Systems and methods for detecting illegitimate devices on wireless networks
First Claim
1. A computer-implemented method for detecting illegitimate devices on wireless networks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- Identifying, at the computing device, a baseline signal strength for a wireless network;
detecting, at the computing device, that the computing device has moved;
identifying, at the computing device, a new baseline signal strength for the wireless network in response to detecting that the computing device has moved;
monitoring, at the computing device, a signal strength of the wireless network to obtain at least one additional signal strength measurement;
determining, at the computing device, that the additional signal strength measurement varies from the new baseline signal strength beyond a threshold;
determining, at the computing device, in response to determining that the additional signal strength measurement varies from the new baseline signal strength, that an illegitimate device is present on the wireless network;
in response to determining that the illegitimate device is present on the wireless network, initiating, at the computing device, a security action.
6 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for detecting illegitimate devices on wireless networks may include (1) identifying a baseline signal strength for a wireless network, (2) monitoring a signal strength of the wireless network to obtain at least one additional signal strength measurement, (3) determining that the additional signal strength measurement varies from the baseline signal strength beyond a threshold, (4) determining, in response to determining that the additional signal strength measurement varies from the baseline signal strength, that an illegitimate device is present on the wireless network, and (5) initiating, in response to determining that the illegitimate device is present on the wireless network, a security action. Various other methods, systems, and computer-readable media are also disclosed.
29 Citations
20 Claims
-
1. A computer-implemented method for detecting illegitimate devices on wireless networks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
Identifying, at the computing device, a baseline signal strength for a wireless network; detecting, at the computing device, that the computing device has moved; identifying, at the computing device, a new baseline signal strength for the wireless network in response to detecting that the computing device has moved; monitoring, at the computing device, a signal strength of the wireless network to obtain at least one additional signal strength measurement; determining, at the computing device, that the additional signal strength measurement varies from the new baseline signal strength beyond a threshold; determining, at the computing device, in response to determining that the additional signal strength measurement varies from the new baseline signal strength, that an illegitimate device is present on the wireless network; in response to determining that the illegitimate device is present on the wireless network, initiating, at the computing device, a security action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for detecting illegitimate devices on wireless networks, the system comprising:
-
a baseline module, stored in memory, that; identifies, at a computing device, a baseline signal strength for a wireless network; detects, at the computing device, that the computing device has moved; identifies, at the computing device, a new baseline signal strength for the wireless network in response to detecting that the computing device has moved; a monitoring module, stored in memory, that monitors, at the computing device, a signal strength of the wireless network to obtain at least one additional signal strength measurement; an analysis module, stored in memory, that; determines, at the computing device, that the additional signal strength measurement varies from the new baseline signal strength beyond a threshold; determines, at the computing device, in response to determining that the additional signal strength measurement varies from the new baseline signal strength, that an illegitimate device is present on the wireless network; a security module, stored in memory, that, in response to determining that the illegitimate device is present on the wireless network, initiates, at the computing device, a security action; at least one physical processor configured to execute the baseline module, the monitoring module, the analysis module, and the security module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify, at the computing device, a baseline signal strength for a wireless network; detect, at the computing device, that the computing device has moved; identify, at the computing device, a new baseline signal strength for the wireless network in response to detecting that the computing device has moved; monitor, at the computing device, a signal strength of the wireless network to obtain at least one additional signal strength measurement; determine, at the computing device, that the additional signal strength measurement varies from the baseline signal strength beyond a threshold; determine, at the computing device, in response to determining that the additional signal strength measurement varies from the baseline signal strength, that an illegitimate device is present on the wireless network; in response to determining that the illegitimate device is present on the wireless network, initiate, at the computing device, a security action. - View Dependent Claims (18, 19, 20)
-
Specification