Wireless communication selective barrier
First Claim
1. A computer-implemented method for blocking selected messages in a wireless network based on crossing a boundary, comprising:
- connecting to the wireless network which protects a first region defined by at least one boundary point and distinct from a second region defined by at least one boundary point;
determining physical locations for stations within the first and second regions;
intercepting a message from a first region with a first antenna pointing inward from a boundary, the message comprising a first portion and a second portion;
recognizing from the first portion of the message that the message is unauthorized communication with a device in an unprotected region, the message being sourced from a station physically located within the first and second regions;
disrupting reception of the message using a second antenna pointing outward from the boundary;
subsequently determining physical locations for stations within the first and second regions; and
based on the subsequent determination, dynamically changing the boundary.
4 Assignments
0 Petitions
Accused Products
Abstract
A selective barrier prevents undesired communication between a protected region and an unprotected region. Wireless communication is allowed within the protected region, while wireless communication is prevented between the protected region and any unprotected regions. Particular undesired message packets might be selected by business rules responsive to aspects of individual messages. Particular unprotected regions might be statically or dynamically determined. Alternatively, the selective barrier similarly operates to block undesired message packets from originating in any of the unprotected regions and successfully being received in the protected region.
-
Citations
14 Claims
-
1. A computer-implemented method for blocking selected messages in a wireless network based on crossing a boundary, comprising:
-
connecting to the wireless network which protects a first region defined by at least one boundary point and distinct from a second region defined by at least one boundary point; determining physical locations for stations within the first and second regions; intercepting a message from a first region with a first antenna pointing inward from a boundary, the message comprising a first portion and a second portion; recognizing from the first portion of the message that the message is unauthorized communication with a device in an unprotected region, the message being sourced from a station physically located within the first and second regions; disrupting reception of the message using a second antenna pointing outward from the boundary; subsequently determining physical locations for stations within the first and second regions; and based on the subsequent determination, dynamically changing the boundary. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one non-transitory computer readable medium comprising a computer program product that, when executed by one or more processors, performs a method, the method comprising:
-
connecting to the wireless network which protects a first region defined by at least one boundary point and distinct from a second region defined by at least one boundary point; determining physical locations for stations within the first and second regions; intercepting a message from a first region with a first antenna pointing inward from a boundary, the message comprising a first portion and a second portion; recognizing from the first portion of the message that the message is unauthorized communication with a device in an unprotected region, the message being sourced from a station physically located within the first and second regions; subsequently determining physical locations for stations within the first and second regions; and based on the subsequent determination, dynamically changing the boundary. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification