Remote detection and measurement of data signal leakage
First Claim
1. A method comprising:
- detecting, on a wired communication path, a presence of an external signal caused by an over-the-air signal received by a computing device;
identifying strengths at which the over-the-air signal was received over the wired communication path at a plurality of different locations in a network;
comparing the strengths received over the wired communication path with expected signal strengths at the plurality of different locations; and
identifying a location in the network at which the over-the-air signal is entering the network based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for detecting and locating ingress of an over-the-air signal into a wired communications network. Computing devices located in a plurality of different areas may be configured to identify amplitude of signals transmitted over the wired communications network as it varies by signal frequency. In one embodiment, the system may determine expected amplitude of the over-the-air signal at the plurality of different areas. In other embodiments, the system may identify amplitudes received over the wired communication path at the computing devices. The system may determine a location at which the over-the-air signal has entered the wired communications network based on a comparison of the identified and expected amplitudes of the over-the-wire signal.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting, on a wired communication path, a presence of an external signal caused by an over-the-air signal received by a computing device; identifying strengths at which the over-the-air signal was received over the wired communication path at a plurality of different locations in a network; comparing the strengths received over the wired communication path with expected signal strengths at the plurality of different locations; and identifying a location in the network at which the over-the-air signal is entering the network based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
detecting, on a wired communication path, a presence of a plurality of wireless transmissions emitted from a plurality of transmission devices; identifying, at a first location in a network, a first computing device having detected the plurality of wireless transmissions; for each transmission device in the plurality of transmission devices, identifying an expected signal strength of the wireless transmission at the first location and an actual signal strength at which the wireless transmission was received over the wired communication path at the first location; and determining a location in the network where the plurality of wireless transmissions are entering the wired communication path based on a comparison of the actual and expected signal strengths. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method comprising:
-
detecting, on a wired communication path, a presence of a first wireless transmission received by a first computing device and a second computing device at a first location and a second location; identifying expected signal strengths at the first location and the second location with respect to a first transmission device generating the first wireless transmission; identifying actual signal strengths at which the first wireless transmission was received over the wired communication path at the first location and the second location; identifying a first area at which the first wireless transmission is entering the wired communication path based on a comparison of the expected and actual signal strengths at the first location; and identifying a second area at which the first wireless transmission is entering the wired communication path based on a comparison of the expected and actual signal strengths at the second location. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification