IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0168789
(2011-06-24)
|
등록번호 |
US-8750272
(2014-06-10)
|
발명자
/ 주소 |
- Iyer, Pradeep J.
- Narasimhan, Partha
- Andrade, Merwyn
- Taylor, John Richard
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
1 인용 특허 :
38 |
초록
▼
In one embodiment of the invention, a wireless network is adapted with a wireless network switch in communication with a plurality of access points, which are in communication with one or more stations. Coupled to the access points over an interconnect, the wireless network switch is adapted to rece
In one embodiment of the invention, a wireless network is adapted with a wireless network switch in communication with a plurality of access points, which are in communication with one or more stations. Coupled to the access points over an interconnect, the wireless network switch is adapted to receive a DEAUTHENTICATION message sent by one of the plurality of access points in the same coverage area of the station so as to detect the DEAUTHENTICATION message and to block communications between the plurality of access points and the station in response to determining that the DEAUTHENTICATION message is invalid.
대표청구항
▼
1. A system comprising: at least one network device including a hardware processor;the system being configured to perform operation comprising:detecting a first wireless message that was directed to a first device;determining that the first wireless message impersonates origination from a second dev
1. A system comprising: at least one network device including a hardware processor;the system being configured to perform operation comprising:detecting a first wireless message that was directed to a first device;determining that the first wireless message impersonates origination from a second device that did not transmit the first wireless message;receiving a second wireless message comprising a request from the first device;responsive to determining that the first wireless message, directed to the first device, impersonates origination from the second device that did not transmit the first wireless message: denying the request in the second wireless message from the first device. 2. The system of claim 1, wherein denying the request from the first device comprises configuring a plurality of devices to deny the request from the first device. 3. The system of claim 1, wherein the first device is a client device and the second device is a network device, and wherein the determining operation comprises determining that the wireless message impersonates origination from the network device that did not transmit the wireless message. 4. The system of claim 1, wherein denying the request from the first device is further responsive to determining that the wireless message comprises a DEAUTHENTICATION message or a DISASSOCIATION message. 5. The system of claim 1, wherein denying the request from the first device is further responsive to determining that the request is a PROBE request, ASSOCIATION request, REASSOCIATION request, or an AUTHENTICATION request. 6. The system of claim 1, wherein denying the request from the first device is further based on a period of time for which requests from the first device are to be denied responsive to the determining operation. 7. The system of claim 1, wherein determining that the first wireless message impersonates origination from the second device that did not transmit the first wireless message comprises determining that a source Media Access Control (MAC) address in the first wireless message, identifying the second device as corresponding to the source MAC address, and determining that the second device did not transmit the first wireless message. 8. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising: detecting a first wireless message that was directed to a first device;determining that the first wireless message impersonates origination from a second device that did not transmit the first wireless message;receiving a second wireless message comprising a request from the first device;responsive to determining that the first wireless message, directed to the first device, impersonates origination from the second device that did not transmit the first wireless message: denying the request in the second wireless message from the first device. 9. The medium of claim 8, wherein denying the request from the first device comprises configuring a plurality of devices to deny the request from the first device. 10. The medium of claim 8, wherein the first device is a client device and the second device is a network device, and wherein the determining operation comprises determining that the wireless message impersonates origination from the network device that did not transmit the wireless message. 11. The medium of claim 8, wherein denying the request from the first device is further responsive to determining that the wireless message comprises a DEAUTHENTICATION message or a DISASSOCIATION message. 12. The medium of claim 8, wherein denying the request from the first device is further responsive to determining that the request is a PROBE request, ASSOCIATION request, REASSOCIATION request, or an AUTHENTICATION request. 13. The medium of claim 8, wherein denying the request from the first device is further based on a period of time for which requests from the first device are to be denied responsive to the determining operation. 14. The medium of claim 8, wherein determining that the first wireless message impersonates origination from the second device that did not transmit the first wireless message comprises determining that a source Media Access Control (MAC) address in the first wireless message, identifying the second device as corresponding to the source MAC address, and determining that the second device did not transmit the first wireless message. 15. A method comprising: detecting a first wireless message that was directed to a first device;determining that the first wireless message impersonates origination from a second device that did not transmit the first wireless message;receiving a second wireless message comprising a request from the first device;responsive to determining that the first wireless message, directed to the first device, impersonates origination from the second device that did not transmit the first wireless message: denying the request in the second wireless message from the first device;wherein the method is performed by at least one device including a hardware processor. 16. The method of claim 15, wherein denying the request from the first device comprises configuring a plurality of devices to deny the request from the first device. 17. The method of claim 15, wherein the first device is a client device and the second device is a network device, and wherein the determining operation comprises determining that the wireless message impersonates origination from the network device that did not transmit the wireless message. 18. The method of claim 15, wherein denying the request from the first device is further responsive to determining that the wireless message comprises a DEAUTHENTICATION message or a DISASSOCIATION message. 19. The method of claim 15, wherein denying the request from the first device is further responsive to determining that the request is a PROBE request, ASSOCIATION request, REASSOCIATION request, or an AUTHENTICATION request. 20. The method of claim 15, wherein denying the request from the first device is further based on a period of time for which requests from the first device are to be denied responsive to the determining operation. 21. The method of claim 15, wherein determining that the first wireless message impersonates origination from the second device that did not transmit the first wireless message comprises determining that a source Media Access Control (MAC) address in the first wireless message, identifying the second device as corresponding to the source MAC address, and determining that the second device did not transmit the first wireless message.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.