Movatterモバイル変換


[0]ホーム

URL:


US20080109879A1 - Automated sniffer apparatus and method for monitoring computer systems for unauthorized access - Google Patents

Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
Download PDF

Info

Publication number
US20080109879A1
US20080109879A1US11/970,532US97053208AUS2008109879A1US 20080109879 A1US20080109879 A1US 20080109879A1US 97053208 AUS97053208 AUS 97053208AUS 2008109879 A1US2008109879 A1US 2008109879A1
Authority
US
United States
Prior art keywords
wireless
computer
sniffer
wireless access
access point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/970,532
Inventor
Pravin Bhagwat
Shantanu Gogate
David King
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mojo Networks LLC
Original Assignee
Airtight Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=40636101&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20080109879(A1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Airtight Networks IncfiledCriticalAirtight Networks Inc
Priority to US11/970,532priorityCriticalpatent/US20080109879A1/en
Assigned to AIRTIGHT NETWORKS, INC.reassignmentAIRTIGHT NETWORKS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KING, DAVID, BHAGWAT, PRAVIN, GOGATE, SHANTANU
Publication of US20080109879A1publicationCriticalpatent/US20080109879A1/en
Priority to US13/399,626prioritypatent/US8789191B2/en
Priority to US14/307,351prioritypatent/US20140298467A1/en
Assigned to WESTERN ALLIANCE BANKreassignmentWESTERN ALLIANCE BANKSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MOJO NETWORKS, INC.
Assigned to MOJO NETWORKS, INC., FORMERLY KNOWN AS AIRTIGHT NETWORKS, INCreassignmentMOJO NETWORKS, INC., FORMERLY KNOWN AS AIRTIGHT NETWORKS, INCRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: WESTERN ALLIANCE BANK
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An apparatus for wireless communication including an automated intrusion detection process is provided. The apparatus has a portable housing, which may have a length no greater than 1 meter, a width no greater than 1 meter, and a height of no greater than 1 meter. A processing unit (e.g., CPU) is within the housing. One or more wireless network interface devices are within the housing and are coupled to the processing unit. The apparatus has an Ethernet (or like) network interface device within the housing and coupled to the processing unit. A network connector is coupled to the Ethernet network device. One or more memories are coupled to the processing unit. A code is directed to perform a process for detection of a wireless activity within a selected local geographic region. According to a specific embodiment, the wireless activity is derived from at least one authorized device or at least an other device. A code is directed to receiving at least identity information associated with the wireless activity from the detection process in a classification process. A code is directed to labeling the identity information into at least one of a plurality of categories in the classification process. Depending upon the embodiment, other codes may exist to carry out the functionality described herein.

Description

Claims (21)

21. A method for monitoring for unauthorized wireless access to computer networks, the method comprising:
monitoring wireless communications within a selected geographic region using one or more sniffer devices to at least detect an active wireless access point device that transmits wireless signals within the selected geographic region, the one or more sniffer devices being positioned within the selected geographic region;
transferring a plurality of marker packets into the computer network, the plurality of marker packets being adapted to be transferred to wireless medium from the computer network through one or more wireless access point devices which are connected to the computer network and which are configured to function as layer two bridges between their wired and wireless interfaces, the plurality of marker packets having a predetermined format, at least a subset of the one or more sniffer devices being configured to be able to identify at least a portion of the predetermined format, the transferring being actively transferring at least for a process of detection of unauthorized wireless access to the computer network;
processing using at least one of the at least the subset of the one or more sniffer devices at least a portion of the monitored wireless communications within the selected geographic region, the processing being directed to at least identifying at least one of the plurality of marker packets being transferred from the computer network to the wireless medium within the selected geographic region through the active wireless access point device, the processing including identifying the at least the portion of the predetermined format within one or more packets included in the at least the portion of the monitored wireless communications; and
determining that the active wireless access point device provides unauthorized wireless access to the computer network based at least upon the at least one of the plurality of marker packets being identified as transferred from the computer network to the wireless medium within the selected geographic region through the active wireless access point device.
32. An apparatus for monitoring for unauthorized wireless access to computer networks, the apparatus comprising:
a wired network interface for coupling the apparatus to a computer network;
a first portion of computer memory coupled to the wired network interface, the first portion of computer memory including computer code for transferring one or more marker packets into the computer network using the wired network interface, the one or more marker packets being adapted to be transferred to wireless medium from the computer network through one or more wireless access point devices which are connected to the computer network and which are configured to function as layer two bridges between their wired and wireless interfaces, a predetermined format being associated with the one or more marker packets, the transferring being actively transferring at least for a process of detection of unauthorized wireless access to the computer network;
a wireless network interface for receiving wireless communication activity;
a second portion of computer memory coupled to the wireless network interface, the second portion of computer memory including computer code for processing at least a portion of the wireless communication activity received using the wireless network interface to identify at least one marker packet from the one or more marker packets that is transferred to the wireless medium from the computer network through a first wireless access point device; and
a third portion of computer memory including computer code for generating an indication that the first wireless access point device provides unauthorized wireless access to the computer network responsive to at least the at least one marker packet being identified.
US11/970,5322004-02-112008-01-08Automated sniffer apparatus and method for monitoring computer systems for unauthorized accessAbandonedUS20080109879A1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US11/970,532US20080109879A1 (en)2004-02-112008-01-08Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US13/399,626US8789191B2 (en)2004-02-112012-02-17Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US14/307,351US20140298467A1 (en)2004-02-112014-06-17Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US54363104P2004-02-112004-02-11
US10/931,585US7339914B2 (en)2004-02-112004-08-31Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US11/970,532US20080109879A1 (en)2004-02-112008-01-08Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

Related Parent Applications (2)

