Movatterモバイル変換


[0]ホーム

URL:


US20070189194A1 - Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap - Google Patents

Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap
Download PDF

Info

Publication number
US20070189194A1
US20070189194A1US11/382,218US38221806AUS2007189194A1US 20070189194 A1US20070189194 A1US 20070189194A1US 38221806 AUS38221806 AUS 38221806AUS 2007189194 A1US2007189194 A1US 2007189194A1
Authority
US
United States
Prior art keywords
network
wireless
security policy
airspace
violation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/382,218
Inventor
Scott Hrastar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AirDefense LLC
Original Assignee
AirDefense LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AirDefense LLCfiledCriticalAirDefense LLC
Priority to US11/382,218priorityCriticalpatent/US20070189194A1/en
Assigned to AIRDEFENSE, INC.reassignmentAIRDEFENSE, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HRASTAR, SCOTT E.
Publication of US20070189194A1publicationCriticalpatent/US20070189194A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting wireless communication over the wireless computer network and a system processor. Configuration data associated with an access point on a wireless computer network potentially compromised by an intruder is received. Information contained within and/or derived from the received configuration data is stored. Communication with the intruder is continued by emulating the identification characteristics of the potentially compromised access point. A channel change request is transmitted to the potentially compromised access point to reroute communication between the potentially compromised access point and authorized stations such that communications may continue on a different channel.

Description

Claims (30)

16. A method for wireless intrusion protection, comprising:
outlining at least one portion of a network to be protected, said at least one portion of the network occupying a physical region, the physical region comprising an airspace through which wireless signals can be transmitted;
defining a security policy associated with the airspace to protect said at least one portion of the network, the security policy at least defining a type of wireless activity which constitutes a violation of the security policy;
deploying one or more sensor devices within said at least one portion of the network, the one or more sensor devices being arranged within the physical region comprising the airspace, the one or more sensor devices being configured to cause at least a portion of the airspace to be secured according to the security policy;
deploying a host system on the network;
monitoring wireless signals in the airspace using said one or more sensor devices;
determining whether a wireless signal is intended to communicate to said at least one portion of the network;
detecting a violation of the security policy based at least upon the determining step and the monitoring step;
automatically initiating an action based upon the violation in accordance with the security policy for the airspace to protect said at least one portion of the network.
35. A wireless intrusion protection system, comprising:
one or more monitoring modules deployed within a physical region proximate to a network, the physical region comprising an airspace through which wireless signals propagate, the one or more sensor devices implementing a security policy defining at least a type of activity which comprises a violation of the security policy and being configured to protect the network, and to provide an indication of the violation;
a host module configured to communicate with the one or more monitoring modules regarding security policy for the network to be protected, and to provide central management for the one or more monitoring modules, individually or collectively;
wherein the one or more monitoring modules are configured to receive wireless signals propagating in the airspace and to apply the security policy to determine whether any of the wireless signals are associated with violations of the security policy;
a protection module configured perform an action responsive to the indication of the security violation in accordance with the security policy.
44. Computer readable storage media storing instructions that upon execution by a system processor causes the system processor to perform steps comprising:
outlining at least one portion of a network to be protected, said at least one portion of the network occupying a physical region, the physical region comprising an airspace through which wireless signals can be transmitted;
defining a security policy associated with the airspace to protect said at least one portion of the network, the security policy at least defining a type of wireless activity which constitutes a violation of the security policy;
deploying one or more sensor devices within said at least one portion of the network, the one or more sensor devices being arranged within the physical region comprising the airspace, the one or more sensor devices being configured to cause at least a portion of the airspace to be secured according to the security policy;
deploying a host system on the network;
monitoring wireless signals in the airspace using said one or more sensor devices; determining whether a wireless signal is intended to communicate to said at leas one portion of the network;
detecting a violation of the security policy based at least upon the determining step and the monitoring step;
automatically initiating an action based upon the violation in accordance with the security policy for the airspace to protect said at least one portion of the network.
US11/382,2182002-05-202006-05-08Method and System for Wireless LAN Dynamic Channel Change with Honeypot TrapAbandonedUS20070189194A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/382,218US20070189194A1 (en)2002-05-202006-05-08Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US38182902P2002-05-202002-05-20
US10/161,440US7042852B2 (en)2002-05-202002-06-03System and method for wireless LAN dynamic channel change with honeypot trap
US11/382,218US20070189194A1 (en)2002-05-202006-05-08Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US10/161,440ContinuationUS7042852B2 (en)2002-05-202002-06-03System and method for wireless LAN dynamic channel change with honeypot trap

Publications (1)

Publication NumberPublication Date
US20070189194A1true US20070189194A1 (en)2007-08-16

Family

ID=29552760

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US10/161,440Expired - LifetimeUS7042852B2 (en)2002-05-202002-06-03System and method for wireless LAN dynamic channel change with honeypot trap
US11/382,218AbandonedUS20070189194A1 (en)2002-05-202006-05-08Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/161,440Expired - LifetimeUS7042852B2 (en)2002-05-202002-06-03System and method for wireless LAN dynamic channel change with honeypot trap

Country Status (1)

CountryLink
US (2)US7042852B2 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060291391A1 (en)*2005-06-272006-12-28Jean-Philippe VasseurSystem and method for dynamically responding to event-based traffic redirection
US20100132040A1 (en)*2004-02-112010-05-27Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US20130304789A1 (en)*2010-09-172013-11-14Thomson LicensingMethod and system for determining identity/presence of a mobile device user for control and interaction in content distribution
US8752174B2 (en)2010-12-272014-06-10Avaya Inc.System and method for VoIP honeypot for converged VoIP services
US20170061422A1 (en)*2015-09-012017-03-02Bank Of America CorporationSystem for authenticating the use of a wearable device to execute a transaction
US20190149994A1 (en)*2017-11-102019-05-16Comcast Cable Communications, LlcMethods and Systems to Detect Rogue Hotspots
US10360560B2 (en)2015-09-012019-07-23Bank Of America CorporationSystem for authenticating a wearable device for transaction queuing
US10438201B2 (en)2015-09-092019-10-08Bank Of America CorporationSystem for generating a transaction specific tokenization for a wearable device
US10817862B2 (en)2015-09-012020-10-27Bank Of America CorporationSystem for authenticating a mobile device for comprehensive access to a facility
US12200495B2 (en)2022-11-182025-01-14T-Mobile Usa, Inc.Integrating security and routing policies in wireless telecommunication networks

Families Citing this family (104)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7120791B2 (en)*2002-01-252006-10-10Cranite Systems, Inc.Bridged cryptographic VLAN
US7986937B2 (en)*2001-12-202011-07-26Microsoft CorporationPublic access point
US7188364B2 (en)*2001-12-202007-03-06Cranite Systems, Inc.Personal virtual bridged local area networks
US20040022186A1 (en)*2002-07-302004-02-05International Business Machines CorporationMethods, apparatus and program product for controlling network security
WO2003088532A1 (en)*2002-04-112003-10-23The Johns Hopkins UniversityIntrusion detection system for wireless networks
US20040203764A1 (en)*2002-06-032004-10-14Scott HrastarMethods and systems for identifying nodes and mapping their locations
US8539580B2 (en)*2002-06-192013-09-17International Business Machines CorporationMethod, system and program product for detecting intrusion of a wireless network
US7339484B2 (en)*2002-06-272008-03-04Hewlett-Packard Development Company, L.P.Event-driven discovery method and apparatus
US7965842B2 (en)*2002-06-282011-06-21Wavelink CorporationSystem and method for detecting unauthorized wireless access points
US7068999B2 (en)*2002-08-022006-06-27Symbol Technologies, Inc.System and method for detection of a rogue wireless access point in a wireless communication network
US7412722B1 (en)*2002-08-082008-08-12Verizon Laboratories Inc.Detection of softswitch attacks
US7224678B2 (en)*2002-08-122007-05-29Harris CorporationWireless local or metropolitan area network with intrusion detection features and related methods
WO2004028121A2 (en)*2002-09-232004-04-01Wimetrics CorporationSystem and method for wireless local area network monitoring and intrusion detection
US6957067B1 (en)2002-09-242005-10-18Aruba NetworksSystem and method for monitoring and enforcing policy within a wireless network
US7549166B2 (en)*2002-12-052009-06-16International Business Machines CorporationDefense mechanism for server farm
US7295524B1 (en)*2003-02-182007-11-13Airwave Wireless, IncMethods, apparatuses and systems facilitating management of airspace in wireless computer network environments
US9137670B2 (en)*2003-02-182015-09-15Hewlett-Packard Development Company, L.P.Method for detecting rogue devices operating in wireless and wired computer network environments
JP3764435B2 (en)*2003-03-262006-04-05株式会社東芝 Information processing apparatus and program
US7346338B1 (en)2003-04-042008-03-18Airespace, Inc.Wireless network system including integrated rogue access point detection
US7313113B1 (en)*2003-04-042007-12-25Airespace, Inc.Dynamic transmit power configuration system for wireless network environments
US7382741B2 (en)*2003-06-252008-06-03Canon Kabushiki KaishaConfiguration of wireless network client
US7539169B1 (en)2003-06-302009-05-26Cisco Systems, Inc.Directed association mechanism in wireless network environments
US7453840B1 (en)2003-06-302008-11-18Cisco Systems, Inc.Containment of rogue systems in wireless network environments
US7386887B2 (en)*2003-07-012008-06-10International Business Machines CorporationSystem and method for denying unauthorized access to a private data processing network
US7286515B2 (en)*2003-07-282007-10-23Cisco Technology, Inc.Method, apparatus, and software product for detecting rogue access points in a wireless network
TWI257797B (en)*2003-07-312006-07-01Acer IncAutomatic identification and log-on system of wireless network
JP3888342B2 (en)*2003-08-292007-02-28ブラザー工業株式会社 Network equipment
US8713306B1 (en)*2003-10-142014-04-29Symantec CorporationNetwork decoys
JP4543657B2 (en)*2003-10-312010-09-15ソニー株式会社 Information processing apparatus and method, and program
US7856209B1 (en)2003-12-082010-12-21Airtight Networks, Inc.Method and system for location estimation in wireless networks
US7002943B2 (en)*2003-12-082006-02-21Airtight Networks, Inc.Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7823199B1 (en)*2004-02-062010-10-26Extreme NetworksMethod and system for detecting and preventing access intrusion in a network
US7216365B2 (en)*2004-02-112007-05-08Airtight Networks, Inc.Automated sniffer apparatus and method for wireless local area network security
US7440434B2 (en)*2004-02-112008-10-21Airtight Networks, Inc.Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods
US7640581B1 (en)*2004-02-272009-12-29Embarq Holdings Company, LlcMethod and system for providing secure, centralized access to remote elements
US20050213553A1 (en)*2004-03-252005-09-29Wang Huayan AMethod for wireless LAN intrusion detection based on protocol anomaly analysis
US20060165073A1 (en)*2004-04-062006-07-27Airtight Networks, Inc., (F/K/A Wibhu Technologies, Inc.)Method and a system for regulating, disrupting and preventing access to the wireless medium
US7496094B2 (en)*2004-04-062009-02-24Airtight Networks, Inc.Method and system for allowing and preventing wireless devices to transmit wireless signals
US7451064B2 (en)*2004-10-062008-11-11Hewlett-Packard Development Company, L.P.System and method for logging hardware usage data, and uses for such logged hardware usage data
US8196199B2 (en)*2004-10-192012-06-05Airdefense, Inc.Personal wireless monitoring agent
US7516174B1 (en)2004-11-022009-04-07Cisco Systems, Inc.Wireless network security mechanism including reverse network address translation
US7596376B2 (en)*2005-02-182009-09-29Cisco Technology, Inc.Methods, apparatuses and systems facilitating client handoffs in wireless network systems
US7805140B2 (en)2005-02-182010-09-28Cisco Technology, Inc.Pre-emptive roaming mechanism allowing for enhanced QoS in wireless network environments
USRE47628E1 (en)2005-04-122019-10-01Kroll Information Assurance, LlcSystem for identifying the presence of peer-to-peer network software applications
US9178940B2 (en)*2005-04-122015-11-03Tiversa Ip, Inc.System and method for detecting peer-to-peer network software
RU2007142368A (en)*2005-04-182009-05-27Дзе Трастиз Оф Коламбия Юниверсити Ин Дзе Сити Оф Нью Йорк (Us) SYSTEMS AND METHODS FOR DETECTING AND SUPPRESSING ATTACKS USING "MEDONOS"
JP4774823B2 (en)*2005-06-162011-09-14ソニー株式会社 Wireless communication system, wireless communication setting method, wireless communication apparatus, wireless communication setting program, and wireless communication setting program storage medium
US7912017B2 (en)*2005-06-292011-03-22Sony CorporationWireless connection system and wireless connection method
US7333481B1 (en)*2005-10-112008-02-19Airtight Networks, Inc.Method and system for disrupting undesirable wireless communication of devices in computer networks
US7710933B1 (en)2005-12-082010-05-04Airtight Networks, Inc.Method and system for classification of wireless devices in local area computer networks
US9130993B2 (en)*2006-02-092015-09-08Sony CorporationWireless connection system and wireless connection method
US7864742B2 (en)*2006-03-222011-01-04Broadcom CorporationCell network using friendly relay communication exchanges
WO2007110093A1 (en)2006-03-272007-10-04Telecom Italia S.P.A.A method and system for identifying malicious messages in mobile communication networks, related network and computer program product therefor
TWI316345B (en)*2006-04-282009-10-21Hon Hai Prec Ind Co LtdSystem and method for identifying beacon
US7821986B2 (en)2006-05-312010-10-26Cisco Technology, Inc.WLAN infrastructure provided directions and roaming
WO2008001972A1 (en)*2006-06-262008-01-03The Industry & Academic Cooperation In Chungnam National UniversityMethod for proactively preventing wireless attacks and apparatus thereof
EP1883033B1 (en)2006-07-212017-11-01BlackBerry LimitedMethod and system for providing a honeypot mode for an electronic device
US8479288B2 (en)*2006-07-212013-07-02Research In Motion LimitedMethod and system for providing a honeypot mode for an electronic device
US8281392B2 (en)2006-08-112012-10-02Airdefense, Inc.Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
US8817813B2 (en)*2006-10-022014-08-26Aruba Networks, Inc.System and method for adaptive channel scanning within a wireless network
US8069483B1 (en)2006-10-192011-11-29The United States States of America as represented by the Director of the National Security AgencyDevice for and method of wireless intrusion detection
US9137663B2 (en)*2006-11-022015-09-15Cisco Technology, Inc.Radio frequency firewall coordination
US8949986B2 (en)2006-12-292015-02-03Intel CorporationNetwork security elements using endpoint resources
US8254882B2 (en)*2007-01-292012-08-28Cisco Technology, Inc.Intrusion prevention system for wireless networks
US20080184035A1 (en)*2007-01-302008-07-31Technology Properties LimitedSystem and Method of Storage Device Data Encryption and Data Access
US20080250500A1 (en)*2007-04-052008-10-09Cisco Technology, Inc.Man-In-The-Middle Attack Detection in Wireless Networks
US20120084866A1 (en)*2007-06-122012-04-05Stolfo Salvatore JMethods, systems, and media for measuring computer security
US20090019539A1 (en)*2007-07-112009-01-15Airtight Networks, Inc.Method and system for wireless communications characterized by ieee 802.11w and related protocols
US20090016529A1 (en)*2007-07-112009-01-15Airtight Networks, Inc.Method and system for prevention of unauthorized communication over 802.11w and related wireless protocols
US20090119762A1 (en)*2007-11-062009-05-07Cisco Technology, Inc.WLAN Access Integration with Physical Access Control System
US7970894B1 (en)2007-11-152011-06-28Airtight Networks, Inc.Method and system for monitoring of wireless devices in local area computer networks
US8750460B2 (en)*2008-04-282014-06-10Centurylink Intellectual Property LlcSystem and method for remote testing of a subscriber loop
US8413238B1 (en)*2008-07-212013-04-02Zscaler, Inc.Monitoring darknet access to identify malicious activity
US20100246416A1 (en)*2009-03-252010-09-30Amit SinhaSystems and methods for remote testing of wireless lan access points
NL2002694C2 (en)*2009-04-012010-10-04Univ TwenteMethod and system for alert classification in a computer network.
US8694624B2 (en)*2009-05-192014-04-08Symbol Technologies, Inc.Systems and methods for concurrent wireless local area network access and sensing
US8528091B2 (en)2009-12-312013-09-03The Trustees Of Columbia University In The City Of New YorkMethods, systems, and media for detecting covert malware
US8767537B1 (en)*2011-03-172014-07-01The Boeing CompanyAirborne wireless device security
US20130089026A1 (en)*2011-07-182013-04-11geoffrey Chilton PiperWireless Audio Transmission
US8949993B2 (en)2011-10-172015-02-03Mcafee Inc.Mobile risk assessment
WO2013172898A2 (en)*2012-02-212013-11-21Logos Technologies, LlcSystem for detecting, analyzing, and controlling infiltration of computer and network systems
US9055440B2 (en)*2012-10-192015-06-09Saife, Inc.Geospatial cryptography
JP6053948B2 (en)*2013-10-242016-12-27三菱電機株式会社 Information processing apparatus, information processing method, and program
US9992221B1 (en)*2015-11-122018-06-05Amdocs Software Systems LimitedSystem, method, and computer program for utilizing a decoy in response to a distributed denial of service (DDOS) attack in a communication network
CN104378758B (en)*2014-05-122016-08-17腾讯科技(深圳)有限公司Access point method of attachment, terminal and server
TWI604320B (en)*2014-08-012017-11-01緯創資通股份有限公司Methods for accessing big data and systems using the same
US9913201B1 (en)2015-01-292018-03-06Symantec CorporationSystems and methods for detecting potentially illegitimate wireless access points
US9781604B1 (en)*2015-02-092017-10-03Symantec CorporationSystems and methods for detecting illegitimate devices on wireless networks
US9730075B1 (en)2015-02-092017-08-08Symantec CorporationSystems and methods for detecting illegitimate devices on wireless networks
US10148688B1 (en)2015-02-092018-12-04Symantec CorporationSystems and methods for detecting illegitimate devices on wireless networks
US9882931B1 (en)2015-02-182018-01-30Symantec CorporationSystems and methods for detecting potentially illegitimate wireless access points
US9923908B2 (en)2015-04-292018-03-20International Business Machines CorporationData protection in a networked computing environment
US9954870B2 (en)2015-04-292018-04-24International Business Machines CorporationSystem conversion in a networked computing environment
US9462013B1 (en)2015-04-292016-10-04International Business Machines CorporationManaging security breaches in a networked computing environment
US9781601B1 (en)2015-06-082017-10-03Symantec CorporationSystems and methods for detecting potentially illegitimate wireless access points
US9918224B1 (en)2015-11-242018-03-13Symantec CorporationSystems and methods for preventing computing devices from sending wireless probe packets
KR101779694B1 (en)*2016-01-252017-09-19재단법인대구경북과학기술원Device and method for anti-jamming using decoy signal
US10348755B1 (en)2016-06-302019-07-09Symantec CorporationSystems and methods for detecting network security deficiencies on endpoint devices
US11194915B2 (en)2017-04-142021-12-07The Trustees Of Columbia University In The City Of New YorkMethods, systems, and media for testing insider threat detection systems
US11095678B2 (en)*2017-07-122021-08-17The Boeing CompanyMobile security countermeasures
US11050769B2 (en)2018-02-052021-06-29Bank Of America CorporationControlling dynamic user interface functionality using a machine learning control engine
US11102666B2 (en)2019-03-152021-08-24The Nielsen Company (Us), LlcMethods and apparatus to monitor WI-FI media streaming using an alternate access point
CN111885068B (en)*2020-07-282022-11-15杭州默安科技有限公司Bypass deployment traffic distribution method and system
US11716362B1 (en)2021-12-292023-08-01The Nielsen Company (Us), LlcMethods and apparatus to de-authenticate and reroute client sessions for media monitoring

Citations (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5393965A (en)*1990-11-131995-02-28Symbol Technologies, Inc.Flexible merchandise checkout and inventory management system
US5487069A (en)*1992-11-271996-01-23Commonwealth Scientific And Industrial Research OrganizationWireless LAN
US5644900A (en)*1994-02-071997-07-08Stone Container CorporationMultiwall bag
US5646389A (en)*1990-11-131997-07-08Symbol Technologies, Inc.Inventory management system using coded re-order information
US5737328A (en)*1995-10-041998-04-07Aironet Wireless Communications, Inc.Network communication system with information rerouting capabilities
US5745479A (en)*1995-02-241998-04-283Com CorporationError detection in a wireless LAN environment
US5745483A (en)*1994-09-291998-04-28Ricoh Company, Ltd.Wireless computer network communication system and method having at least two groups of wireless terminals
US5768312A (en)*1994-02-181998-06-16Leader Electronics Corp.Method and apparatus for evaluating digital transmission systems
US5781857A (en)*1996-06-281998-07-14Motorola, Inc.Method of establishing an email monitor responsive to a wireless communications system user
US5787077A (en)*1996-06-041998-07-28Ascom Tech AgDynamic connection mapping in wireless ATM systems
US5866888A (en)*1990-11-201999-02-02Symbol Technologies, Inc.Traveler security and luggage control system
US5870666A (en)*1995-02-131999-02-09Nec CorporationRadio channel estimation based on BER and RSSI
US5875179A (en)*1996-10-291999-02-23Proxim, Inc.Method and apparatus for synchronized communication over wireless backbone architecture
US5896499A (en)*1997-02-211999-04-20International Business Machines CorporationEmbedded security processor
US5903848A (en)*1996-03-251999-05-11Nec CorporationMethod of and apparatus for dynamic channel allocation
US5913174A (en)*1996-06-191999-06-15Proxim, Inc.Connectorized antenna for wireless LAN PCMCIA card radios
US5919258A (en)*1996-02-081999-07-06Hitachi, Ltd.Security system and method for computers connected to network
US6058482A (en)*1998-05-222000-05-02Sun Microsystems, Inc.Apparatus, method and system for providing network security for executable code in computer and communications networks
US6067297A (en)*1996-06-282000-05-23Symbol Technologies, Inc.Embedded access point supporting communication with mobile unit operating in power-saving mode
US6070244A (en)*1997-11-102000-05-30The Chase Manhattan BankComputer network security management system
US6178512B1 (en)*1997-08-232001-01-23U.S. Philips CorporationWireless network
US6185689B1 (en)*1998-06-242001-02-06Richard S. Carson & Assoc., Inc.Method for network self security assessment
US6188681B1 (en)*1998-04-012001-02-13Symbol Technologies, Inc.Method and apparatus for determining alternative second stationary access point in response to detecting impeded wireless connection
US6202157B1 (en)*1997-12-082001-03-13Entrust Technologies LimitedComputer network security system and method having unilateral enforceable security policy provision
US6205551B1 (en)*1998-01-292001-03-20Lucent Technologies Inc.Computer security using virus probing
US6234656B1 (en)*1998-08-202001-05-22Physical Optics CorporationFiber optic luminaire
US6240077B1 (en)*1998-07-092001-05-29Golden Gate Tele Systems Inc.Dynamic wireless multiplexing — switching hub for providing two-way communications with subscriber units
US20020021745A1 (en)*2000-04-072002-02-21Negus Kevin J.Multi-channel-bandwidth frequency-hopping system
US20020029288A1 (en)*1995-07-122002-03-07Dobbins Kurt A.Internet protocol (IP) work group routing
US20020032871A1 (en)*2000-09-082002-03-14The Regents Of The University Of MichiganMethod and system for detecting, tracking and blocking denial of service attacks over a computer network
US20020035699A1 (en)*2000-07-242002-03-21Bluesocket, Inc.Method and system for enabling seamless roaming in a wireless network
US6363477B1 (en)*1998-08-282002-03-263Com CorporationMethod for analyzing network application flows in an encrypted environment
US20020044533A1 (en)*2000-08-072002-04-18Paramvir BahlDistributed topology control for wireless multi-hop sensor networks
US20020059434A1 (en)*2000-06-282002-05-16Jeyhan KaraoguzMulti-mode controller
US20020060994A1 (en)*2000-11-172002-05-23Erno KovacsTransmission of carry-on objects using a wireless ad-hoc networking environment
US20020061031A1 (en)*2000-10-062002-05-23Sugar Gary L.Systems and methods for interference mitigation among multiple WLAN protocols
US20020060995A1 (en)*2000-07-072002-05-23Koninklijke Philips Electronics N.V.Dynamic channel selection scheme for IEEE 802.11 WLANs
US20020066034A1 (en)*2000-10-242002-05-30Schlossberg Barry J.Distributed network security deception system
US6400752B1 (en)*1994-09-292002-06-04Ricoh Company, Ltd.Wireless computer network communication system and method which determines an available spreading code
US6404772B1 (en)*2000-07-272002-06-11Symbol Technologies, Inc.Voice and data wireless communications network and method
US20020072329A1 (en)*2000-09-082002-06-13Nuno BandeiraScalable wireless network topology systems and methods
US6411608B2 (en)*2000-07-122002-06-25Symbol Technologies, Inc.Method and apparatus for variable power control in wireless communications systems
US20020083343A1 (en)*2000-06-122002-06-27Mark CrosbieComputer architecture for an intrusion detection system
US20020087882A1 (en)*2000-03-162002-07-04Bruce SchneierMehtod and system for dynamic network intrusion monitoring detection and response
US20020090952A1 (en)*2001-01-082002-07-11Cantwell Charles E.Location of devices using wireless network nodes
US20020090089A1 (en)*2001-01-052002-07-11Steven BraniganMethods and apparatus for secure wireless networking
US20020094777A1 (en)*2001-01-162002-07-18Cannon Joseph M.Enhanced wireless network security using GPS
US20030009606A1 (en)*2001-07-062003-01-09Santhanagopalan MuthukannanFuture generation software platform
US6507864B1 (en)*1996-08-022003-01-14Symbol Technologies, Inc.Client-server software for controlling data collection device from host computer
US20030021254A1 (en)*2001-07-252003-01-30Nec CorporationWireless LAN terminal, wireless LAN base station, and wireless LAN system including them and wireless hand-off method
US20030026198A1 (en)*2000-07-312003-02-06Wilhelmus DiepstratenWireless LAN with enhanced carrier sensing
US20030027550A1 (en)*2001-08-032003-02-06Rockwell Laurence I.Airborne security manager
US6522689B1 (en)*1998-06-122003-02-18Stmicroelectronics GmbhMonitoring circuit for a data transmission network
US20030036404A1 (en)*2001-08-072003-02-20Tomoko AdachiWireless communication system and wireless station
US20030048770A1 (en)*2001-09-132003-03-13Tantivy Communications, Inc.Method of detection of signals using an adaptive antenna in a peer-to-peer network
US6539428B2 (en)*1998-02-272003-03-25Netsolve, IncorporatedAlarm server systems, apparatus, and processes
US6539207B1 (en)*2000-06-272003-03-25Symbol Technologies, Inc.Component for a wireless communications equipment card
US20030061506A1 (en)*2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US20030060207A1 (en)*2001-06-082003-03-27Shigeru SugayaChannel allocation method, communication system, and wireless communication apparatus in wireless network
US20030061344A1 (en)*2001-09-212003-03-27Monroe David AMultimedia network appliances for security and surveillance applications
US20030065934A1 (en)*2001-09-282003-04-03Angelo Michael F.After the fact protection of data in remote personal and wireless devices
US20030064720A1 (en)*2001-10-032003-04-03Daniel ValinsSystem and method for generating communication network performance alarms
US20030063592A1 (en)*2001-09-282003-04-03Kabushiki Kaisha ToshibaWireless LAN access point
US20030070084A1 (en)*2001-10-082003-04-10Jari SatomaaManaging a network security application
US20030084323A1 (en)*2001-10-312003-05-01Gales George S.Network intrusion detection system and method
US20030084319A1 (en)*2001-10-312003-05-01Tarquini Richard PaulNode, method and computer readable medium for inserting an intrusion prevention system into a network stack
US20030088789A1 (en)*2001-11-022003-05-08Fenton Charles S.Method and system for secure communication
US20030096607A1 (en)*2001-09-302003-05-22Ronald TaylorMaintenance/trouble signals for a RF wireless locking system
US20030096577A1 (en)*2001-06-262003-05-22Tomi HeinonenShort range RF network configuration
US20030095520A1 (en)*2001-11-192003-05-22Aalbers Roeland G.D.Method and apparatus for identifying a node for data communications using its geographical location
US20030100306A1 (en)*2001-11-292003-05-29Koji ShinodaMobile station expediting location regis try to base station
US20030105976A1 (en)*2000-11-302003-06-05Copeland John A.Flow-based detection of network intrusions
US20030108016A1 (en)*2001-12-112003-06-12Motorola, Inc.Neighborhood wireless protocol with switchable ad hoc and wide area network coverage
US20030110398A1 (en)*2001-11-292003-06-12International Business Machines CorporationMethod, computer program element and a system for processing alarms triggered by a monitoring system
US20030117966A1 (en)*2001-12-212003-06-26Priscilla ChenNetwork protocol for wireless devices utilizing location information
US20030117985A1 (en)*2001-12-262003-06-26International Business Machines CorporationNetwork security system, computer, access point recognizing method, access point checking method, program, storage medium, and wireless lan device
US20030119526A1 (en)*2001-12-262003-06-26Edge Stephen WilliamHybrid architecture for supporting location determination in a wireless network
US20030120821A1 (en)*2001-12-212003-06-26Thermond Jeffrey L.Wireless local area network access management
US20030117986A1 (en)*2001-12-212003-06-26Thermond Jeffrey L.Wireless local area network channel resource management
US20030126258A1 (en)*2000-02-222003-07-03Conkright Gary W.Web based fault detection architecture
US20030125035A1 (en)*2001-12-192003-07-03Khafizov Farid T.Burst scheduling in a wireless communication system
US20030123420A1 (en)*2001-12-282003-07-03Sherlock Ian J.System and method for detecting and locating interferers in a wireless communication system
US6590891B1 (en)*1998-05-112003-07-08Inria Institut National De Recherche En Informatique Et En AutomatiqueSystem for the transmission of data to synchronised relay stations and corresponding process
US20030135762A1 (en)*2002-01-092003-07-17Peel Wireless, Inc.Wireless networks security system
US20030140246A1 (en)*2002-01-182003-07-24Palm, Inc.Location based security modification system and method
US20040003285A1 (en)*2002-06-282004-01-01Robert WhelanSystem and method for detecting unauthorized wireless access points
US6674403B2 (en)*2001-09-052004-01-06Newbury Networks, Inc.Position detection and location tracking in a wireless network
US6697337B1 (en)*2001-09-172004-02-24Networks Associates Technology, Inc.Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network
US20040054925A1 (en)*2002-09-132004-03-18Cyber Operations, LlcSystem and method for detecting and countering a network attack
US20040068668A1 (en)*2002-10-082004-04-08Broadcom CorporationEnterprise wireless local area network switching system
US20040078598A1 (en)*2002-05-042004-04-22Instant802 Networks Inc.Key management and control of wireless network access points at a central server
US20040102192A1 (en)*2002-11-262004-05-27Texas Instruments IncorporatedMethod and system for discovery and display of operating wireless networks
US20040103307A1 (en)*2001-08-202004-05-27Itran Communications Ltd.Mechanism for detecting intrusion and jamming attempts in a shared media based communications network
US20040107219A1 (en)*2002-09-232004-06-03Wimetrics CorporationSystem and method for wireless local area network monitoring and intrusion detection
US6874089B2 (en)*2002-02-252005-03-29Network Resonance, Inc.System, method and computer program product for guaranteeing electronic transactions
US6910135B1 (en)*1999-07-072005-06-21Verizon Corporate Services Group Inc.Method and apparatus for an intruder detection reporting and response system
US7043759B2 (en)*2000-09-072006-05-09Mazu Networks, Inc.Architecture to thwart denial of service attacks
US7194004B1 (en)*2002-01-282007-03-203Com CorporationMethod for managing network access
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility

Family Cites Families (76)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6484029B2 (en)1998-10-132002-11-19Symbol Technologies, Inc.Apparatus and methods for adapting mobile unit to wireless LAN
US5077753A (en)*1990-04-091991-12-31Proxim, Inc.Radio communication system using spread spectrum techniques
US5237614A (en)*1991-06-071993-08-17Security Dynamics Technologies, Inc.Integrated network security system
US5577209A (en)*1991-07-111996-11-19Itt CorporationApparatus and method for providing multi-level security for communication among computers and terminals on a network
US5231634B1 (en)*1991-12-181996-04-02Proxim IncMedium access protocol for wireless lans
GB9223890D0 (en)*1992-11-131993-01-06Ncr Int IncWireless local area network system
US6006090A (en)*1993-04-281999-12-21Proxim, Inc.Providing roaming capability for mobile computers in a standard network
JP2833967B2 (en)*1993-07-231998-12-09日本電気株式会社 Cell phone position detection method
US5809060A (en)*1994-02-171998-09-15Micrilor, Inc.High-data-rate wireless local-area network
JP3406319B2 (en)1994-02-172003-05-12プロキシム,インク. High-speed data transmission wireless local area network
WO1995024081A1 (en)1994-03-031995-09-08Proxim, Inc.Frequency hopping medium access control protocol
US6292508B1 (en)*1994-03-032001-09-18Proxim, Inc.Method and apparatus for managing power in a frequency hopping medium access control protocol
US5825817A (en)*1994-07-221998-10-20Anritsu CorporationRadio wave measuring apparatus for digital communication system
US6330244B1 (en)*1996-09-052001-12-11Jerome SwartzSystem for digital radio communication between a wireless lan and a PBX
US5844900A (en)*1996-09-231998-12-01Proxim, Inc.Method and apparatus for optimizing a medium access control protocol
JPH10111727A (en)*1996-10-031998-04-28Toshiba Corp Information equipment having telephone function and method for realizing security of the information equipment
US6453345B2 (en)*1996-11-062002-09-17Datadirect Networks, Inc.Network security and surveillance system
US5796942A (en)*1996-11-211998-08-18Computer Associates International, Inc.Method and apparatus for automated network-wide surveillance and security breach intervention
US5995834A (en)1996-12-241999-11-30At&T Wireless Services, Inc.Method for controlling channel re-selection from a selected control channel to an alternative control channel
US5953652A (en)*1997-01-241999-09-14At&T Wireless Services Inc.Detection of fraudulently registered mobile phones
WO1998059428A1 (en)1997-06-231998-12-30Micrilor, Inc.Wireless communications system for transmitting and receiving data with increased data rates and robustness
US6119230A (en)*1997-10-012000-09-12Novell, Inc.Distributed dynamic security capabilities
US6151357A (en)*1998-01-162000-11-21Aspect Communications CorporationMethod and apparatus for displaying a visual indication of a transmission status
US6272172B1 (en)*1998-03-312001-08-07Tektronix, Inc.Measurement acquisition and display apparatus
US6145083A (en)*1998-04-232000-11-07Siemens Information And Communication Networks, Inc.Methods and system for providing data and telephony security
US6289214B1 (en)*1998-05-292001-09-11Ericsson Inc.Systems and methods for deactivating a cellular radiotelephone system using an ANSI-41 short message service email
US6317829B1 (en)*1998-06-192001-11-13Entrust Technologies LimitedPublic key cryptography based security system to facilitate secure roaming of users
US6141778A (en)*1998-06-292000-10-31Mci Communications CorporationMethod and apparatus for automating security functions in a computer system
US6282546B1 (en)*1998-06-302001-08-28Cisco Technology, Inc.System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6324656B1 (en)*1998-06-302001-11-27Cisco Technology, Inc.System and method for rules-driven multi-phase network vulnerability assessment
US6304973B1 (en)*1998-08-062001-10-16Cryptek Secure Communications, LlcMulti-level security network system
US6158010A (en)*1998-10-282000-12-05Crosslogix, Inc.System and method for maintaining security in a distributed computer network
US6249575B1 (en)*1998-12-112001-06-19Securelogix CorporationTelephony security system
US6499107B1 (en)*1998-12-292002-12-24Cisco Technology, Inc.Method and system for adaptive network security using intelligent packet analysis
US6301668B1 (en)*1998-12-292001-10-09Cisco Technology, Inc.Method and system for adaptive network security using network vulnerability assessment
US6487666B1 (en)*1999-01-152002-11-26Cisco Technology, Inc.Intrusion detection signature analysis using regular expressions and logical operators
US6272129B1 (en)*1999-01-192001-08-073Com CorporationDynamic allocation of wireless mobile nodes over an internet protocol (IP) network
US6104712A (en)*1999-02-222000-08-15Robert; Bruno G.Wireless communication network including plural migratory access nodes
US6799047B1 (en)*1999-02-252004-09-28Microsoft CorporationLocating and tracking a user in a wireless network through environmentally profiled data
US6453159B1 (en)*1999-02-252002-09-17Telxon CorporationMulti-level encryption system for wireless network
US6301699B1 (en)*1999-03-182001-10-09Corekt Security Systems, Inc.Method for detecting buffer overflow for computer security
US6324647B1 (en)*1999-08-312001-11-27Michel K. Bowman-AmuahSystem, method and article of manufacture for security management in a development architecture framework
US6470384B1 (en)*1999-10-282002-10-22Networks Associates, Inc.Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment
WO2001043467A1 (en)1999-12-082001-06-14Proxim, Inc.Flexible wireless lan architecture based on a communication server
JP3450776B2 (en)*1999-12-282003-09-29株式会社エヌ・ティ・ティ・ドコモ Position management method of mobile terminal in mobile radio packet communication system and mobile radio packet communication system
AU2756201A (en)*2000-01-072001-07-16Mdiversity, Inc.Dynamic channel allocation in multiple-access communication systems
US6477198B1 (en)2000-05-012002-11-05Tektronix, Inc.Quality cause measurement display
US8661539B2 (en)*2000-07-102014-02-25Oracle International CorporationIntrusion threat detection
US20020112047A1 (en)*2000-12-052002-08-15Rakesh KushwahaSystem and method for wireless data terminal management using general packet radio service network
US6859761B2 (en)2001-01-162005-02-22Bluesoft Ltd.Accurate distance measurement using RF techniques
US7168093B2 (en)2001-01-252007-01-23Solutionary, Inc.Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
US7058031B2 (en)*2001-01-312006-06-06Qualcomm IncorporatedMethod and apparatus for efficient use of communication resources in a data communication system under overload conditions
US6983380B2 (en)2001-02-062006-01-03Networks Associates Technology, Inc.Automatically generating valid behavior specifications for intrusion detection
US6675012B2 (en)2001-03-082004-01-06Nokia Mobile Phones, Ltd.Apparatus, and associated method, for reporting a measurement summary in a radio communication system
US7162507B2 (en)*2001-03-082007-01-09Conexant, Inc.Wireless network site survey tool
US7047405B2 (en)2001-04-052006-05-16Qualcomm, Inc.Method and apparatus for providing secure processing and data storage for a wireless communication device
US7124173B2 (en)*2001-04-302006-10-17Moriarty Kathleen MMethod and apparatus for intercepting performance metric packets for improved security and intrusion detection
DE60107207T2 (en)2001-05-082005-12-01Lucent Technologies Inc. Wireless local area network with dynamic frequency dialing
DE60108225T2 (en)2001-05-082005-12-08Agere Systems Guardian Corp., Orlando Dynamic frequency selection in a wireless local area network with channel exchange between access points
US7325252B2 (en)2001-05-182008-01-29Achilles Guard Inc.Network security testing
US7194760B2 (en)2001-05-212007-03-20Nokia CorporationMethod for protecting privacy when using a Bluetooth device
JP4047273B2 (en)2001-05-252008-02-13プロキシム・コーポレーション Wireless network system software protocol
US6801777B2 (en)2001-11-272004-10-05Intel CorporationDevice and method for intelligent wireless communication selection
US7174566B2 (en)*2002-02-012007-02-06Intel CorporationIntegrated network intrusion detection
US7009957B2 (en)2002-02-282006-03-07Airmagnet, Inc.Measuring the throughput of transmissions over wireless local area networks
US7130289B2 (en)2002-03-142006-10-31Airmagnet, Inc.Detecting a hidden node in a wireless local area network
US7236460B2 (en)2002-03-292007-06-26Airmagnet, Inc.Detecting a counterfeit access point in a wireless local area network
JP3964248B2 (en)*2002-04-032007-08-22シャープ株式会社 Access point and wireless communication system
US7711809B2 (en)2002-04-042010-05-04Airmagnet, Inc.Detecting an unauthorized station in a wireless local area network
US7289465B2 (en)2002-04-082007-10-30Airmagnet, Inc.Determining the state of a station in a local area network
DE60326330D1 (en)2002-04-082009-04-09Airmagnet Inc MONITORING A LOCAL NETWORK
WO2003088532A1 (en)*2002-04-112003-10-23The Johns Hopkins UniversityIntrusion detection system for wireless networks
US7362865B2 (en)2002-04-152008-04-22Hewlett-Packard Development Company, L.P.Wireless network system
KR100465791B1 (en)*2002-04-182005-01-13삼성전자주식회사Computer security system using the simcard and control method thereof
US20030200455A1 (en)2002-04-182003-10-23Chi-Kai WuMethod applicable to wireless lan for security control and attack detection
US7778606B2 (en)*2002-05-172010-08-17Network Security Technologies, Inc.Method and system for wireless intrusion detection

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5646389A (en)*1990-11-131997-07-08Symbol Technologies, Inc.Inventory management system using coded re-order information
US5393965A (en)*1990-11-131995-02-28Symbol Technologies, Inc.Flexible merchandise checkout and inventory management system
US5866888A (en)*1990-11-201999-02-02Symbol Technologies, Inc.Traveler security and luggage control system
US5487069A (en)*1992-11-271996-01-23Commonwealth Scientific And Industrial Research OrganizationWireless LAN
US5644900A (en)*1994-02-071997-07-08Stone Container CorporationMultiwall bag
US5768312A (en)*1994-02-181998-06-16Leader Electronics Corp.Method and apparatus for evaluating digital transmission systems
US6400752B1 (en)*1994-09-292002-06-04Ricoh Company, Ltd.Wireless computer network communication system and method which determines an available spreading code
US5745483A (en)*1994-09-291998-04-28Ricoh Company, Ltd.Wireless computer network communication system and method having at least two groups of wireless terminals
US5870666A (en)*1995-02-131999-02-09Nec CorporationRadio channel estimation based on BER and RSSI
US5745479A (en)*1995-02-241998-04-283Com CorporationError detection in a wireless LAN environment
US20020029288A1 (en)*1995-07-122002-03-07Dobbins Kurt A.Internet protocol (IP) work group routing
US5737328A (en)*1995-10-041998-04-07Aironet Wireless Communications, Inc.Network communication system with information rerouting capabilities
US5919258A (en)*1996-02-081999-07-06Hitachi, Ltd.Security system and method for computers connected to network
US5903848A (en)*1996-03-251999-05-11Nec CorporationMethod of and apparatus for dynamic channel allocation
US5787077A (en)*1996-06-041998-07-28Ascom Tech AgDynamic connection mapping in wireless ATM systems
US5913174A (en)*1996-06-191999-06-15Proxim, Inc.Connectorized antenna for wireless LAN PCMCIA card radios
US5781857A (en)*1996-06-281998-07-14Motorola, Inc.Method of establishing an email monitor responsive to a wireless communications system user
US6067297A (en)*1996-06-282000-05-23Symbol Technologies, Inc.Embedded access point supporting communication with mobile unit operating in power-saving mode
US6507864B1 (en)*1996-08-022003-01-14Symbol Technologies, Inc.Client-server software for controlling data collection device from host computer
US5875179A (en)*1996-10-291999-02-23Proxim, Inc.Method and apparatus for synchronized communication over wireless backbone architecture
US5896499A (en)*1997-02-211999-04-20International Business Machines CorporationEmbedded security processor
US6178512B1 (en)*1997-08-232001-01-23U.S. Philips CorporationWireless network
US6070244A (en)*1997-11-102000-05-30The Chase Manhattan BankComputer network security management system
US6202157B1 (en)*1997-12-082001-03-13Entrust Technologies LimitedComputer network security system and method having unilateral enforceable security policy provision
US6205551B1 (en)*1998-01-292001-03-20Lucent Technologies Inc.Computer security using virus probing
US6539428B2 (en)*1998-02-272003-03-25Netsolve, IncorporatedAlarm server systems, apparatus, and processes
US6188681B1 (en)*1998-04-012001-02-13Symbol Technologies, Inc.Method and apparatus for determining alternative second stationary access point in response to detecting impeded wireless connection
US6590891B1 (en)*1998-05-112003-07-08Inria Institut National De Recherche En Informatique Et En AutomatiqueSystem for the transmission of data to synchronised relay stations and corresponding process
US6058482A (en)*1998-05-222000-05-02Sun Microsystems, Inc.Apparatus, method and system for providing network security for executable code in computer and communications networks
US6522689B1 (en)*1998-06-122003-02-18Stmicroelectronics GmbhMonitoring circuit for a data transmission network
US6185689B1 (en)*1998-06-242001-02-06Richard S. Carson & Assoc., Inc.Method for network self security assessment
US6240077B1 (en)*1998-07-092001-05-29Golden Gate Tele Systems Inc.Dynamic wireless multiplexing — switching hub for providing two-way communications with subscriber units
US6234656B1 (en)*1998-08-202001-05-22Physical Optics CorporationFiber optic luminaire
US6363477B1 (en)*1998-08-282002-03-263Com CorporationMethod for analyzing network application flows in an encrypted environment
US6910135B1 (en)*1999-07-072005-06-21Verizon Corporate Services Group Inc.Method and apparatus for an intruder detection reporting and response system
US20030126258A1 (en)*2000-02-222003-07-03Conkright Gary W.Web based fault detection architecture
US20020087882A1 (en)*2000-03-162002-07-04Bruce SchneierMehtod and system for dynamic network intrusion monitoring detection and response
US20020021745A1 (en)*2000-04-072002-02-21Negus Kevin J.Multi-channel-bandwidth frequency-hopping system
US20020083343A1 (en)*2000-06-122002-06-27Mark CrosbieComputer architecture for an intrusion detection system
US6539207B1 (en)*2000-06-272003-03-25Symbol Technologies, Inc.Component for a wireless communications equipment card
US20020059434A1 (en)*2000-06-282002-05-16Jeyhan KaraoguzMulti-mode controller
US20020060995A1 (en)*2000-07-072002-05-23Koninklijke Philips Electronics N.V.Dynamic channel selection scheme for IEEE 802.11 WLANs
US6411608B2 (en)*2000-07-122002-06-25Symbol Technologies, Inc.Method and apparatus for variable power control in wireless communications systems
US20020035699A1 (en)*2000-07-242002-03-21Bluesocket, Inc.Method and system for enabling seamless roaming in a wireless network
US6404772B1 (en)*2000-07-272002-06-11Symbol Technologies, Inc.Voice and data wireless communications network and method
US20030026198A1 (en)*2000-07-312003-02-06Wilhelmus DiepstratenWireless LAN with enhanced carrier sensing
US20020044533A1 (en)*2000-08-072002-04-18Paramvir BahlDistributed topology control for wireless multi-hop sensor networks
US7043759B2 (en)*2000-09-072006-05-09Mazu Networks, Inc.Architecture to thwart denial of service attacks
US20020032871A1 (en)*2000-09-082002-03-14The Regents Of The University Of MichiganMethod and system for detecting, tracking and blocking denial of service attacks over a computer network
US20020072329A1 (en)*2000-09-082002-06-13Nuno BandeiraScalable wireless network topology systems and methods
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility
US20020061031A1 (en)*2000-10-062002-05-23Sugar Gary L.Systems and methods for interference mitigation among multiple WLAN protocols
US20020066034A1 (en)*2000-10-242002-05-30Schlossberg Barry J.Distributed network security deception system
US20020060994A1 (en)*2000-11-172002-05-23Erno KovacsTransmission of carry-on objects using a wireless ad-hoc networking environment
US20030105976A1 (en)*2000-11-302003-06-05Copeland John A.Flow-based detection of network intrusions
US20020090089A1 (en)*2001-01-052002-07-11Steven BraniganMethods and apparatus for secure wireless networking
US20020090952A1 (en)*2001-01-082002-07-11Cantwell Charles E.Location of devices using wireless network nodes
US20020094777A1 (en)*2001-01-162002-07-18Cannon Joseph M.Enhanced wireless network security using GPS
US20030061506A1 (en)*2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US20030060207A1 (en)*2001-06-082003-03-27Shigeru SugayaChannel allocation method, communication system, and wireless communication apparatus in wireless network
US20030096577A1 (en)*2001-06-262003-05-22Tomi HeinonenShort range RF network configuration
US20030009606A1 (en)*2001-07-062003-01-09Santhanagopalan MuthukannanFuture generation software platform
US20030021254A1 (en)*2001-07-252003-01-30Nec CorporationWireless LAN terminal, wireless LAN base station, and wireless LAN system including them and wireless hand-off method
US20030027550A1 (en)*2001-08-032003-02-06Rockwell Laurence I.Airborne security manager
US20030036404A1 (en)*2001-08-072003-02-20Tomoko AdachiWireless communication system and wireless station
US20040103307A1 (en)*2001-08-202004-05-27Itran Communications Ltd.Mechanism for detecting intrusion and jamming attempts in a shared media based communications network
US6674403B2 (en)*2001-09-052004-01-06Newbury Networks, Inc.Position detection and location tracking in a wireless network
US20030048770A1 (en)*2001-09-132003-03-13Tantivy Communications, Inc.Method of detection of signals using an adaptive antenna in a peer-to-peer network
US6697337B1 (en)*2001-09-172004-02-24Networks Associates Technology, Inc.Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network
US20030061344A1 (en)*2001-09-212003-03-27Monroe David AMultimedia network appliances for security and surveillance applications
US20030063592A1 (en)*2001-09-282003-04-03Kabushiki Kaisha ToshibaWireless LAN access point
US20030065934A1 (en)*2001-09-282003-04-03Angelo Michael F.After the fact protection of data in remote personal and wireless devices
US20030096607A1 (en)*2001-09-302003-05-22Ronald TaylorMaintenance/trouble signals for a RF wireless locking system
US20030064720A1 (en)*2001-10-032003-04-03Daniel ValinsSystem and method for generating communication network performance alarms
US20030070084A1 (en)*2001-10-082003-04-10Jari SatomaaManaging a network security application
US20030084319A1 (en)*2001-10-312003-05-01Tarquini Richard PaulNode, method and computer readable medium for inserting an intrusion prevention system into a network stack
US20030084323A1 (en)*2001-10-312003-05-01Gales George S.Network intrusion detection system and method
US20030088789A1 (en)*2001-11-022003-05-08Fenton Charles S.Method and system for secure communication
US20030095520A1 (en)*2001-11-192003-05-22Aalbers Roeland G.D.Method and apparatus for identifying a node for data communications using its geographical location
US20030110398A1 (en)*2001-11-292003-06-12International Business Machines CorporationMethod, computer program element and a system for processing alarms triggered by a monitoring system
US20030100306A1 (en)*2001-11-292003-05-29Koji ShinodaMobile station expediting location regis try to base station
US20030108016A1 (en)*2001-12-112003-06-12Motorola, Inc.Neighborhood wireless protocol with switchable ad hoc and wide area network coverage
US20030125035A1 (en)*2001-12-192003-07-03Khafizov Farid T.Burst scheduling in a wireless communication system
US20030117986A1 (en)*2001-12-212003-06-26Thermond Jeffrey L.Wireless local area network channel resource management
US20030117966A1 (en)*2001-12-212003-06-26Priscilla ChenNetwork protocol for wireless devices utilizing location information
US20030120821A1 (en)*2001-12-212003-06-26Thermond Jeffrey L.Wireless local area network access management
US20030119526A1 (en)*2001-12-262003-06-26Edge Stephen WilliamHybrid architecture for supporting location determination in a wireless network
US20030117985A1 (en)*2001-12-262003-06-26International Business Machines CorporationNetwork security system, computer, access point recognizing method, access point checking method, program, storage medium, and wireless lan device
US20030123420A1 (en)*2001-12-282003-07-03Sherlock Ian J.System and method for detecting and locating interferers in a wireless communication system
US20030135762A1 (en)*2002-01-092003-07-17Peel Wireless, Inc.Wireless networks security system
US20030140246A1 (en)*2002-01-182003-07-24Palm, Inc.Location based security modification system and method
US7194004B1 (en)*2002-01-282007-03-203Com CorporationMethod for managing network access
US6874089B2 (en)*2002-02-252005-03-29Network Resonance, Inc.System, method and computer program product for guaranteeing electronic transactions
US20040078598A1 (en)*2002-05-042004-04-22Instant802 Networks Inc.Key management and control of wireless network access points at a central server
US20040003285A1 (en)*2002-06-282004-01-01Robert WhelanSystem and method for detecting unauthorized wireless access points
US20040054925A1 (en)*2002-09-132004-03-18Cyber Operations, LlcSystem and method for detecting and countering a network attack
US20040107219A1 (en)*2002-09-232004-06-03Wimetrics CorporationSystem and method for wireless local area network monitoring and intrusion detection
US20040068668A1 (en)*2002-10-082004-04-08Broadcom CorporationEnterprise wireless local area network switching system
US20040102192A1 (en)*2002-11-262004-05-27Texas Instruments IncorporatedMethod and system for discovery and display of operating wireless networks

Cited By (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140298467A1 (en)*2004-02-112014-10-02Airtight Networks, Inc.Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US20100132040A1 (en)*2004-02-112010-05-27Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US20120240196A1 (en)*2004-02-112012-09-20Airtight Networks, Inc.Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US20130117851A1 (en)*2004-02-112013-05-09Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US9003527B2 (en)*2004-02-112015-04-07Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US8789191B2 (en)*2004-02-112014-07-22Airtight Networks, Inc.Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US8264962B2 (en)*2005-06-272012-09-11Cisco Technology, Inc.System and method for dynamically responding to event-based traffic redirection
US20060291391A1 (en)*2005-06-272006-12-28Jean-Philippe VasseurSystem and method for dynamically responding to event-based traffic redirection
US9456025B2 (en)*2010-09-172016-09-27Thomson LicensingMethod and system for determining identity/presence of a mobile device user for control and interaction in content distribution
US20130304789A1 (en)*2010-09-172013-11-14Thomson LicensingMethod and system for determining identity/presence of a mobile device user for control and interaction in content distribution
US8752174B2 (en)2010-12-272014-06-10Avaya Inc.System and method for VoIP honeypot for converged VoIP services
US20170061422A1 (en)*2015-09-012017-03-02Bank Of America CorporationSystem for authenticating the use of a wearable device to execute a transaction
US10360560B2 (en)2015-09-012019-07-23Bank Of America CorporationSystem for authenticating a wearable device for transaction queuing
US10817862B2 (en)2015-09-012020-10-27Bank Of America CorporationSystem for authenticating a mobile device for comprehensive access to a facility
US10438201B2 (en)2015-09-092019-10-08Bank Of America CorporationSystem for generating a transaction specific tokenization for a wearable device
US20190149994A1 (en)*2017-11-102019-05-16Comcast Cable Communications, LlcMethods and Systems to Detect Rogue Hotspots
US10911956B2 (en)*2017-11-102021-02-02Comcast Cable Communications, LlcMethods and systems to detect rogue hotspots
US12200495B2 (en)2022-11-182025-01-14T-Mobile Usa, Inc.Integrating security and routing policies in wireless telecommunication networks

