IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0343550
(2006-01-31)
|
등록번호 |
US-8325653
(2012-12-04)
|
발명자
/ 주소 |
- Whitehill, Eric A.
- White, Eric D.
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
1 인용 특허 :
120 |
초록
▼
A system and method for providing security to a wireless network by using a mobile node's location as a parameter for deciding if access is to be given to the node. The system and method employ access points, wireless routers and mobile nodes, each including at least one transceiver adapted to trans
A system and method for providing security to a wireless network by using a mobile node's location as a parameter for deciding if access is to be given to the node. The system and method employ access points, wireless routers and mobile nodes, each including at least one transceiver adapted to transmit and receive communication signals to and from other wireless routers, mobile nodes and other mobile access points. Each access point is connected to a network management system which allows enhanced network monitoring and control. Each network node includes technology which may determine an absolute node location containing latitude, longitude and altitude of a node, or a relative node location containing the distance and angle between nodes, or a combination of both absolute and relative location data.
대표청구항
▼
1. A method for providing restricted network access to one or more nodes communicating within a wireless communication network, the method comprising: receiving, by an authentication server, a request for network access from a requesting node via an authenticated node;receiving, by the authenticatio
1. A method for providing restricted network access to one or more nodes communicating within a wireless communication network, the method comprising: receiving, by an authentication server, a request for network access from a requesting node via an authenticated node;receiving, by the authentication server, a distance information between the requesting node and the authenticated node from the authenticated node;calculating, by the authentication server, a position of the requesting node using the received distance information; andallowing network access, by the authentication server, for the requesting node when the calculated position is within a network access boundary. 2. The method as claimed in claim 1, the method further comprising, prior to the authentication server receiving the distance information: executing, by the authenticated node, a series of measurements;determining, by the authenticated node, the distance information; andtransmitting the distance information from the authenticated node to the authentication server. 3. The method as claimed in claim 2, further comprising, prior to the authenticated node executing the series of measurements: sending a request for the distance information from the authentication server to the authenticated node in response to receiving the request for network access. 4. The method as claimed in claim 2, wherein the series of measurements includes time of flight measurements. 5. The method as claimed in claim 2, wherein the distance information includes a location of the authenticated node, the method further comprising: determining, by the authenticated node, the location of the authenticated node. 6. The method of claim 5, wherein the location of the authenticated node is determined using one of a manual entry, a global position system functionality, a differential navigation functionality, and a triangulation technique. 7. The method as claimed in claim 1, wherein the distance information comprises a location of the authenticated node and a distance between the authenticated node and the requesting node. 8. The method as claimed in claim 1, wherein the authenticated node comprises one of an access point, a wireless router, and a mobile node. 9. The method as claimed in claim 1, wherein the authentication server comprises an authentication, authorization and accounting server. 10. The method as claimed in claim 1, wherein the authentication server is included within a network operations center. 11. The method as claimed in claim 1, wherein the requesting node comprises a mobile node. 12. The method as claimed in claim 1, wherein the network access boundary is independent of a transceiver range of the authenticated node. 13. The method as claimed in claim 1, further comprising prior to the authentication server receiving the request for network access: powering up the requesting node; andselecting a communication path including the authenticated node. 14. The method as claimed in claim 1, further comprising when the calculated position is not within a network access boundary: sending a request for an absolute position of the requesting node from the authentication server to the authenticated node;calculating, by the authenticated node, the absolute position of the requesting node using received corresponding distance information from one or more other authenticated nodes;communicating the absolute position from the authenticated node to the authentication server; andallowing network access, by the authentication server, for the requesting node when the absolute position is within the network access boundary. 15. The method as claimed in claim 14, further comprising prior to the calculating of the absolute position: requesting, by the authenticated node, the corresponding distance information from the one or more other authenticated nodes; andreceiving, by the authenticated node, the corresponding distance information from the one or more other authenticated nodes. 16. A wireless communication network configured to provide restricted network access to one or more nodes, the wireless communication network comprising: at least one requesting node operating to transmit a request for network access;at least one authenticated node communicating within the wireless communication network; andan authentication server, operating to: receive the request for network access from the requesting node via at least one authenticated node;receive a distance information between the requesting node and the authenticated node from the authenticated node;calculate a position of the requesting node using the received distance information; andallow network access, by the authentication server, for the requesting node when the calculated position is within a network access boundary.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.