Application NumberTitlePriority DateFiling Date
US10/931,585ContinuationUS7339914B2 (en)2004-02-112004-08-31Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US13/399,626ContinuationUS8789191B2 (en)2004-02-112012-02-17Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US13/399,626ContinuationUS8789191B2 (en)2004-02-112012-02-17Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

Publications (1)

Publication NumberPublication Date
US20080109879A1true US20080109879A1 (en)2008-05-08

Family

ID=40636101

Family Applications (7)

Application NumberTitlePriority DateFiling Date
US10/931,585Active2025-12-08US7339914B2 (en)2004-02-112004-08-31Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US10/931,926Active2027-02-23US7536723B1 (en)2004-02-112004-08-31Automated method and system for monitoring local area computer networks for unauthorized wireless access
US11/970,532AbandonedUS20080109879A1 (en)2004-02-112008-01-08Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US12/419,300AbandonedUS20100132040A1 (en)2004-02-112009-04-07Automated method and system for monitoring local area computer networks for unauthorized wireless access
US13/399,626Expired - LifetimeUS8789191B2 (en)2004-02-112012-02-17Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US13/533,674Expired - LifetimeUS9003527B2 (en)2004-02-112012-06-26Automated method and system for monitoring local area computer networks for unauthorized wireless access
US14/307,351AbandonedUS20140298467A1 (en)2004-02-112014-06-17Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US10/931,585Active2025-12-08US7339914B2 (en)2004-02-112004-08-31Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US10/931,926Active2027-02-23US7536723B1 (en)2004-02-112004-08-31Automated method and system for monitoring local area computer networks for unauthorized wireless access

Family Applications After (4)

Application NumberTitlePriority DateFiling Date
US12/419,300AbandonedUS20100132040A1 (en)2004-02-112009-04-07Automated method and system for monitoring local area computer networks for unauthorized wireless access
US13/399,626Expired - LifetimeUS8789191B2 (en)2004-02-112012-02-17Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US13/533,674Expired - LifetimeUS9003527B2 (en)2004-02-112012-06-26Automated method and system for monitoring local area computer networks for unauthorized wireless access
US14/307,351AbandonedUS20140298467A1 (en)2004-02-112014-06-17Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

Country Status (1)

CountryLink
US (7)US7339914B2 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020143938A1 (en)*2000-09-282002-10-03Bruce AlexanderSystem and method for providing configurable security monitoring utilizing an integrated information system
US20070258452A1 (en)*2006-04-202007-11-08Naoto ShimizuApparatus and method for detecting network address translation device
US20070286229A1 (en)*2006-06-092007-12-13Asustek Computer Inc.Computer and main circuit board thereof
US20080186932A1 (en)*2007-02-052008-08-07Duy Khuong DoApproach For Mitigating The Effects Of Rogue Wireless Access Points
US7480715B1 (en)*2002-01-252009-01-20Vig Acquisitions Ltd., L.L.C.System and method for performing a predictive threat assessment based on risk factors
US7536723B1 (en)*2004-02-112009-05-19Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US7627665B2 (en)2000-09-282009-12-01Barker Geoffrey TSystem and method for providing configurable security monitoring utilizing an integrated information system
US20100296496A1 (en)*2009-05-192010-11-25Amit SinhaSystems and methods for concurrent wireless local area network access and sensing
US7873998B1 (en)*2005-07-192011-01-18Trustwave Holdings, Inc.Rapidly propagating threat detection
USRE43598E1 (en)2000-09-282012-08-21Vig Acquisitions Ltd., L.L.C.Method and process for configuring a premises for monitoring
US20120304294A1 (en)*2009-03-182012-11-29Yuji FujiwaraNetwork Monitoring Apparatus and Network Monitoring Method
US20130081137A1 (en)*2011-09-232013-03-28Arturo GeigelSimultaneous Determination of a Computer Location and User Identification
US20140254389A1 (en)*2013-03-052014-09-11Qualcomm IncorporatedSystems and methods for monitoring wireless communications
US9215075B1 (en)2013-03-152015-12-15Poltorak Technologies LlcSystem and method for secure relayed communications from an implantable medical device
US9338816B2 (en)2008-05-142016-05-10Aerohive Networks, Inc.Predictive and nomadic roaming of wireless clients across different network subnets
US9413772B2 (en)2013-03-152016-08-09Aerohive Networks, Inc.Managing rogue devices through a network backhaul
US9565125B2 (en)2012-06-142017-02-07Aerohive Networks, Inc.Multicast to unicast conversion technique
US9572135B2 (en)2009-01-212017-02-14Aerohive Networks, Inc.Airtime-based packet scheduling for wireless networks
US9674892B1 (en)2008-11-042017-06-06Aerohive Networks, Inc.Exclusive preshared key authentication
US9814055B2 (en)2010-09-072017-11-07Aerohive Networks, Inc.Distributed channel selection for wireless networks
US9900251B1 (en)2009-07-102018-02-20Aerohive Networks, Inc.Bandwidth sentinel
US10091065B1 (en)2011-10-312018-10-02Aerohive Networks, Inc.Zero configuration networking on a subnetted network
US10389650B2 (en)2013-03-152019-08-20Aerohive Networks, Inc.Building and maintaining a network
US10419458B2 (en)2016-01-212019-09-17Cyiot LtdDistributed techniques for detecting atypical or malicious wireless communications activity
US10798634B2 (en)2007-04-272020-10-06Extreme Networks, Inc.Routing method and system for a wireless network
US20210217284A1 (en)*2018-07-132021-07-15Carrier CorporationRadio frequency presence alert system
US11115857B2 (en)2009-07-102021-09-07Extreme Networks, Inc.Bandwidth sentinel

Families Citing this family (182)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP4174392B2 (en)*2003-08-282008-10-29日本電気株式会社 Network unauthorized connection prevention system and network unauthorized connection prevention device
EP1685501A1 (en)*2003-11-182006-08-02Nokia CorporationMethod, subject terminal device, target terminal device, data content server, system and computer programs for maintaining and updating data contents
US7002943B2 (en)*2003-12-082006-02-21Airtight Networks, Inc.Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7440434B2 (en)*2004-02-112008-10-21Airtight Networks, Inc.Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods
US11368429B2 (en)2004-03-162022-06-21Icontrol Networks, Inc.Premises management configuration and control
US11916870B2 (en)2004-03-162024-02-27Icontrol Networks, Inc.Gateway registry methods and systems
US10062273B2 (en)2010-09-282018-08-28Icontrol Networks, Inc.Integrated security system with parallel processing architecture
US10339791B2 (en)2007-06-122019-07-02Icontrol Networks, Inc.Security network integrated with premise security system
US12063220B2 (en)2004-03-162024-08-13Icontrol Networks, Inc.Communication protocols in integrated systems
US11343380B2 (en)2004-03-162022-05-24Icontrol Networks, Inc.Premises system automation
US10522026B2 (en)2008-08-112019-12-31Icontrol Networks, Inc.Automation system user interface with three-dimensional display
US11489812B2 (en)2004-03-162022-11-01Icontrol Networks, Inc.Forming a security network including integrated security system components and network devices
US9729342B2 (en)2010-12-202017-08-08Icontrol Networks, Inc.Defining and implementing sensor triggered response rules
JP2007529826A (en)2004-03-162007-10-25アイコントロール ネットワークス, インコーポレイテッド Object management network
US11677577B2 (en)2004-03-162023-06-13Icontrol Networks, Inc.Premises system management using status signal
US11244545B2 (en)2004-03-162022-02-08Icontrol Networks, Inc.Cross-client sensor user interface in an integrated security network
US11582065B2 (en)2007-06-122023-02-14Icontrol Networks, Inc.Systems and methods for device communication
US20170118037A1 (en)2008-08-112017-04-27Icontrol Networks, Inc.Integrated cloud system for premises automation
US10721087B2 (en)2005-03-162020-07-21Icontrol Networks, Inc.Method for networked touchscreen with integrated interfaces
US11811845B2 (en)2004-03-162023-11-07Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
US10142392B2 (en)2007-01-242018-11-27Icontrol Networks, Inc.Methods and systems for improved system performance
US10237237B2 (en)2007-06-122019-03-19Icontrol Networks, Inc.Communication protocols in integrated systems
US7317914B2 (en)2004-09-242008-01-08Microsoft CorporationCollaboratively locating disconnected clients and rogue access points in a wireless network
US7603460B2 (en)*2004-09-242009-10-13Microsoft CorporationDetecting and diagnosing performance problems in a wireless network through neighbor collaboration
US7760654B2 (en)*2004-09-242010-07-20Microsoft CorporationUsing a connected wireless computer as a conduit for a disconnected wireless computer
US7627123B2 (en)2005-02-072009-12-01Juniper Networks, Inc.Wireless network having multiple security interfaces
US20060193299A1 (en)*2005-02-252006-08-31Cicso Technology, Inc., A California CorporationLocation-based enhancements for wireless intrusion detection
WO2006099540A2 (en)2005-03-152006-09-21Trapeze Networks, Inc.System and method for distributing keys in a wireless network
US20170180198A1 (en)*2008-08-112017-06-22Marc BaumForming a security network including integrated security system components
US10999254B2 (en)2005-03-162021-05-04Icontrol Networks, Inc.System for data routing in networks
US20120324566A1 (en)2005-03-162012-12-20Marc BaumTakeover Processes In Security Network Integrated With Premise Security System
US11700142B2 (en)2005-03-162023-07-11Icontrol Networks, Inc.Security network integrating security system and network devices
US11615697B2 (en)2005-03-162023-03-28Icontrol Networks, Inc.Premise management systems and methods
US11496568B2 (en)2005-03-162022-11-08Icontrol Networks, Inc.Security system with networked touchscreen
US8437729B2 (en)*2005-05-102013-05-07Mobile Communication Technologies, LlcApparatus for and system for enabling a mobile communicator
US7783756B2 (en)*2005-06-032010-08-24Alcatel LucentProtection for wireless devices against false access-point attacks
US7673347B2 (en)*2005-08-302010-03-02Sap AgInformation control in federated interaction
US8621604B2 (en)*2005-09-062013-12-31Daniel ChienEvaluating a questionable network communication
US9015090B2 (en)2005-09-062015-04-21Daniel ChienEvaluating a questionable network communication
US9674145B2 (en)2005-09-062017-06-06Daniel ChienEvaluating a questionable network communication
US9912677B2 (en)2005-09-062018-03-06Daniel ChienEvaluating a questionable network communication
US7724703B2 (en)2005-10-132010-05-25Belden, Inc.System and method for wireless network monitoring
WO2007044986A2 (en)2005-10-132007-04-19Trapeze Networks, Inc.System and method for remote monitoring in a wireless network
US7573859B2 (en)2005-10-132009-08-11Trapeze Networks, Inc.System and method for remote monitoring in a wireless network
US8638762B2 (en)2005-10-132014-01-28Trapeze Networks, Inc.System and method for network integrity
US20070109982A1 (en)*2005-11-112007-05-17Computer Associates Think, Inc.Method and system for managing ad-hoc connections in a wireless network
US7710933B1 (en)2005-12-082010-05-04Airtight Networks, Inc.Method and system for classification of wireless devices in local area computer networks
US20070178939A1 (en)*2006-01-312007-08-02Sbc Knowledge Ventures LpMethod for reducing radio interference between wireless access points
US8214899B2 (en)*2006-03-152012-07-03Daniel ChienIdentifying unauthorized access to a network resource
US7729274B2 (en)2006-03-312010-06-01Ciena CorporationSmart ethernet mesh edge device
EP2008476A4 (en)*2006-03-312010-11-03Gridpoint Systems Inc INTELLIGENT ETHERNET PERIPHERAL NETWORKING SYSTEM
US7925765B2 (en)*2006-04-072011-04-12Microsoft CorporationCooperative diagnosis in a wireless LAN
US7558266B2 (en)2006-05-032009-07-07Trapeze Networks, Inc.System and method for restricting network access using forwarding databases
US8966018B2 (en)2006-05-192015-02-24Trapeze Networks, Inc.Automated network device configuration and network deployment
US9191799B2 (en)2006-06-092015-11-17Juniper Networks, Inc.Sharing data between wireless switches system and method
US8818322B2 (en)2006-06-092014-08-26Trapeze Networks, Inc.Untethered access point mesh system and method
US9258702B2 (en)2006-06-092016-02-09Trapeze Networks, Inc.AP-local dynamic switching
US10079839B1 (en)2007-06-122018-09-18Icontrol Networks, Inc.Activation of gateway device
US12063221B2 (en)2006-06-122024-08-13Icontrol Networks, Inc.Activation of gateway device
US8520645B2 (en)*2006-06-302013-08-27Core Wireless Licensing S.A.R.L.Method of controlling a mobile terminal, and an associated mobile terminal
US8929345B2 (en)*2006-08-222015-01-06Ca, Inc.Method and system for managing devices in a wireless network
US20080056222A1 (en)*2006-08-292008-03-06Nigel WaitesWireless router connection indicator
US8340110B2 (en)2006-09-152012-12-25Trapeze Networks, Inc.Quality of service provisioning for wireless networks
US8958399B1 (en)*2006-09-282015-02-17Symantec CorporationMethod and apparatus for providing connectivity control
US7873061B2 (en)2006-12-282011-01-18Trapeze Networks, Inc.System and method for aggregation and queuing in a wireless network
US11706279B2 (en)2007-01-242023-07-18Icontrol Networks, Inc.Methods and systems for data communication
US8155662B2 (en)*2007-02-192012-04-10Microsoft CorporationSelf-configuring wireless network location system
US7516049B2 (en)*2007-02-192009-04-07Microsoft CorporationWireless performance analysis system
US7633385B2 (en)2007-02-282009-12-15Ucontrol, Inc.Method and system for communicating with and controlling an alarm system from a remote server
US8451986B2 (en)2007-04-232013-05-28Icontrol Networks, Inc.Method and system for automatically providing alternate network access for telecommunications
US8875193B2 (en)*2007-05-142014-10-28Sigma Group, Inc.Wireless multimedia system
US9455783B2 (en)2013-05-062016-09-27Federal Law Enforcement Development Services, Inc.Network security and variable pulse wave form with continuous communication
US11265082B2 (en)2007-05-242022-03-01Federal Law Enforcement Development Services, Inc.LED light control assembly and system
US9414458B2 (en)2007-05-242016-08-09Federal Law Enforcement Development Services, Inc.LED light control assembly and system
US9100124B2 (en)2007-05-242015-08-04Federal Law Enforcement Development Services, Inc.LED Light Fixture
US20080317475A1 (en)2007-05-242008-12-25Federal Law Enforcement Development Services, Inc.Led light interior room and building communication system
US7929964B2 (en)*2007-06-082011-04-19Alcatel-Lucent Usa Inc.Managing mobile station Wi-Fi communications
US12003387B2 (en)2012-06-272024-06-04Comcast Cable Communications, LlcControl system user interface
US12184443B2 (en)2007-06-122024-12-31Icontrol Networks, Inc.Controlling data routing among networks
US12283172B2 (en)2007-06-122025-04-22Icontrol Networks, Inc.Communication protocols in integrated systems
US10523689B2 (en)2007-06-122019-12-31Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
US11646907B2 (en)2007-06-122023-05-09Icontrol Networks, Inc.Communication protocols in integrated systems
US11601810B2 (en)2007-06-122023-03-07Icontrol Networks, Inc.Communication protocols in integrated systems
US11423756B2 (en)2007-06-122022-08-23Icontrol Networks, Inc.Communication protocols in integrated systems
US11212192B2 (en)2007-06-122021-12-28Icontrol Networks, Inc.Communication protocols in integrated systems
US11218878B2 (en)2007-06-122022-01-04Icontrol Networks, Inc.Communication protocols in integrated systems
US11316753B2 (en)2007-06-122022-04-26Icontrol Networks, Inc.Communication protocols in integrated systems
US11831462B2 (en)2007-08-242023-11-28Icontrol Networks, Inc.Controlling data routing in premises management systems
US8902904B2 (en)2007-09-072014-12-02Trapeze Networks, Inc.Network assignment based on priority
US7970894B1 (en)2007-11-152011-06-28Airtight Networks, Inc.Method and system for monitoring of wireless devices in local area computer networks
US8238942B2 (en)2007-11-212012-08-07Trapeze Networks, Inc.Wireless station location detection
US11916928B2 (en)2008-01-242024-02-27Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
US8150357B2 (en)2008-03-282012-04-03Trapeze Networks, Inc.Smoothing filter for irregular update intervals
US8893252B1 (en)*2008-04-162014-11-18Meru NetworksWireless communication selective barrier
US20170185278A1 (en)2008-08-112017-06-29Icontrol Networks, Inc.Automation system user interface
US8978105B2 (en)2008-07-252015-03-10Trapeze Networks, Inc.Affirming network relationships and resource access via related networks
US11729255B2 (en)2008-08-112023-08-15Icontrol Networks, Inc.Integrated cloud system with lightweight gateway for premises automation
US11758026B2 (en)2008-08-112023-09-12Icontrol Networks, Inc.Virtual device systems and methods
US11792036B2 (en)2008-08-112023-10-17Icontrol Networks, Inc.Mobile premises automation platform
US10530839B2 (en)2008-08-112020-01-07Icontrol Networks, Inc.Integrated cloud system with lightweight gateway for premises automation
US8238298B2 (en)2008-08-292012-08-07Trapeze Networks, Inc.Picking an optimal channel for an access point in a wireless network
US8752175B2 (en)*2008-10-312014-06-10Hewlett-Packard Development Company, L.P.Method and apparatus for network intrusion detection
US20100246416A1 (en)*2009-03-252010-09-30Amit SinhaSystems and methods for remote testing of wireless lan access points
US8890773B1 (en)2009-04-012014-11-18Federal Law Enforcement Development Services, Inc.Visible light transceiver glasses
US8638211B2 (en)2009-04-302014-01-28Icontrol Networks, Inc.Configurable controller and interface for home SMA, phone and multimedia
CN101895964B (en)*2009-05-212013-03-20鸿富锦精密工业(深圳)有限公司Mobile station and method for scanning service group identification code by mobile station
JP5246034B2 (en)*2009-05-222013-07-24富士通株式会社 Packet transmission / reception system, packet transmission / reception device, and packet transmission / reception method
CN102577261A (en)*2009-07-312012-07-11惠普发展公司,有限责任合伙企业Method for detection of a rogue wireless access point
US9531844B2 (en)*2009-10-012016-12-27Sony CorporationAutomatic internet connection sharing among related devices
US20110107417A1 (en)*2009-10-302011-05-05Balay Rajini IDetecting AP MAC Spoofing
US9197420B2 (en)*2010-01-062015-11-24International Business Machines CorporationUsing information in a digital certificate to authenticate a network of a wireless access point
EP2438511B1 (en)2010-03-222019-07-03LRDC Systems, LLCA method of identifying and protecting the integrity of a set of source data
US8402516B2 (en)*2010-05-062013-03-19Jonathan WeizmanApparatus and method for establishing a peer-to-peer communication session with a host device
US8402515B2 (en)*2010-05-062013-03-19Jonathan WeizmanApparatus and method for establishing a peer-to-peer communication session with a client device
CN101902744B (en)*2010-07-282013-05-01南京航空航天大学Intrusion detection system of wireless sensor network based on sniffer
US8836467B1 (en)2010-09-282014-09-16Icontrol Networks, Inc.Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11750414B2 (en)2010-12-162023-09-05Icontrol Networks, Inc.Bidirectional security sensor communication for a premises security system
US9147337B2 (en)2010-12-172015-09-29Icontrol Networks, Inc.Method and system for logging security event data
WO2012122217A2 (en)*2011-03-072012-09-13Adtran, Inc.Method and apparatus for network access control
US8695095B2 (en)*2011-03-112014-04-08At&T Intellectual Property I, L.P.Mobile malicious software mitigation
US10139900B2 (en)2011-04-122018-11-27Mobile Communication Technologies, LlcMobile communicator device including user attentiveness detector
US9026780B2 (en)2011-04-122015-05-05Mobile Communication Technologies, LlcMobile communicator device including user attentiveness detector
US9026779B2 (en)2011-04-122015-05-05Mobile Communication Technologies, LlcMobile communicator device including user attentiveness detector
US8566900B1 (en)*2011-05-232013-10-22Palo Alto Networks, Inc.Using geographical information in policy enforcement
US8995945B2 (en)2011-08-302015-03-31Mobile Communication Technologies, LlcMobile communicator and system
US9560073B2 (en)*2011-09-082017-01-31Drexel UniversityReconfigurable antenna based solutions for device authentication and intrusion detection in wireless networks
JP5792654B2 (en)*2012-02-152015-10-14株式会社日立製作所 Security monitoring system and security monitoring method
US9279878B2 (en)2012-03-272016-03-08Microsoft Technology Licensing, LlcLocating a mobile device
US9166732B2 (en)*2012-04-192015-10-20At&T Mobility Ii LlcFacilitation of security employing a femto cell access point
CN102752756A (en)*2012-06-082012-10-24深信服网络科技(深圳)有限公司Method and device for preventing surfing the Internet by privately connecting wireless access point (AP)
WO2013187710A1 (en)2012-06-132013-12-19한국전자통신연구원Method for changing operating mode of wireless lan system and wireless lan system
KR102078128B1 (en)*2012-06-132020-02-17한국전자통신연구원Wireless lan system and operating mode change method of wireless lan system
JP5987627B2 (en)*2012-10-222016-09-07富士通株式会社 Unauthorized access detection method, network monitoring device and program
US9612121B2 (en)2012-12-062017-04-04Microsoft Technology Licensing, LlcLocating position within enclosure
CN102984165B (en)*2012-12-072016-04-13广州杰赛科技股份有限公司Wireless network secure supervisory control system and method
US9380644B2 (en)*2012-12-212016-06-28Hewlett Packard Enterprise Development LpAccess points to provide event notifications
US10084791B2 (en)2013-08-142018-09-25Daniel ChienEvaluating a questionable network communication
US20150198941A1 (en)2014-01-152015-07-16John C. PedersonCyber Life Electronic Networking and Commerce Operating Exchange
US11405463B2 (en)2014-03-032022-08-02Icontrol Networks, Inc.Media content management
US9407659B2 (en)*2014-04-232016-08-02Arbor Networks, Inc.Protecting computing assets from resource intensive querying attacks
EP3155833B1 (en)*2014-06-132019-01-02Philips Lighting Holding B.V.Localization based on network of wireless nodes
EP3158428A4 (en)*2014-06-202017-12-27Arturo, GeigelSimultaneous determination of a mobile device and its user identification
US10531545B2 (en)2014-08-112020-01-07RAB Lighting Inc.Commissioning a configurable user control device for a lighting control system
US10085328B2 (en)2014-08-112018-09-25RAB Lighting Inc.Wireless lighting control systems and methods
US10039174B2 (en)2014-08-112018-07-31RAB Lighting Inc.Systems and methods for acknowledging broadcast messages in a wireless lighting control network
US9661497B2 (en)*2014-08-282017-05-23Cisco Technology, Inc.Control and enhancement of direct wireless service communications
CN104219670B (en)*2014-09-032018-06-08珠海市君天电子科技有限公司Identify method, client and the system of falseness wifi
US20160164889A1 (en)*2014-12-032016-06-09Fortinet, Inc.Rogue access point detection
US20160165449A1 (en)*2014-12-032016-06-09Intel CorporationNotification of unauthorized wireless network devices
US9787719B2 (en)2015-02-262017-10-10Symantec CorporationTrusted third party broker for collection and private sharing of successful computer security practices
US9794290B2 (en)*2015-02-262017-10-17Symantec CorporationQuantitative security improvement system based on crowdsourcing
US20150339900A1 (en)*2015-04-272015-11-26Michael Lewis MoravitzHome satellite surveillance defense
US9350759B1 (en)*2015-06-182016-05-24Hak5 LlcNetwork security appliance to imitate a wireless access point of a local area network through coordination of multiple radios
US20170048953A1 (en)2015-08-112017-02-16Federal Law Enforcement Development Services, Inc.Programmable switch and system
GB201521137D0 (en)*2015-12-012016-01-13Qatar Foundation For Education Science And Community DevHoneybot: Mobile Honeypot detection and isolation techniques for adhoc malicious communications
US11290425B2 (en)*2016-02-012022-03-29Airwatch LlcConfiguring network security based on device management characteristics
US10257226B2 (en)2016-03-242019-04-09802 Secure, Inc.Identifying and trapping wireless based attacks on networks using deceptive network emulation
US10594731B2 (en)*2016-03-242020-03-17Snowflake Inc.Systems, methods, and devices for securely managing network connections
US20190199833A1 (en)*2016-05-182019-06-27Nec CorporationTransmission device, method, program, and recording medium
US10158998B2 (en)*2016-06-212018-12-18Qualcomm IncorporatedNetwork path probing using available network connections
US10542006B2 (en)2016-11-222020-01-21Daniel ChienNetwork security based on redirection of questionable network access
US10382436B2 (en)2016-11-222019-08-13Daniel ChienNetwork security based on device identifiers and network addresses
US10348614B2 (en)*2017-03-022019-07-09International Business Machines CorporationDebugging device with serial and Ethernet console module and hardware bypass
JP6891583B2 (en)*2017-03-272021-06-18日本電気株式会社 Information processing equipment, information processing methods, programs
DE102017128615A1 (en)*2017-12-012019-06-06Balluff Gmbh Device and method for detecting spoofers in a wireless IO-Link communication network
US11336621B2 (en)*2018-05-082022-05-17Shlomo TouboulWiFiwall
US11665630B2 (en)2018-08-242023-05-30British Telecommunications Public Limited CompanyIdentification of wireless transmissions carried by a wireless network
GB2576576B (en)*2018-08-242021-03-03British TelecommIdentification of channels in a wireless network
US11188622B2 (en)2018-09-282021-11-30Daniel ChienSystems and methods for computer security
US10848489B2 (en)2018-12-142020-11-24Daniel ChienTimestamp-based authentication with redirection
US10826912B2 (en)2018-12-142020-11-03Daniel ChienTimestamp-based authentication
CN111435562B (en)*2019-01-112024-05-24开利公司Method of processing environmental radio frequency data for activity recognition
US10924786B2 (en)2019-05-082021-02-16Nanning Fugui Precision Industrial Co., Ltd.Method for shaping video streams and set-up box using the method
US10966140B2 (en)*2019-06-172021-03-30Nanning Fugui Precision Industrial Co., Ltd.Method for detecting and filtering out unauthorized wireless access point and device using the method
US10958557B2 (en)*2019-07-312021-03-23International Business Machines CorporationAutomated deployment of a private monitoring network
US11677754B2 (en)2019-12-092023-06-13Daniel ChienAccess control systems and methods
US11445423B2 (en)2020-05-292022-09-13Cisco Technology, Inc.Network environment health monitoring
US11509463B2 (en)2020-05-312022-11-22Daniel ChienTimestamp-based shared key generation
US11438145B2 (en)2020-05-312022-09-06Daniel ChienShared key generation based on dual clocks
EP4320729A4 (en)*2021-04-052025-02-12Booz Allen Hamilton Inc. SCANNING SYSTEM
US12375921B2 (en)2022-06-082025-07-29Arista Networks, Inc.Wireless intrusion prevention
US12317083B2 (en)2023-02-222025-05-27Arista Networks, Inc.Wireless intrusion prevention using channel switch announcement

