Method and apparatus for wireless network security
First Claim
Patent Images
1. A system, for securing a wireless computing network, comprising:
- means for receiving a communication from an unidentified transmitter;
means for identifying the transmitter in accordance with a fingerprint generated from one or more radio frequency signal characteristics extracted from the communication;
means for making one or more access control decisions in response to an identity of the transmitter; and
a fingerprint store comprising fingerprint data for one or more transmitters known to the wireless computing network, wherein the fingerprint store is an extension of an address resolution protocol cache.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, the present invention is a method and apparatus for wireless network security. In one embodiment, a method for securing a wireless computing network includes receiving a communication from an unidentified transmitter, identifying the transmitter in accordance with a fingerprint generated from one or more radio frequency signal characteristics extracted from the communication, and taking action in response to an identity of the transmitter.
95 Citations
55 Claims
-
1. A system, for securing a wireless computing network, comprising:
-
means for receiving a communication from an unidentified transmitter; means for identifying the transmitter in accordance with a fingerprint generated from one or more radio frequency signal characteristics extracted from the communication; means for making one or more access control decisions in response to an identity of the transmitter; and a fingerprint store comprising fingerprint data for one or more transmitters known to the wireless computing network, wherein the fingerprint store is an extension of an address resolution protocol cache. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for securing a wireless computing network, the method comprising:
-
receiving a communication from an unidentified transmitter; identifying the transmitter in accordance with a first fingerprint generated from one or more radio frequency signal characteristics extracted from the communication; making one or more access control decisions in response to an identity of the transmitter; and storing one or more stored fingerprints representing one or more transmitters known to the wireless computing network in a fingerprint store, wherein the fingerprint store is an extension of an address resolution protocol cache. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer readable storage medium containing an executable program for securing a wireless computing network, where the program performs steps comprising:
-
receiving a communication from an unidentified transmitter; identifying the transmitter in accordance with a first fingerprint generated from one or more radio frequency signal characteristics extracted from the communication; making one or more access control decisions in response to an identity of the transmitter; and storing one or more stored fingerprints representing one or more transmitters known to the wireless computing network in a fingerprint store, wherein the fingerprint store is an extension of an address resolution protocol cache. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
Specification