access zone, wherein the access zone includes one or more security parameters that control wireless access to the network relative to the geographic space associated with the access zone; and authorizing, by the processor executing the wireless manager, the client device to wirelessly access the network if the physical position associated with the client device does not violate the one or more security parameters associated with the access zone that control wireless access to the network. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification