LOCATING A WIRELESS COMMUNICATION ATTACK
First Claim
1. An apparatus for locating a wireless communication attack, comprising:
- at least one communications monitor operable to monitor communications activity;
a processor communicatively coupled with the communications monitor and operable to analyze any monitored communication activity against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device, wherein if the communication attempt by the suspected criminal device is detected by the processor, the processor is further operable to control a communication to the criminal device so as to delay completion of the communication to the criminal device; and
an interface communicatively coupled with the processor and operable to generate assistance for a system administrator to locate the criminal device.
4 Assignments
0 Petitions
Accused Products
Abstract
A technique for locating a wireless communication attack includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device. If the communication attempt by the suspected criminal device is detected by the analysis, a communication to the criminal device is controlled so as to delay completion of the communication to the criminal device in order to provide time to locate the criminal device.
15 Citations
19 Claims
-
1. An apparatus for locating a wireless communication attack, comprising:
-
at least one communications monitor operable to monitor communications activity; a processor communicatively coupled with the communications monitor and operable to analyze any monitored communication activity against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device, wherein if the communication attempt by the suspected criminal device is detected by the processor, the processor is further operable to control a communication to the criminal device so as to delay completion of the communication to the criminal device; and an interface communicatively coupled with the processor and operable to generate assistance for a system administrator to locate the criminal device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for locating a wireless communication attack, comprising:
-
monitoring of communications activity by at least one communications monitoring device; analyzing any monitored communication activity against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device; if the communication attempt by the suspected criminal device is detected by the analysis, controlling a communication to the criminal device so as to delay completion of the communication to the criminal device; and generating assistance to locate the criminal device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification