Claims
- 1. A system for tracking location of a wireless device, the system comprising:
a system data store capable of storing one or more tracking criteria and indicators of one or more wireless devices to track; a set of one or more wireless receivers; a system processor in communication with the system data store and the set of wireless receivers, wherein the system processor comprises one or more processing elements programmed or adapted to perform the steps comprising of:
(a) identifying a wireless device for tracking based upon data from the system data store; (b) receiving data from a subset of the set of wireless receivers; (c) storing the received data in the system data store; (d) calculating the position of the identified wireless device based upon the stored data; and (e) outputting the calculated position.
- 2. The system of claim 1, wherein one or more tracking criteria are of a type selected from the group consisting of time, traffic level, threat level, protocol characteristics, usage characteristics or combinations thereof.
- 3. The system of claim 1, wherein the one or more processing elements of the system processor are further programmed or adapted to perform the step comprising of dynamically determining one or more tracking criteria.
- 4. The system of claim 1, wherein the one or more processing elements of the system processor are further programmed or adapted to the step comprising of (f) repeat steps (a) through (e) continuously.
- 5. The system of claim 1, wherein the one or more processing elements of the system processor are further programmed or adapted to perform the step comprising of (f) repeating steps (a) through (e) periodically.
- 6. The system of claim 5, wherein the one or more processing elements of the system processor are further programmed or adapted to the step comprising of (g) modifying the period of repetition of step (f) based upon one or more tracking criteria.
- 7. The system of claim 6, wherein each of the one or more tracking criteria are selected from the group consisting of time, traffic level, threat level, protocol characteristics, usage characteristics or combinations thereof.
- 8. The system of claim 1, wherein the programming or adaptation to identify the wireless device includes programming or adaptation to perform the step comprising of selecting the identified wireless device based upon indicators of one or more wireless devices in the system data store.
- 9. The system of claim 8, wherein the one or more processing elements of the system processor are further programmed or adapted to perform the steps comprising of (f) detecting an unauthorized wireless device and (g) storing an indicator of the unauthorized wireless device in the system data store.
- 10. The system of claim 9, wherein the identified wireless device is the unauthorized wireless device.
- 11. The system of claim 8, wherein the programming or adaptation to identify the wireless device includes further programming or adaptation to perform the step comprising of retrieving indicators of one or more wireless devices from the system data store.
- 12. The system of claim 1, wherein the programming or adaptation to calculate the position of the identified wireless device includes programming or adaptation to perform the steps comprising of:
(i) sensing the identified wireless device; (ii) storing RF signal characteristics in the system data store based upon the sensing; and (iii) dynamically selecting one or more additional sensors to improve tracking performance.
- 13. The system of claim 1, wherein the programming or adaptation to output the calculated position includes programming or adaptation to perform the steps comprising of formatting the calculated position according to one or more output preferences.
- 14. The system of claim 13, wherein the calculated position for output is formatted as an e-mail, a web page, a facsimile, a graphic, an XML page, an SNMP message, a page, or combinations thereof.
- 15. The system of claim 1, wherein the calculated position is output to a user or to a computer system.
- 16. The system of claim 1, wherein the one or more processing elements of the system processor are further programmed or adapted to perform the step comprising of (f) storing the calculated position in the system data store.
- 17. The system of claim 1, wherein the one or more processing elements of the system processor are further programmed or adapted to perform the step comprising of (f) removing an indicator of a wireless device from the system data store.
- 18. The system of claim 17, wherein indicator removal is based upon manual deletion, timed deletion, or a change in device security status from unauthorized to authorized.
- 19. A method for tracking location of a wireless device, the method comprising the steps of:
(a) detecting an unauthorized wireless device; (b) adding an indicator associated with the detected unauthorized wireless device to a list of wireless devices; (c) selecting a wireless device for tracking based upon the list of wireless devices; (d) receiving data from one or more wireless receivers; (e) calculating a position of the selected wireless device based upon the received data; (f) outputting the calculated position; (g) repeating steps (a) and (b) upon occurrence of an event or at periodic intervals; (h) repeating steps (c) through (f) upon occurrence of an event or at periodic intervals.
- 20. One or more computer readible media storing instruction that upon execution by a system processor cause the system processor to perform the method of claim 19.
- 21. A system for tracking location of a wireless device, the system comprising:
storing means for storing one or more tracking criteria and indicators of one or more wireless devices to track; rogue detection means for receiving scan data from one or more wireless receivers, for detecting an unauthorized wireless device based upon the received scan data and for storing an indicator of the detected unauthorized wireless device; and position determining means for selecting a wireless device to track from the indicators in the storing means, receiving scan data from one or more wireless receivers, estimating the position of the selected wireless device based upon received scan data and outputting the estimated position.
CROSS-REFERENCE TO RELATED PATENT APPLICATIONS
[0001] This application is a continuation-in-part of and claims priority to commonly assigned U.S. patent application Ser. No. 10/160,904, filed Jun. 3, 2002, entitled “METHODS AND SYSTEMS FOR IDENTIFYING NODES AND MAPPING THEIR LOCATION”, which claims priority to provisional U.S. Patent Application Serial No. 60/381,829, filed May 20, 2002, entitled “SYSTEMS AND METHODS FOR NETWORK SECURITY”. This application also claims priority to commonly assigned U.S. Provisional Patent Application Serial No. 60/464,464, filed Apr. 21, 2003, entitled “SYSTEMS AND METHODS FOR MANAGING WIRELESS NETWORK ACTIVITY.” These applications are incorporated by reference herein in their entirety for all purposes.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60381829 |
May 2002 |
US |
|
60464464 |
Apr 2003 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10160904 |
Jun 2002 |
US |
Child |
10774034 |
Feb 2004 |
US |