$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Methods and systems for wired equivalent privacy and Wi-Fi protected access protection 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/06
출원번호 US-0464043 (2006-08-11)
등록번호 US-8281392 (2012-10-02)
발명자 / 주소
  • Sinha, Amit
  • Darrow, Nicholas John
출원인 / 주소
  • Airdefense, Inc.
대리인 / 주소
    Clements Bernard PLLC
인용정보 피인용 횟수 : 4  인용 특허 : 139

초록

Methods and systems for disrupting potential attacks on a wireless network through transmission of random data are disclosed. Specifically, this disclosure relates to systems and methods for disrupting the breaking of the secret key or passphrase by an adversary or rogue device for Wi-Fi networks us

대표청구항

1. A method of disrupting attempts to break encryption or authentication associated with a wireless network, the method comprising the steps of: monitoring the wireless network to detect weak initialization vectors, wherein the weak initialization vectors are weak due to reuse over a specified time

이 특허에 인용된 특허 (139)

  1. Michael Roytman ; Plamen Petrov, Alarm manager system for distributed network management system.
  2. Davies, Stephen W., Alarm server systems, apparatus, and processes.
  3. Dacosta, Behram Mario, Apparatus and method for location based wireless client authentication.
  4. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  5. Boyle John M. ; Maiwald Eric S. ; Snow David W., Apparatus and method for providing network security.
  6. John K Hughes ; Gurpreet Singh, Apparatus and methods for adapting mobile unit to wireless LAN.
  7. Liu James C., Apparatus, method and system for providing network security for executable code in computer and communications networks.
  8. Kaashoek,Marinus Frans; Kohler, Jr.,Edward W.; Poletto,Massimiliano Antonio, Architecture to thwart denial of service attacks.
  9. Diener,Neil R., Automated real-time site survey in a shared frequency band environment.
  10. Smith, Michael D., Checking events generated by a device.
  11. Klein, John; Herrod, Allan; Woloschin, Steven, Client-server software for controlling data collection device from host computer.
  12. Kelley Jeffrey V., Code generating system for improved pattern matching in a protocol analyzer.
  13. Ayerst Douglas I., Communication systems for controlling registration of selective call devices.
  14. Barrett Merwin John ; Cason Stanley Philip ; D'Andria Karen Marie ; Gearing Michael Wayne ; Ho Keith Ky Trieu ; Miller Hope Eleanor ; Paradis Rosemary DeSantis ; Woisard Eric, Compliance-to-policy detection method and system.
  15. del Castillo, Francisco Javier; Kogan, Eduard M., Component for a wireless communications equipment card.
  16. Orchier Jonathan ; Soriano Raymond ; Salvaterra Louis ; Ardito Dario ; Byreddy Anil, Computer network security management system.
  17. Brownlie Michael,CAX ; Hillier Stephen,CAX ; Van Oorschot Paul C.,CAX, Computer network security system and method having unilateral enforceable security policy provision.
  18. Grosse Eric, Computer security using virus probing.
  19. Casarez Theresa Loney ; Stubstad ; Jr. James Alfred ; Chu Robin ; Edwards Mark, Connectorized antenna for wireless LAN PCMCIA card radios.
  20. Amin Umesh J. ; Rowe Lorin B. ; Waughman Russell John, Detection of fraudulently registered mobile phones.
  21. Yang, Li-Jau (Steven); Traber, Rich, Device for translating medium access control dependent descriptors for a high performance network.
  22. Carter Stephen R., Distributed dynamic security capabilities.
  23. Pulsipher Eric A. ; Smith Darren D. ; Ruffatto Dominic L., Distributed internet monitoring system and method.
  24. Dynarski Richard J. ; Xu Yingchun ; Bezaitis Andrew ; Cichosz Wayne A., Dynamic allocation of wireless mobile nodes over an internet protocol (IP) network.
  25. Kuehnel Thomas,CHX ; Wu Yung-Shain,CHX, Dynamic connection mapping in wireless ATM systems.
  26. Julie Lynn Huff ; Tracy Glenn Shelanskey ; Sheila Ann Jackson, Dynamic system defense for information warfare.
  27. Vuong Thomas T. ; Nguyen Hung, Dynamic wireless multiplexing -- switching hub for providing two-way communications with subscriber units.
  28. Beach Robert, Embedded access point supporting communication with mobile unit operating in power-saving mode.
  29. McKelvey Mark Ambrose, Embedded security processor.
  30. Joiner, Herbert V.; Elwell, Ken W.; Verma, Ravi; Raghuraman, Praveen, Enterprise network analyzer host controller/agent interface system and method.
  31. Burns Lawrence M. ; Mitchell Scott ; Kendall Bruce, Error detection in a wireless LAN environment.
  32. Elliott,Brig Barnum, Excising compromised routers from an ad-hoc network.
  33. Bravman Richard (Smithtown NY) Wang Ynjiun P. (Stony Brook NY), Flexible merchandise checkout and inventory management system.
  34. Hilton Hong ; Juan Grau ; Arthur Coleman ; Rick R. Giles, Frequency hopping medium access control protocol for a communication system having distributed synchronization.
  35. Demange Mark G. (Schaumburg IL), Frequency selection method and apparatus.
  36. Cafarella John H. ; Fischer Jeffrey H., High-data-rate wireless local-area network.
  37. John H. Cafarella ; Jeffrey H. Fischer, High-data-rate wireless local-area network.
  38. Bentley, Kevin R., Hot standby access point.
  39. Bruton, III,David Aro; Jakubik,Patricia; LiVecchi,Patrick Michael; Overby, Jr.,Linwood Hugh, Integrated intrusion detection services.
  40. Yadav,Satyendra, Integrated network intrusion detection.
  41. Weiss Kenneth P. (Newton MA), Integrated network security system.
  42. Steven D. Shanklin ; Thomas E. Bernhard ; Gerald S. Lathem, Intrusion detection signature analysis using regular expressions and logical operators.
  43. Bravman Richard (Smithtown NY) Wang Ynjiun P. (Meyers FL) Toedt ; III D. C. (Houston TX), Inventory management system using coded re-order information.
  44. Bahl, Paramvir; Padmanabhan, Venkata N., Locating and tracking a user in a wireless network through environmentally profiled data.
  45. Atkins Brian J. ; Rose Ian,AUX ; Potterveld Robert A., Map builder system and method for enabling generic interfacing of an application with a display map generation process in a management system.
  46. Deshpande Nikhil M. ; Bernard Kyle L. ; Yau Man-Kit, Measurement acquisition and display apparatus.
  47. Gustave, Christophe; Choyi, Vinod Kumar; Gavrilovic, Mladen, Mechanism to avoid expensive double-encryption in mobile networks.
  48. Giles Rick R. (San Jose CA) Smith Paul G. (Sunnyvale CA), Medium access protocol for wireless LANs.
  49. Grainger, Steven Phillip, Method and apparatus for an intruder detection reporting and response system.
  50. Esbensen Daniel, Method and apparatus for automated network-wide surveillance and security breach intervention.
  51. Kane Kevin J. ; Kolb Garrett K. ; May Nora ; Myer Daniel E. ; Rutherford Jay B. ; Shive Denise B. ; Weedon Eleanor P., Method and apparatus for automating security functions in a computer system.
  52. Cafarelli, Dominick Anthony; Anderson, James Peter, Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network.
  53. Vesuna Sarosh N., Method and apparatus for determining alternative second stationary access point in response to detecting impeded wireless connection.
  54. Jawahar Janardhanan ; Dilip Venkatachari ; Vaidyanthan Murali, Method and apparatus for displaying a visual indication of a transmission status.
  55. Imamura Genichi,JPX, Method and apparatus for evaluating digital transmission systems.
  56. Schmitz, Peter O., Method and apparatus for filtering network traffic based on the correct channel in an IEEE 802.11(b) wireless lan.
  57. Hong Hilton K. ; Grau ; Jr. Juan ; Coleman Arthur B., Method and apparatus for managing power in a frequency hopping medium access control protocol.
  58. Hong Hilton K. ; Grau ; Jr. Juan ; Coleman Arthur B., Method and apparatus for optimizing a medium access control protocol.
  59. McCune, Jr., Earl W., Method and apparatus for reception quality indication in wireless communication.
  60. Brown John Richard ; Elliott Steve Oliver, Method and apparatus for selecting a communication channel in a communication network.
  61. Tikalsky Terry L., Method and apparatus for synchronized communication over wireless backbone architecture.
  62. Jacob Sharony, Method and apparatus for variable power control in wireless communications systems.
  63. Robert E. Gleichauf ; Daniel M. Teal ; Kevin L. Wiley, Method and system for adaptive network security using intelligent packet analysis.
  64. Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
  65. Campbell, Wayne A.; Walker, Jeffrey H., Method and system for detecting intrusion into and misuse of a data processing system.
  66. Rofheart,Martin; McCorkle,John W., Method and system for enabling device functions based on distance information.
  67. Hillman,Garth D., Method and system for locating a wireless network access point at a mobile computing device.
  68. Juitt,David; Bates,Philip; Christoffel,Thomas; Crawshaw,Geoffrey; Crosbie,David, Method and system for managing data traffic in wireless networks.
  69. Daudelin, Douglas Streeter; Siveski, Zoran, Method and system for monitoring an operational area of a subscriber station.
  70. Patel, Pulin R.; Patel, Achal R.; Choksi, Ojas T.; Ali, Mohammad R., Method and system for queuing traffic in a wireless communications network.
  71. Sharma, Shallendra; Truong, Hung, Method and system for remote and local mobile network management.
  72. Richard A. Fletcher ; Carl Lin, Method for analyzing network application flows in an encrypted environment.
  73. Michael R. Moore, Method for controlling channel reselection.
  74. Hollander Yona,ILX ; Rahman Ophir,ILX ; Sagiv Shmuel,ILX ; Segal Ury,ILX, Method for detecting buffer overflow for computer security.
  75. Shibuya Toshiyuki (Tokyo JPX), Method for detecting the location of a mobile terminal.
  76. Thomsen, Brant D., Method for detecting unauthorized network access by having a NIC monitor for packets purporting to be from itself.
  77. van der Vorm Teun,NLX ; Noordhuis Jacob,NLX ; Buckers Robertus Johannes Leonardus,NLX, Method for determining base station locations, and device for applying the method.
  78. Thomsen,Brant D., Method for managing network access.
  79. Todd ; Sr. Robert E. ; Glahe Aaron C. ; Pendleton Adam H., Method for network self security assessment.
  80. Chatwani Dilip ; Subramanian Rajan ; Chiang Winnis ; Davar Jonathan ; Opher Ayal ; Sawant Shiva, Method for providing for automatic topology discovery in an ATM network or the like.
  81. Takahashi Hideaki,JPX, Method of and apparatus for dynamic channel allocation.
  82. Hwang Yeou H. ; Engelsma Jonathan R., Method of establishing an email monitor responsive to a wireless communications system user.
  83. Zavidniak,Paul M., Methodology for the detection of intrusion into radio frequency (RF) based networks including tactical data links and the tactical internet.
  84. Tams Jonathan,GBX ; Pearce Mark Adrian,GBX ; Iddon Robin,GBX ; Brown Ronnie,GBX, Methods and apparatus for collecting, storing, processing and using network traffic data.
  85. Ahmed,Walid; Jiang,Hong; Kodialam,Muralidharan Sampath; Monogioudis,Pantelis; Rege,Kiran M., Methods and apparatus for topology sensing in networks with mobile nodes.
  86. Shaffer Shmuel ; Beyda William J., Methods and system for providing data and telephony security.
  87. McFarland, William J.; Green, Michael R., Methods for implementing a dynamic frequency selection (DFS) and a temporary channel selection feature for WLAN devices.
  88. Eric David O'Brien ; James Robert Tryon, Jr., Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment.
  89. Heinrich, Peter, Monitoring circuit for a data transmission network.
  90. Daniel E. Lewis, Multi-level encryption system for wireless network.
  91. Williams Timothy C., Multi-level security network system.
  92. Norman Stuart G.,CAX ; Sojka Marvin, Network communication system with information rerouting capabilities.
  93. Lewis Simon C. R. (Bristol GB2), Network fault analysis system.
  94. Bondi Andre B., Network management system with improved node discovery and monitoring.
  95. Threadgill Michael E. ; Biegel Charles H., Network operations center for mobile earth terminal satellite communications system.
  96. Jacobson, Andrea M., Network policy management and effectiveness system.
  97. Milan V. Trcka ; Kenneth T. Fallon ; Mark R. Jones ; Ronald W. Walker, Network security and surveillance system.
  98. Porras Phillip A. ; Valdes Alfonso, Network surveillance.
  99. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  100. Lenosky,Thomas, Optical signal equalizer with adjustable linear filter.
  101. Gray, Matthew K.; Peden, II, Jeffrey J.; Chery, Yonald, Position detection and location tracking in a wireless network.
  102. Coleman Arthur Bernard ; Truong Linh Tien ; Grau ; Jr. Juan, Providing roaming capability for mobile computers in a standard network.
  103. Van Oorschot Paul C.,CAX, Public key cryptography based security system to facilitate secure roaming of users.
  104. Linley F. Gumm, Quality cause measurement display.
  105. Stilp,Louis A., RFID based security network.
  106. Tanaka Masahiko,JPX ; Okita Kenji,JPX, Radio channel estimation based on BER and RSSI.
  107. Grau ; Jr. Juan (San Mateo CA) Messenger Brian S. (San Jose CA), Radio communication system using spread spectrum techniques.
  108. Tanaka Takanori,JPX ; Shimura Yasuhiko,JPX ; Yanagawa Hirokazu,JPX, Radio wave measuring apparatus for digital communication system.
  109. Saito,Takeshi; Takabatake,Yoshiaki, Relay device and communication device realizing contents protection procedure over networks.
  110. Jensen Del ; Carter Stephen R, Secure distribution and use of weighted network topology information.
  111. Kayashima Makoto,JPX ; Terada Masato,JPX, Security system and method for computers connected to network.
  112. Heitman, Allen Robert; Merbach, David Lynn; Yonker, William Roy, Storage area network methods and apparatus with virtual SAN recognition.
  113. Mile'n, Anders; Norstedt, Bengt, Synchronization deviation detection.
  114. Perlman Radia J. ; Hanna Stephen R., System and method for deriving an appropriate initialization vector for secure communications.
  115. Won, King L.; Yildiz, Kazim O.; Wu, Handong, System and method for detecting and locating access points in a wireless network.
  116. Stanforth,Peter J., System and method for determining relative positioning in AD-HOC networks.
  117. McKenna John Joseph (Cary NC) Nascimento Luciene Costa (Campinas BRX) Schlachter Gary Alan (Apex NC) Beck Jonathan Stephen (Durham NC) Cohen Alison (Plano TX), System and method for generalized network topology representation.
  118. Scherzer,Shimon B.; Worfolk,Patrick A.; Haken,Armin D.; Vainish,Ronen; Ponnuswamy,Subburajan, System and method for interference mitigation for wireless communication.
  119. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  120. Gleichauf Robert ; Shanklin Steven, System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment.
  121. Gleichauf Robert ; Shanklin Steven ; Waddell Scott ; Ziese Kevin, System and method for rules-driven multi-phase network vulnerability assessment.
  122. Swartz Jerome ; Heiman Fred P. ; McGlynn Daniel R. ; Beach Robert, System for digital radio communication between a wireless lan and a PBX.
  123. Hasebe Mikio,JPX, System for remotely securing/locking a stolen wireless device via an Email message.
  124. Jacquet, Philippe; Muhlethaler, Paul, System for the transmission of data to synchronised relay stations and corresponding process.
  125. Bowman-Amuah Michel K., System, method and article of manufacture for security management in a development architecture framework.
  126. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for guaranteeing electronic transactions.
  127. Backstrom Olof Tomas, Systems and methods for deactivating a cellular radiotelephone system using an ANSI-41 short message service email.
  128. Hrastar,Scott; Lynn,Michael T.; Sale,Edwin L.; Hollingsworth,Dawn M., Systems and methods for network security.
  129. Heilmann Craig ; Beebe Todd, Telephony security system.
  130. Bravman Richard ; Wang Ynjiun P. ; Toedt ; III D. C. ; Vingsbo Stefan G., Traveler security and luggage control system.
  131. Robert E. Beach ; Jason T. Harris ; Richard C. Montgomery ; Wanda Sealander, Voice and data wireless communications network and method.
  132. O\Sullivan John D. (Ermington AUX) Daniels Graham R. (Willoughby AUX) Percival Terence M. P. (Lane Cove AUX) Ostry Diethelm I. (Petersham AUX) Deane John F. (Eastwood AUX), Wireless LAN.
  133. Robert Bruno G.,BEX ; Proto James J., Wireless communication network including plural migratory access nodes.
  134. Nakagawa Yoshikatsu,JPX ; Suzuki Masamitsu,JPX ; Takahashi Satoshi,JPX ; Kokaji Harumi,JPX, Wireless computer network communication system and method having at least two groups of wireless terminals.
  135. Masamitsu Suzuki JP; Harumi Kokaji JP; Satoshi Takahashi JP; Yoshikatsu Nakagawa JP, Wireless computer network communication system and method which determines an available spreading code.
  136. Agre Jonathan R. ; Clare Loren P. ; Marcy ; 5th Henry O. ; Twarowski Allen J. ; Kaiser William ; Mickelson Wilmer A. ; Yakos Michael D. ; Loeffelholz Christian J. ; Engdahl Jonathan R., Wireless integrated sensor network using multiple relayed communications.
  137. Diepstraten Wilhelmus J. M. (Diessen NLX), Wireless local area network system.
  138. Neff,Raymond Lynn; Barrett,Fred, Wireless monitoring device.
  139. Fifield Robert,GBX, Wireless network.

이 특허를 인용한 특허 (4)

  1. Von Huben, Nicholas Oliver; Crawford, Jason Robert, Apparatus and method to register Wi-Fi clients on a Wi-Fi network.
  2. Fryc, Lukas, Integration of intentional noise into a communication channel to simulate activity.
  3. Ho, Ivy; Lau, Diana; Yue, Sik Nin Ivan, Protecting search privacy using policy-based search terms.
  4. Woxland, Morgan D.; Davis, Jonathan, System and method for wireless network management.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로