Method of detecting unauthorized use of a wireless communication channel
First Claim
1. A method for detecting unauthorized use of a communication unit in a secure wireless communication system, comprising the steps of:
- a) monitoring a wireless communication channel presently supporting a secure communication;
b) determining whether the secure communication is encrypted with active system encryption parameters; and
c) when the secure communication is not encrypted with the active system encryption parameters, indicating that a communication unit involved in the secure communication is a potential unauthorized communication unit.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for detecting unauthorized use of a communication unit (102) in a secure wireless communication system includes monitoring (201) a wireless communication channel (103) presently supporting a secure communication. It is determined (202) whether the secure communication is encrypted with active system encryption parameters. When the secure communication is not encrypted with the active system encryption parameters, a communication unit (102) involved in the secure communication is indicated (203) as a potential unauthorized communication unit (102). The steps of monitoring, determining, and indicating are performed by a communication unit (102) or a central controller (101).
38 Citations
26 Claims
-
1. A method for detecting unauthorized use of a communication unit in a secure wireless communication system, comprising the steps of:
-
a) monitoring a wireless communication channel presently supporting a secure communication; b) determining whether the secure communication is encrypted with active system encryption parameters; and c) when the secure communication is not encrypted with the active system encryption parameters, indicating that a communication unit involved in the secure communication is a potential unauthorized communication unit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for detecting unauthorized use of a communication unit in a secure wireless communication system, comprising the steps of:
-
a) monitoring a wireless communication channel presently supporting a secure communication; b) determining whether the secure communication is encrypted with active system encryption parameters; c) when the secure communication is not encrypted with the active system encryption parameters, indicating that a communication unit involved in the secure communication is a potential unauthorized communication unit; and d) sending, to the potential unauthorized communication unit, a message encoded with the active system parameters to check if the potential unauthorized communication unit decodes the message properly.
-
-
12. A method for detecting unauthorized use of a communication unit in a secure wireless communication system, the method comprising the steps of:
-
a) monitoring a wireless communication channel currently supporting a secure communication; b) determining whether the secure communication is encrypted with an inactive system encryption parameter; and c) indicating that a communication unit involved in the secure communication is a potential unauthorized communication unit. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for detecting unauthorized use of a communication unit in a secure wireless communication system, the method comprising the steps of:
-
a) monitoring a wireless communication channel currently supporting a secure communication; b) determining whether the secure communication is encrypted with an inactive system encryption parameter; c) indicating that a communication unit involved in the secure communication is a potential unauthorized communication unit; and d) sending, to the potential unauthorized communication unit, a message encoded with active system parameters to check if the potential unauthorized communication unit decodes the message properly.
-
-
23. A secure communication monitor comprising:
-
a wireless receiver that monitors a wireless communication channel currently supporting a secure communication; a database containing active system encryption parameters and previously used system encryption parameters; and a processing unit, operating together with the wireless receiver and the database, wherein the processing unit determines whether the secure communication unit is utilizing the active system encryption parameters. - View Dependent Claims (24, 25, 26)
-
Specification