Proximity based wireless security system
First Claim
1. A wireless security system, comprising:
- a first wireless device, disposed within a first security zone having first security provisions within a network configuration;
a second wireless device, disposed within a second security zone having second security provisions within said network configuration, wherein said second security provisions are greater than said first security provisions;
an uninstalled wireless device; and
an access controller, that communicates with said uninstalled wireless device, wherein said access controller determines a proximity of said uninstalled wireless device relative to first and second wireless devices, and wherein said access controller configures third security provisions for said uninstalled device corresponding to said proximity, and wherein said access controller determines said proximity based on response latencies to ping messages transmitted to said uninstalled device by comparing said response latencies to latencies corresponding to said first and second security zones.
3 Assignments
0 Petitions
Accused Products
Abstract
A wireless security system is provided. The system includes a first wireless device, a second wireless device, an uninstalled wireless device, and an access controller. The first wireless device is disposed within a first security zone having first security provisions within a network configuration. The second wireless device is disposed within a second security zone having second security provisions within the network configuration. The second security provisions are greater than the first security provisions. The access controller communicates with the uninstalled wireless device, and determines a proximity of the uninstalled wireless device relative to the first and second wireless devices, and configures third security provisions for the uninstalled device corresponding to the proximity.
101 Citations
18 Claims
-
1. A wireless security system, comprising:
-
a first wireless device, disposed within a first security zone having first security provisions within a network configuration; a second wireless device, disposed within a second security zone having second security provisions within said network configuration, wherein said second security provisions are greater than said first security provisions; an uninstalled wireless device; and an access controller, that communicates with said uninstalled wireless device, wherein said access controller determines a proximity of said uninstalled wireless device relative to first and second wireless devices, and wherein said access controller configures third security provisions for said uninstalled device corresponding to said proximity, and wherein said access controller determines said proximity based on response latencies to ping messages transmitted to said uninstalled device by comparing said response latencies to latencies corresponding to said first and second security zones. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A proximity based wireless security mechanism, comprising:
-
an uninstalled wireless device; a plurality of first wireless devices disposed in a first security zone having first security provisions within a network configuration; a plurality of second wireless devices disposed in a second security zone having second security provisions within said network configuration, wherein said second security provisions are greater said first security provisions; and an access controller, that communicates with said uninstalled wireless device, wherein said access controller determines a proximity of said uninstalled wireless device relative to said pluralities of first and second wireless devices, and wherein said access controller configures third security provisions for said uninstalled device corresponding to said proximity, and wherein said access controller determines said proximity based on response latencies to ping messages transmitted to latencies corresponding to said first and second security zones. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for proximity based wireless security, the method comprising:
-
disposing a first wireless device within a first security zone having first security provisions within a network configuration; disposing a second wireless device within a second security zone having second security provisions within the network configuration, wherein the second security provisions are greater the first security provisions; via an access controller, (communicating with an uninstalled wireless device; via the access controller, determining a proximity of the uninstalled wireless device relative to the first and second wireless devices by evaluating response latencies to ping messages transmitted to the uninstalled device and comparing the response latencies to latencies corresponding to the first and second security zones; and via the access controller, configuring third security provisions for the uninstalled device corresponding to the proximity. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification