摘要:
A system and method that uses wireless-capable desktop computers in a vicinity such as to enable one to securely determine the location of an untrusted user with office level granularity.
摘要:
A system and method that uses wireless-capable desktop computers in a vicinity such as to enable one to securely determine the location of an untrusted user with office level granularity.
摘要:
The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.
摘要:
A system and method for locating a wireless client using trusted wireless detectors is described. Sniffers may sense signal strength information and transmit the information to a database. The database may store signal strength-based location information. Information from the database may then be used to determine the location of a wireless client based on new signal strength information from one or more sniffers.
摘要:
The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.
摘要:
A system and method for locating a wireless client using trusted wireless detectors is described. Sniffers may sense signal strength information and transmit the information to a database. The database may store signal strength-based location information. Information from the database may then be used to determine the location of a wireless client based on new signal strength information from one or more sniffers.
摘要:
A secure localization method for wireless networks utilizes access point variable transmission power capability to transmit encoded localization signals at different power levels to a wireless device in the network. Based on the particular combination of encoded signals collected by the wireless device and reported back to a network controller, the location of the wireless device may be determined in conjunction with information contained in a location database.
摘要:
A secure localization method for wireless networks utilizes access point variable transmission power capability to transmit encoded localization signals at different power levels to a wireless device in the network. Based on the particular combination of encoded signals collected by the wireless device and reported back to a network controller, the location of the wireless device may be determined in conjunction with information contained in a location database.
摘要:
A system and method are provided for adding network entities and appliances to a mobile wireless Internet. A graphical user interface on a user appliance or network entity is used to start a plug and play process. In the plug and play process a temporary IP address is assigned to the entity or appliance. The temporary address is tested for uniqueness. A search mechanism identifies and contacts a plug server that uses information from the user/operator to authenticate the user and/or validate subscription information. Upon authentication or validation the plug server dispatches an inspector agent to determine the software needs of the new entity or appliance. The plug server obtains the requested software from the software inventory and the inspector agent downloads the software onto the new entity or appliance and installs it therein. The element then uses the DRCP/DHCP client to obtain a new IP address. Link layer and topology information are selected and downloaded to the entity or appliance and the unit is plugged into the network for mobile wireless Internet access.
摘要:
A method for determining whether to perform vertical handoff between multiple network. The method comprises obtaining a plurality of selection metrics for each network, calculating, for each of the other communication networks, a predicted utility value from at least the corresponding plurality of selection metrics using a variable kernel regression function, obtaining, for the current communication network, a second plurality of selection metrics; calculating a second predicted utility value for the current communication network from at least the corresponding second plurality of selection metrics using a second variable kernel regression function, comparing each of the predicted utility values for each of the plurality of other communication networks with the second predicted utility value and switching to one of the other communication networks having the highest predicted utility value, if the highest predicted utility value is greater than the second predicted utility value.