×

Method and system for protecting a wireless network

  • US 8,156,539 B1
  • Filed: 12/18/2002
  • Issued: 04/10/2012
  • Est. Priority Date: 12/18/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of limiting access to a wireless network, said method comprising:

  • a) forming a frame of reference by establishing a region delineated by at least three nodes configured to send and receive wireless signals to and from each other, comprising measuring distances between individual pairs of said at least three nodes, based on roundtrip times of said wireless signals to establish relative position information of said at least three nodes, and storing said relative position information in a memory location;

    b) based on said stored relative position information establishing said frame of reference, automatically deriving virtual boundary walls for said wireless network approximating intersecting physical walls in a structure in which said wireless network is housed, including measuring distances between each of said at least three nodes and individual ones of at least three positions of a mobile node based on roundtrip times of signals sent and received between said at least three nodes and said mobile node, and storing coordinates f at least three intersecting planes, each plane defined by the measured distance between said at least three nodes and one of said at least three positions of the mobile node, said at least three intersecting planes corresponding to said virtual boundary walls;

    c) in response to a wireless device seeking access, over an interface, to said wireless network, said at least three nodes sending ping signals to and receiving response signals from said wireless device over said interface to determine a location of said wireless device;

    d) determining whether said wireless device is within said wireless network virtual boundary walls based on said determined location of said wireless device and said stored coordinates defining said intersecting planes corresponding to said virtual boundary walls by;

    d1) determining a plurality of regions in which said device is possibly located based on distance to said at least three nodes determining from a time between said sending said ping signals and receiving said response signals in said c);

    d2) determining a location for said wireless device by forming an intersection of said plurality of regions; and

    e) automatically granting access to said wireless network if said wireless device is determined to be within said virtual boundary walls and whether said wireless device complies with a security protocol, and automatically denying access otherwise.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×