Wireless LAN intrusion detection based on location
First Claim
1. A method for determining a presence of an intruder device within a coverage area of a wireless communication network, comprising:
- maintaining a database relating authorized sources to location;
receiving a signal from a source;
determining a location of the source based on a characteristic of the signal;
comparing said source location to a corresponding location in the database;
wherein if the determined location fails to correspond to an authorized location for the source, designating the source as the intruder device; and
signaling an alarm if the source is designated as an intruder device.
4 Assignments
0 Petitions
Accused Products
Abstract
A intrusion detection method is disclosed for use in a wireless local area data communications system, wherein mobile units communicate with access points, and wherein the system is arranged to locate transmitters using signals transmitted by the transmitters. A database relating authorized transmitters to location is maintained. Selected signals are detected at the access points and location data corresponding to the selected signals for use in locating a source of the signals is recorded. The source location is determined using the location data, and the source location is compared to a corresponding location in the database. An alarm is signaled if the source location is inconsistent with the corresponding database location.
-
Citations
20 Claims
-
1. A method for determining a presence of an intruder device within a coverage area of a wireless communication network, comprising:
-
maintaining a database relating authorized sources to location; receiving a signal from a source; determining a location of the source based on a characteristic of the signal; comparing said source location to a corresponding location in the database; wherein if the determined location fails to correspond to an authorized location for the source, designating the source as the intruder device; and signaling an alarm if the source is designated as an intruder device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for determining a presence of an intruder device within a coverage area of a wireless communication network, comprising:
-
means for maintaining a database relating authorized sources to location; means for receiving a signal from a source; means for determining a location of the source based on a characteristic of the signal; means for comparing said source location to a corresponding location in said database; means for, if the determined location fails to correspond to an authorized location for the source, designating the source as the intruder device; and means for signaling an alarm if the source is designated as an intruder device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification