MAINTAINING CONTINUOUS WIRELESS SERVICE DURING POLICY ENFORCEMENT
20220400380 · 2022-12-15
Inventors
- Roi Keren (Beit Halevi, IL)
- Ohad Plotnik (Savyon, IL)
- Amichai Shulman (Tel Aviv, IL)
- Shlomo Touboul (Kfar Chaim, IL)
Cpc classification
H04L63/20
ELECTRICITY
International classification
Abstract
A wireless security method performed by a network monitoring system for a wireless station, the method maintaining continuous wireless service, the method including identifying a desired network, to which the wireless station is currently connected vis a legitimate access point, as having become an undesirable network, based on a network security policy, and based on network variables, activate the legitimate access point to create a desired network, comprising changing network variables of the undesired network, and maintaining the wireless station connection to the network, based on the security policy.
Claims
1. A wireless security method performed by a network monitoring system for a wireless station, the method maintaining continuous wireless service, the method comprising: identifying a network to which the wireless station is currently connected, as being an undesirable network based on a network security policy; disconnecting the wireless station from the undesirable network; creating an interim network, comprising copying an existing desired network in the vicinity of the wireless station; making the interim network favorable to the wireless station to connect; publishing the interim network; connecting the wireless station to the interim network; and stopping said publishing.
2. The method of claim 1 wherein said making the interim network favorable comprises use of a strong radio signal.
3. A wireless security method performed by a network monitoring system for a wireless station, the method maintaining continuous wireless service, the method comprising: identifying a desired network, to which the wireless station is currently connected vis a legitimate access point, as having become an undesirable network, based on a network security policy, and based on network variables; activate the legitimate access point to create a desired network, comprising changing network variables of the undesired network; and maintaining the wireless station connected to the network, based on the security policy.
4. The method of claim 3 wherein the network variables used to determine that a network is undesirable include network service set identifier (SSID), access point basic service set identifier (BSSID), access point cipher suite, which is part of the recovery support network (RSN), and authentication key management (AKM).
5. The method of claim 3 wherein the desired network became an undesirable network due to an internal network change.
6. The method of claim 3 wherein the internal network change comprises management of the access point having changed one or more network attributes.
7. The method of claim 3 wherein the desired network became an undesirable network due to an external network change.
8. The method of claim 3 wherein the external network change comprises an external attack on the network.
9. A wireless security method performed by a network monitoring system for a wireless station, the method maintaining continuous wireless service, the method comprising: identifying a network to which the wireless station is currently connected, as being an undesirable network, based on a network security policy; disconnecting the wireless station from the undesirable network; strengthening announcement of an existing desired network in the vicinity of the wireless station, comprising echoing the announcement; making the echoed network favorable to the wireless station to connect; connecting the wireless station to the desired network; and stopping said echoing.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0012] The present invention will be more fully understood and appreciated from the following detailed description, taken in conjunction with the drawings in which:
[0013]
[0014]
[0015]
[0016]
[0017]
DETAILED DESCRIPTION
[0018] “Undesired network variables” are configurable attributes of a wireless network that classify the network as an undesired network to the station's authority for security or performance reasons. For example, with 802.11 (Wi-Fi) the following attributes may be considered undesired variables: [0019] Network service set identifier (SSID) [0020] Access point basic service set identifier (BSSID) [0021] Access point cipher suite, part of the recovery support network (RSN) [0022] Authentication key management (AKM)
[0023] Undesired networks are classified by having undesired network variables or an undesired combination of network variables.
[0024] Embodiments of the present invention include four novel methods to establish an immediate station connection to a desired network/access point: [0025] Method 1100: Create an interim existing desired network [0026] Method 1200: Echo a desired network [0027] Method 1300: Instant activation of an access point to create alternative attractive desired networks [0028] Method 1400: Create a temporary safe network
[0029] Reference is made to
[0030] Reference is made to
[0031] Method 1100 creates an interim existing desired network for continuous connectivity, and directs the station to a final desired network. As shown in
[0039] Reference is made to
[0040] Method 1200 echoes announcement of a final desired network which may be located too far, i.e., low signal, to lure the station to connect to that desired network. As shown in
[0048] Reference is made to
[0055] Reference is made to
[0062] In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will, however, be evident that various modifications and changes may be made to the specific exemplary embodiments without departing from the broader spirit and scope of the invention. Accordingly, the specification is to be regarded in an illustrative rather than a restrictive sense.