×

Systems and methods for adaptive location tracking

  • US 7,532,895 B2
  • Filed: 02/06/2004
  • Issued: 05/12/2009
  • Est. Priority Date: 05/20/2002
  • Status: Active Grant
First Claim
Patent Images

1. A system for tracking location of a wireless device, the system comprising:

  • a system data store capable of storing one or more tracking criteria and indicators of one or more wireless devices to track;

    a set of one or more wireless receivers on one or more wireless sensors;

    the wireless sensors monitoring wireless header information from a wireless packet frame;

    a system processor in communication with the system data store and the one or more wireless sensors, wherein the system processor comprises one or more processing elements programmed or adapted to perform the steps comprising of;

    (a) identifying a wireless device for tracking based upon a combination of dynamic operational and security assessments derived using data from the system data store, wherein the dynamic operational and security assessments identify the wireless device for tracking responsive to behavior of the wireless device, wherein the dynamic operational and security assessments comprise wireless signature-based tests, wireless protocol-based tests, wireless anomaly-based tests, and wireless policy deviation-based tests, wherein the policy deviation-based tests comprise a deviation from a set of three or more wireless policy settings comprising wireless channel settings, wireless authentication settings, wireless encryption settings, SSID broadcast settings, and rate settings, and wherein the policy deviation-based tests ensure the wireless device is complying with the one or more wireless policy settings;

    (b) receiving data from a subset of the one or more wireless sensors;

    (c) storing the received data in the system data store, wherein the received data is utilized to update wireless statistics used in the dynamic operational and security assessments, wherein the wireless statistics enable the dynamic operational and security assessments to detect both unauthorized wireless devices and authorized wireless devices which are displaying anomalous behavior;

    (d) calculating the position of the identified wireless device based upon the stored data; and

    (e) outputting the calculated position.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×