System and method for wireless network and physical system integration
First Claim
Patent Images
1. An apparatus comprising:
- an intrusion detection arrangement embodied on a tangible, non-transitory computer-readable medium, the intrusion detection arrangement being arranged to determine when a client without authorization attempts to access a wireless network, wherein the intrusion detection arrangement is associated with the wireless network; and
a location identification arrangement embodied on the tangible, non-transitory computer-readable medium, the location identification arrangement being arranged to identify at least a first approximate physical location of the client without authorization when the client without authorization attempts to access the wireless network, wherein the location identification arrangement is arranged to transform information obtained from the intrusion detection arrangement into the first approximately physical location and to identify a surveillance system to monitor the first approximately physical location from a plurality of potential surveillance systems, and wherein the location identification arrangement is configured to communicate the first approximate physical location to the surveillance arrangement that is arranged to monitor the first approximate physical location, and wherein the location identification arrangement is further configured to determine if the client without authorization has moved and, if the client without authorization has moved, the location identification arrangement is still further configured to identify a second approximate physical location of the client without authorization and to communicate information associated with the second approximate physical location to the surveillance arrangement.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, an apparatus includes an intrusion detection arrangement and a location identification arrangement. The intrusion detection arrangement determines when a client without authorization attempts to access a wireless network of which the intrusion detection arrangement is a part. The location identification arrangement identifies at least a first approximate physical location of the client without authorization when the client without authorization attempts to access the wireless network. The location identification arrangement is configured to communicate the first approximate physical location to a surveillance arrangement which monitors the first approximate physical location.
-
Citations
20 Claims
-
1. An apparatus comprising:
-
an intrusion detection arrangement embodied on a tangible, non-transitory computer-readable medium, the intrusion detection arrangement being arranged to determine when a client without authorization attempts to access a wireless network, wherein the intrusion detection arrangement is associated with the wireless network; and a location identification arrangement embodied on the tangible, non-transitory computer-readable medium, the location identification arrangement being arranged to identify at least a first approximate physical location of the client without authorization when the client without authorization attempts to access the wireless network, wherein the location identification arrangement is arranged to transform information obtained from the intrusion detection arrangement into the first approximately physical location and to identify a surveillance system to monitor the first approximately physical location from a plurality of potential surveillance systems, and wherein the location identification arrangement is configured to communicate the first approximate physical location to the surveillance arrangement that is arranged to monitor the first approximate physical location, and wherein the location identification arrangement is further configured to determine if the client without authorization has moved and, if the client without authorization has moved, the location identification arrangement is still further configured to identify a second approximate physical location of the client without authorization and to communicate information associated with the second approximate physical location to the surveillance arrangement. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
determining when a client device attempts to gain unauthorized access to a wireless network; identifying a first approximate physical location at which the client device is located if it is determined that the client device attempts to gain unauthorized access to the wireless network; providing information associated with the first approximate physical location to a surveillance system, wherein the surveillance system is configured to observe at least the first approximate physical location; determining if the client device continues to be located at the first approximate physical location, wherein determining if the client device continues to be located at the first approximate physical location includes determining if the client device changes from attempting to gain unauthorized access to the wireless network through a first access point to attempting to gain unauthorized access to the wireless network through a second access point; identifying a second approximate physical location at which the client device is located if it is determined that the client device does not continue to be located at the first approximate physical location; and providing information associated with the second approximate physical location to the surveillance system, wherein the surveillance system is configured to observe at least the second approximate physical location. - View Dependent Claims (6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
means for determining when a client device attempts to gain unauthorized access to a wireless network;
located if it is determined that the client device attempts to gain unauthorized access to the wireless network;means for providing information associated with the first approximate physical location to a surveillance system, wherein the surveillance system is configured to observe at least the first approximate physical location; means for determining if the client device continues to be located at the first approximate physical location, wherein the means for determining if the client device continues to be located at the first approximate physical location include means for determining if the client device changes from attempting to gain unauthorized access to the wireless network through a first access point to attempting to gain unauthorized access to the wireless network through a second access point; means for identifying a second approximate physical location at which the client device is located if it is determined that the client device does not continue to be located at the first approximate physical location; and means for providing information associated with the second approximate physical location to the surveillance system, wherein the surveillance system is configured to observe at least the second approximate physical location. - View Dependent Claims (11, 12, 13, 14)
-
-
15. Logic encoded in one or more tangible, non-transitory computer-readable media for execution and when executed operable to:
-
determine when a client device attempts to gain unauthorized access to a wireless network; identify a first approximate physical location at which the client device is located if it is determined that the client device attempts to gain unauthorized access to the wireless network; provide information associated with the first approximate physical location to a surveillance system, wherein the surveillance system is configured to observe at least the first approximate physical location; determine if the client device continues to be located at the first approximate physical location, wherein the logic operable to determine if the client device continues to be located at the first approximate physical location is further operable to determine if the client device changes from attempting to gain unauthorized access to the wireless network through a first access point to attempting to gain unauthorized access to the wireless network through a second access point; identify a second approximate physical location at which the client device is located if it is determined that the client device does not continue to be located at the first approximate physical location; and
the surveillance system, wherein the surveillance system is configured to observe at least the second approximate physical location. - View Dependent Claims (16, 17, 18, 19)
-
-
20. An apparatus comprising:
-
an intrusion detection arrangement embodied on a tangible, non-transitory computer-readable medium, the intrusion detection arrangement being arranged to determine when a client without authorization attempts to access a wireless network, wherein the intrusion detection arrangement is associated with the wireless network; and a location identification arrangement embodied on a tangible, non-transitory computer-readable medium, the location identification arrangement being arranged to identify at least a first approximate physical location of the client without authorization when the client without authorization attempts to access the wireless network, wherein the location identification arrangement is configured to communicate the first approximate physical location to surveillance arrangement that is arranged to monitor the first approximate physical location, wherein the intrusion detection arrangement is further arranged to determine when the client without authorization has successfully accessed the wireless network, and wherein the location identification arrangement is further configured to communicate an indication to the surveillance arrangement that the client without authorization has successfully accessed the wireless network when it is determined that the client without authorization has successfully accessed the wireless network.
-
Specification