$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for actively defending a wireless LAN against attacks 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/18
  • G06F-017/00
  • H04L-009/00
  • H04K-001/00
출원번호 UP-0370611 (2006-03-08)
등록번호 US-7526808 (2009-07-01)
발명자 / 주소
  • Lynn, Michael T.
  • Hrastar, Scott
출원인 / 주소
  • AirDefense, Inc.
대리인 / 주소
    Clements Bernard PLLC
인용정보 피인용 횟수 : 6  인용 특허 : 83

초록

A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusio

대표청구항

What is claimed is: 1. A network security system, the system comprising: a system data store configured to store risk criteria data, network default data, and network performance and usage data; a first communication interface comprising a receiver that receives inbound communications from a commun

이 특허에 인용된 특허 (83)

  1. Davies, Stephen W., Alarm server systems, apparatus, and processes.
  2. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  3. Boyle John M. ; Maiwald Eric S. ; Snow David W., Apparatus and method for providing network security.
  4. John K Hughes ; Gurpreet Singh, Apparatus and methods for adapting mobile unit to wireless LAN.
  5. Liu James C., Apparatus, method and system for providing network security for executable code in computer and communications networks.
  6. Klein, John; Herrod, Allan; Woloschin, Steven, Client-server software for controlling data collection device from host computer.
  7. del Castillo, Francisco Javier; Kogan, Eduard M., Component for a wireless communications equipment card.
  8. Orchier Jonathan ; Soriano Raymond ; Salvaterra Louis ; Ardito Dario ; Byreddy Anil, Computer network security management system.
  9. Brownlie Michael,CAX ; Hillier Stephen,CAX ; Van Oorschot Paul C.,CAX, Computer network security system and method having unilateral enforceable security policy provision.
  10. Casarez Theresa Loney ; Stubstad ; Jr. James Alfred ; Chu Robin ; Edwards Mark, Connectorized antenna for wireless LAN PCMCIA card radios.
  11. Amin Umesh J. ; Rowe Lorin B. ; Waughman Russell John, Detection of fraudulently registered mobile phones.
  12. Carter Stephen R., Distributed dynamic security capabilities.
  13. Dynarski Richard J. ; Xu Yingchun ; Bezaitis Andrew ; Cichosz Wayne A., Dynamic allocation of wireless mobile nodes over an internet protocol (IP) network.
  14. Kuehnel Thomas,CHX ; Wu Yung-Shain,CHX, Dynamic connection mapping in wireless ATM systems.
  15. Beach Robert, Embedded access point supporting communication with mobile unit operating in power-saving mode.
  16. McKelvey Mark Ambrose, Embedded security processor.
  17. Burns Lawrence M. ; Mitchell Scott ; Kendall Bruce, Error detection in a wireless LAN environment.
  18. Elliott,Brig Barnum, Excising compromised routers from an ad-hoc network.
  19. Bravman Richard (Smithtown NY) Wang Ynjiun P. (Stony Brook NY), Flexible merchandise checkout and inventory management system.
  20. Hilton Hong ; Juan Grau ; Arthur Coleman ; Rick R. Giles, Frequency hopping medium access control protocol for a communication system having distributed synchronization.
  21. Cafarella John H. ; Fischer Jeffrey H., High-data-rate wireless local-area network.
  22. John H. Cafarella ; Jeffrey H. Fischer, High-data-rate wireless local-area network.
  23. Bentley, Kevin R., Hot standby access point.
  24. Weiss Kenneth P. (Newton MA), Integrated network security system.
  25. Steven D. Shanklin ; Thomas E. Bernhard ; Gerald S. Lathem, Intrusion detection signature analysis using regular expressions and logical operators.
  26. Bravman Richard (Smithtown NY) Wang Ynjiun P. (Meyers FL) Toedt ; III D. C. (Houston TX), Inventory management system using coded re-order information.
  27. Bahl, Paramvir; Padmanabhan, Venkata N., Locating and tracking a user in a wireless network through environmentally profiled data.
  28. Deshpande Nikhil M. ; Bernard Kyle L. ; Yau Man-Kit, Measurement acquisition and display apparatus.
  29. Giles Rick R. (San Jose CA) Smith Paul G. (Sunnyvale CA), Medium access protocol for wireless LANs.
  30. Grainger, Steven Phillip, Method and apparatus for an intruder detection reporting and response system.
  31. Esbensen Daniel, Method and apparatus for automated network-wide surveillance and security breach intervention.
  32. Kane Kevin J. ; Kolb Garrett K. ; May Nora ; Myer Daniel E. ; Rutherford Jay B. ; Shive Denise B. ; Weedon Eleanor P., Method and apparatus for automating security functions in a computer system.
  33. Cafarelli, Dominick Anthony; Anderson, James Peter, Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network.
  34. Vesuna Sarosh N., Method and apparatus for determining alternative second stationary access point in response to detecting impeded wireless connection.
  35. Jawahar Janardhanan ; Dilip Venkatachari ; Vaidyanthan Murali, Method and apparatus for displaying a visual indication of a transmission status.
  36. Imamura Genichi,JPX, Method and apparatus for evaluating digital transmission systems.
  37. Hong Hilton K. ; Grau ; Jr. Juan ; Coleman Arthur B., Method and apparatus for managing power in a frequency hopping medium access control protocol.
  38. Hong Hilton K. ; Grau ; Jr. Juan ; Coleman Arthur B., Method and apparatus for optimizing a medium access control protocol.
  39. Tikalsky Terry L., Method and apparatus for synchronized communication over wireless backbone architecture.
  40. Jacob Sharony, Method and apparatus for variable power control in wireless communications systems.
  41. Robert E. Gleichauf ; Daniel M. Teal ; Kevin L. Wiley, Method and system for adaptive network security using intelligent packet analysis.
  42. Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
  43. Richard A. Fletcher ; Carl Lin, Method for analyzing network application flows in an encrypted environment.
  44. Michael R. Moore, Method for controlling channel reselection.
  45. Hollander Yona,ILX ; Rahman Ophir,ILX ; Sagiv Shmuel,ILX ; Segal Ury,ILX, Method for detecting buffer overflow for computer security.
  46. Shibuya Toshiyuki (Tokyo JPX), Method for detecting the location of a mobile terminal.
  47. Todd ; Sr. Robert E. ; Glahe Aaron C. ; Pendleton Adam H., Method for network self security assessment.
  48. Takahashi Hideaki,JPX, Method of and apparatus for dynamic channel allocation.
  49. Hwang Yeou H. ; Engelsma Jonathan R., Method of establishing an email monitor responsive to a wireless communications system user.
  50. Zavidniak,Paul M., Methodology for the detection of intrusion into radio frequency (RF) based networks including tactical data links and the tactical internet.
  51. Shaffer Shmuel ; Beyda William J., Methods and system for providing data and telephony security.
  52. Eric David O'Brien ; James Robert Tryon, Jr., Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment.
  53. Heinrich, Peter, Monitoring circuit for a data transmission network.
  54. Daniel E. Lewis, Multi-level encryption system for wireless network.
  55. Williams Timothy C., Multi-level security network system.
  56. Norman Stuart G.,CAX ; Sojka Marvin, Network communication system with information rerouting capabilities.
  57. Milan V. Trcka ; Kenneth T. Fallon ; Mark R. Jones ; Ronald W. Walker, Network security and surveillance system.
  58. Gray, Matthew K.; Peden, II, Jeffrey J.; Chery, Yonald, Position detection and location tracking in a wireless network.
  59. Coleman Arthur Bernard ; Truong Linh Tien ; Grau ; Jr. Juan, Providing roaming capability for mobile computers in a standard network.
  60. Van Oorschot Paul C.,CAX, Public key cryptography based security system to facilitate secure roaming of users.
  61. Linley F. Gumm, Quality cause measurement display.
  62. Tanaka Masahiko,JPX ; Okita Kenji,JPX, Radio channel estimation based on BER and RSSI.
  63. Grau ; Jr. Juan (San Mateo CA) Messenger Brian S. (San Jose CA), Radio communication system using spread spectrum techniques.
  64. Tanaka Takanori,JPX ; Shimura Yasuhiko,JPX ; Yanagawa Hirokazu,JPX, Radio wave measuring apparatus for digital communication system.
  65. Kayashima Makoto,JPX ; Terada Masato,JPX, Security system and method for computers connected to network.
  66. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  67. Gleichauf Robert ; Shanklin Steven, System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment.
  68. Gleichauf Robert ; Shanklin Steven ; Waddell Scott ; Ziese Kevin, System and method for rules-driven multi-phase network vulnerability assessment.
  69. Swartz Jerome ; Heiman Fred P. ; McGlynn Daniel R. ; Beach Robert, System for digital radio communication between a wireless lan and a PBX.
  70. Hasebe Mikio,JPX, System for remotely securing/locking a stolen wireless device via an Email message.
  71. Bowman-Amuah Michel K., System, method and article of manufacture for security management in a development architecture framework.
  72. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for guaranteeing electronic transactions.
  73. Backstrom Olof Tomas, Systems and methods for deactivating a cellular radiotelephone system using an ANSI-41 short message service email.
  74. Heilmann Craig ; Beebe Todd, Telephony security system.
  75. Bravman Richard ; Wang Ynjiun P. ; Toedt ; III D. C. ; Vingsbo Stefan G., Traveler security and luggage control system.
  76. Robert E. Beach ; Jason T. Harris ; Richard C. Montgomery ; Wanda Sealander, Voice and data wireless communications network and method.
  77. O\Sullivan John D. (Ermington AUX) Daniels Graham R. (Willoughby AUX) Percival Terence M. P. (Lane Cove AUX) Ostry Diethelm I. (Petersham AUX) Deane John F. (Eastwood AUX), Wireless LAN.
  78. Robert Bruno G.,BEX ; Proto James J., Wireless communication network including plural migratory access nodes.
  79. Nakagawa Yoshikatsu,JPX ; Suzuki Masamitsu,JPX ; Takahashi Satoshi,JPX ; Kokaji Harumi,JPX, Wireless computer network communication system and method having at least two groups of wireless terminals.
  80. Masamitsu Suzuki JP; Harumi Kokaji JP; Satoshi Takahashi JP; Yoshikatsu Nakagawa JP, Wireless computer network communication system and method which determines an available spreading code.
  81. Agre Jonathan R. ; Clare Loren P. ; Marcy ; 5th Henry O. ; Twarowski Allen J. ; Kaiser William ; Mickelson Wilmer A. ; Yakos Michael D. ; Loeffelholz Christian J. ; Engdahl Jonathan R., Wireless integrated sensor network using multiple relayed communications.
  82. Diepstraten Wilhelmus J. M. (Diessen NLX), Wireless local area network system.
  83. Fifield Robert,GBX, Wireless network.

이 특허를 인용한 특허 (6)

  1. Clark, David; Strand, John; Thyer, Jonathan, Active attack detection system.
  2. Mankovski, Serge, Information technology system collaboration.
  3. Rogers, Jr., Cleon L.; Logan, Glen T., Method of identifying and protecting the integrity of a set of source data.
  4. Mantin, Itsik; Hibshoosh, Eliphaz, Plaintext injection attack protection.
  5. Rosenberger, Joel, System and method for wireless local area network monitoring and intrusion detection.
  6. Patil, Jeevan; Stieglitz, Jeremy E.; Acharya, Shripati; Foo, Ian, Techniques for providing security protection in wireless networks by switching modes.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로