Also Published As

Publication numberPublication date
US7042852B2 (en)2006-05-09
US20030219008A1 (en)2003-11-27

Similar Documents

PublicationPublication DateTitle
US7042852B2 (en)System and method for wireless LAN dynamic channel change with honeypot trap
US7383577B2 (en)Method and system for encrypted network management and intrusion detection
US7779476B2 (en)Active defense against wireless intruders
US7086089B2 (en)Systems and methods for network security
US7277404B2 (en)System and method for sensing wireless LAN activity
US7322044B2 (en)Systems and methods for automated network policy exception detection and correction
US7359676B2 (en)Systems and methods for adaptively scanning for wireless communications
US8196199B2 (en)Personal wireless monitoring agent
US7324804B2 (en)Systems and methods for dynamic sensor discovery and selection
US7532895B2 (en)Systems and methods for adaptive location tracking
US7522908B2 (en)Systems and methods for wireless network site survey
US7355996B2 (en)Systems and methods for adaptive monitoring with bandwidth constraints
US20060123133A1 (en)Detecting unauthorized wireless devices on a wired network
US20040210654A1 (en)Systems and methods for determining wireless network topology
US20040203764A1 (en)Methods and systems for identifying nodes and mapping their locations
US20030135762A1 (en)Wireless networks security system
WO2004095192A2 (en)Systems and methods for securing wireless computer networks
CA2486519C (en)System and method for making managing wireless network activity
KR20130004172A (en)Monitoring of smart mobile devices in the wireless access networks
Sinha et al.Wireless intrusion protection system using distributed collaborative intelligence
OLADIPO et al.A Secure Wireless Intrusion Detection System (JBWIDS)
PudneyAn investigation into the unauthorised use of 802.11 wireless local area networks wireless local area networks
TaoA novel intrusion detection system for detection of MAC address spoofing in wireless networks
EjelikeA sensor-based online clustering approach for wireless intrusion detection

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:AIRDEFENSE, INC., GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HRASTAR, SCOTT E.;REEL/FRAME:018859/0226

Effective date:20020530

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp