US 12,279,109 B2
Wireless network verification using fingerprints
Mark McDiarmid, Seattle, WA (US); and Andrew Lee Watts, Seattle, WA (US)
Assigned to T-Mobile USA, Inc., Bellevue, WA (US)
Filed by T-Mobile USA, Inc., Bellevue, WA (US)
Filed on Oct. 22, 2020, as Appl. No. 17/078,063.
Prior Publication US 2022/0132309 A1, Apr. 28, 2022
Int. Cl. H04L 29/06 (2006.01); H04W 12/06 (2021.01); H04W 12/08 (2021.01); H04W 12/122 (2021.01); H04W 48/10 (2009.01); H04W 84/12 (2009.01)
CPC H04W 12/06 (2013.01) [H04W 12/08 (2013.01); H04W 12/122 (2021.01); H04W 48/10 (2013.01); H04W 84/12 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A verification system comprising:
at least one processor; and
memory storing instructions that, when executed by the at least one processor, cause the verification system to perform operations comprising:
transmitting, to a first authorized wireless local area network (WLAN) associated with a first coverage area, a first fingerprint request to transmit one or more first advertisement messages during a first time, the one or more first advertisement messages including a first verified fingerprint;
transmitting, to the first authorized WLAN, a second fingerprint request to transmit one or more second advertisement messages during a second time, the one or more second advertisement messages including a second verified fingerprint, the second verified fingerprint being different than the first verified fingerprint;
transmitting, to a second authorized WLAN associated with a second coverage area, a third fingerprint request to transmit one or more third advertisement messages during the first time, the one or more third advertisement messages including a third verified fingerprint, the third verified fingerprint being different than the first verified fingerprint and the second verified fingerprint, wherein at least one of the one or more first advertisement messages, the one or more second advertisement messages, or the one or more third advertisement messages comprise at least one of a beacon, a master information block (MIB), or a system information block (SIB);
receiving, from a user equipment (UE), a verification request indicating a received fingerprint comprised in a fourth advertisement message, the fourth advertisement message being received by the UE during the first time and within at least one of the first coverage area or the second coverage area, the UE being utilized to request fingerprint verification by the verification system via the verification request;
identifying that a time at which the fourth advertisement message is received is the first time;
based at least in part on the identifying that the time at which the fourth advertisement message is received is the first time, identifying the first time from among the first time and the second time for verifying a source of the fourth advertisement message;
based at least in part on the identifying of the first time for the verifying of the source of the fourth advertisement message, determining that the source of the fourth advertisement message is a rogue WLAN by determining that the received fingerprint is different than the first verified fingerprint; and
causing the UE to output an alert indicating data that the UE exchanged with the rogue WLAN by transmitting, to the UE, a verification response indicating that the source of the fourth advertisement message is the rogue WLAN.