Citations (43)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5987611A (en)*1996-12-311999-11-16Zone Labs, Inc.System and methodology for managing internet access on a per application basis for client computers connected to the internet
US20020143935A1 (en)*1995-11-162002-10-03David SchenkelMethod of determining the topology of a network of objects
US20020167965A1 (en)*2001-01-182002-11-14James BeasleyLink context mobility method and system for providing such mobility, such as a system employing short range frequency hopping spread spectrum wireless protocols
US20030051170A1 (en)*2001-08-152003-03-13Spearman Anthony C.Secure and seemless wireless public domain wide area network and method of using the same
US20030106067A1 (en)*2001-11-302003-06-05Hoskins Steve J.Integrated internet protocol (IP) gateway services in an RF cable network
US20030161265A1 (en)*2002-02-252003-08-28Jingjun CaoSystem for end user monitoring of network service conditions across heterogeneous networks
US20030167405A1 (en)*2001-07-272003-09-04Gregor FreundSystem methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices
US6618355B1 (en)*1999-05-072003-09-09Carriercomm, Inc.Service tariffing based on usage indicators in a radio based network
US20030188012A1 (en)*2002-03-292003-10-02Ford Daniel E.Access control system and method for a networked computer system
US20030195002A1 (en)*2000-08-112003-10-16Singhal Sandeep KishanSeamless user mobility in a short-range wireless networking environment
US20030229703A1 (en)*2002-06-062003-12-11International Business Machines CorporationMethod and apparatus for identifying intrusions into a network data processing system
US20040003285A1 (en)*2002-06-282004-01-01Robert WhelanSystem and method for detecting unauthorized wireless access points
US20040047356A1 (en)*2002-09-062004-03-11Bauer Blaine D.Network traffic monitoring
US20040049699A1 (en)*2002-09-062004-03-11Capital One Financial CorporationSystem and method for remotely monitoring wireless networks
US20040103282A1 (en)*2002-11-262004-05-27Robert Meier802.11 Using a compressed reassociation exchange to facilitate fast handoff
US6745333B1 (en)*2002-01-312004-06-013Com CorporationMethod for detecting unauthorized network access by having a NIC monitor for packets purporting to be from itself
US20040107219A1 (en)*2002-09-232004-06-03Wimetrics CorporationSystem and method for wireless local area network monitoring and intrusion detection
US6754488B1 (en)*2002-03-012004-06-22Networks Associates Technologies, Inc.System and method for detecting and locating access points in a wireless network
US20040157624A1 (en)*2002-05-202004-08-12Hrastar Scott E.Systems and methods for adaptive location tracking
US20040210654A1 (en)*2003-04-212004-10-21Hrastar Scott E.Systems and methods for determining wireless network topology
US20040209634A1 (en)*2003-04-212004-10-21Hrastar Scott E.Systems and methods for adaptively scanning for wireless communications
US20040209617A1 (en)*2003-04-212004-10-21Hrastar Scott E.Systems and methods for wireless network site survey systems and methods
US20050007961A1 (en)*2003-07-092005-01-13Fujitsu Network Communications, Inc.Processing data packets using markers
US20050025182A1 (en)*2003-06-252005-02-03Ala NazariSystems and methods using multiprotocol communication
US20050030929A1 (en)*2003-07-152005-02-10Highwall Technologies, LlcDevice and method for detecting unauthorized, "rogue" wireless LAN access points
US20050039047A1 (en)*2003-07-242005-02-17Amit RaikarMethod for configuring a network intrusion detection system
US20050042999A1 (en)*2003-08-222005-02-24Rappaport Theodore S.Broadband repeater with security for ultrawideband technologies
US20050055578A1 (en)*2003-02-282005-03-10Michael WrightAdministration of protection of data accessible by a mobile device
US20050094568A1 (en)*2003-10-312005-05-05Josh JuddNetwork path tracing method
US20050094630A1 (en)*2003-10-312005-05-05Ezio ValdevitNetwork path tracing method
US6897776B1 (en)*2002-02-062005-05-24Intermec Ip Corp.Electronic countermeasure (ECM) system and method
US20050174961A1 (en)*2004-02-062005-08-11Hrastar Scott E.Systems and methods for adaptive monitoring with bandwidth constraints
US20050226195A1 (en)*2002-06-072005-10-13Paris Matteo NMonitoring network traffic
US7035633B2 (en)*2001-10-232006-04-25Bellsouth Intellectual Property CorporationApparatus for providing a gateway between a wired telephone and a wireless telephone network
US7042852B2 (en)*2002-05-202006-05-09Airdefense, Inc.System and method for wireless LAN dynamic channel change with honeypot trap
US7058796B2 (en)*2002-05-202006-06-06Airdefense, Inc.Method and system for actively defending a wireless LAN against attacks
US7127524B1 (en)*2000-12-292006-10-24Vernier Networks, Inc.System and method for providing access to a network with selective network address translation
US7154888B1 (en)*2002-02-082006-12-26Cisco Technology, Inc.Method for classifying packets using multi-class structures
US7236470B1 (en)*2002-01-112007-06-26Broadcom CorporationTracking multiple interface connections by mobile stations
US20070189290A1 (en)*2006-02-142007-08-16Packethop, Inc.Dynamic multicasting scheme for mesh networks
US7277404B2 (en)*2002-05-202007-10-02Airdefense, Inc.System and method for sensing wireless LAN activity
US7346065B2 (en)*2002-10-012008-03-18Nec Infrontia CorporationBridge apparatus and bridge method
US7383577B2 (en)*2002-05-202008-06-03Airdefense, Inc.Method and system for encrypted network management and intrusion detection

Family Cites Families (135)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4914546A (en)1989-02-031990-04-03Micrel IncorporatedStacked multi-polysilicon layer capacitor
US5354701A (en)1991-04-181994-10-11Industrial Technology Research InstituteDoubled stacked trench capacitor DRAM and method of fabricating
US5187637A (en)1992-02-141993-02-16At&T Bell LaboratoriesMonolithic high-voltage capacitor
US5301150A (en)1992-06-221994-04-05Intel CorporationFlash erasable single poly EPROM device
DE19505081C2 (en)1994-02-171999-11-25Murata Manufacturing Co High voltage capacitor and process for its manufacture
NO942031L (en)1994-06-011995-12-04Ericsson As Creative Engineeri System for monitoring telephone networks and / or data communication networks, especially mobile telephone networks
US5899924A (en)1996-04-121999-05-04Survivalink CorporationSingle capacitor truncated damped sinusoidal defibrillation waveform
KR100207491B1 (en)1996-08-211999-07-15윤종용Liquid crystal display device and its manufacturing method
US6519723B1 (en)1996-09-272003-02-11Applied Digital Access, Inc.Firewall performance monitoring and limited access system
US6353406B1 (en)1996-10-172002-03-05R.F. Technologies, Inc.Dual mode tracking system
FI971540L (en)1997-04-111998-10-12Nokia Telecommunications Oy Method for determining the effect of multipath fading on radio waves
US6463475B1 (en)1997-09-262002-10-083Com CorporationMethod and device for tunnel switching
US6092110A (en)1997-10-232000-07-18At&T Wireless Svcs. Inc.Apparatus for filtering packets using a dedicated processor
US6414634B1 (en)1997-12-042002-07-02Lucent Technologies Inc.Detecting the geographical location of wireless units
US5926064A (en)1998-01-231999-07-20National Semiconductor CorporationFloating MOS capacitor
US6252544B1 (en)1998-01-272001-06-26Steven M. HoffbergMobile communication device
US6137153A (en)1998-02-132000-10-24Advanced Micro Devices, Inc.Floating gate capacitor for use in voltage regulators
US6262469B1 (en)1998-03-252001-07-17Advanced Micro Devices, Inc.Capacitor for use in a capacitor divider that has a floating gate transistor as a corresponding capacitor
US6049789A (en)*1998-06-242000-04-11Mentor Graphics CorporationSoftware pay per use licensing system
US6363056B1 (en)*1998-07-152002-03-26International Business Machines CorporationLow overhead continuous monitoring of network performance
US6242989B1 (en)1998-09-122001-06-05Agere Systems Guardian Corp.Article comprising a multi-port variable capacitor
US6393294B1 (en)1998-09-222002-05-21Polaris Wireless, Inc.Location determination using RF fingerprinting
US6269246B1 (en)1998-09-222001-07-31Ppm, Inc.Location determination using RF fingerprinting
US7418504B2 (en)1998-10-302008-08-26Virnetx, Inc.Agile network protocol for secure communications using secure domain names
US6839560B1 (en)1999-02-252005-01-04Microsoft CorporationUsing a derived table of signal strength data to locate and track a user in a wireless network
US6799047B1 (en)1999-02-252004-09-28Microsoft CorporationLocating and tracking a user in a wireless network through environmentally profiled data
US6701432B1 (en)1999-04-012004-03-02Netscreen Technologies, Inc.Firewall including local bus
US7307980B1 (en)1999-07-022007-12-11Cisco Technology, Inc.Change of codec during an active call
US6735702B1 (en)*1999-08-312004-05-11Intel CorporationMethod and system for diagnosing network intrusion
US6697870B1 (en)*2000-01-282004-02-24Networks Associates Technology, Inc.Method and apparatus for real-time protocol analysis using an auto-throttling front end process
DE10021867A1 (en)2000-05-052001-11-15Infineon Technologies Ag Voltage controlled capacity
US7089303B2 (en)*2000-05-312006-08-08Invicta Networks, Inc.Systems and methods for distributed network protection
WO2001093531A2 (en)2000-05-312001-12-06Invicta Networks, Inc.Systems and methods for distributed network protection
US7181769B1 (en)*2000-08-252007-02-20Ncircle Network Security, Inc.Network security system having a device profiler communicatively coupled to a traffic monitor
JP4130525B2 (en)2000-09-182008-08-06株式会社東芝 Capacitor mounting structure
FI111901B (en)2000-12-292003-09-30Ekahau Oy Estimation of position in wireless communication networks
WO2002089426A1 (en)*2001-04-272002-11-07Ntt Data CorporationPacket tracing system
US7536715B2 (en)2001-05-252009-05-19Secure Computing CorporationDistributed firewall system and method
US7181547B1 (en)*2001-06-282007-02-20Fortinet, Inc.Identifying nodes in a ring network
US6618005B2 (en)2001-06-292003-09-09Intel CorporationDetermining wireless device locations
US20030009585A1 (en)*2001-07-062003-01-09Brian AntoineDynamic policy based routing
US7181530B1 (en)*2001-07-272007-02-20Cisco Technology, Inc.Rogue AP detection
US20030033463A1 (en)*2001-08-102003-02-13Garnett Paul J.Computer system storage
US6664909B1 (en)2001-08-132003-12-16Impinj, Inc.Method and apparatus for trimming high-resolution digital-to-analog converter
JP3672889B2 (en)*2001-08-292005-07-20Necエレクトロニクス株式会社 Semiconductor integrated circuit and layout method thereof
AU2002335697A1 (en)2001-09-052003-03-18Newbury Networks, Inc.Position detection and location tracking in a wireless network
US7331061B1 (en)*2001-09-072008-02-12Secureworks, Inc.Integrated computer security management system and method
US6697337B1 (en)*2001-09-172004-02-24Networks Associates Technology, Inc.Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network
WO2003029916A2 (en)*2001-09-282003-04-10Bluesocket, Inc.Method and system for managing data traffic in wireless networks
US7873985B2 (en)*2002-01-082011-01-18Verizon Services Corp.IP based security applications using location, port and/or device identifier information
CA2414789A1 (en)*2002-01-092003-07-09Peel Wireless Inc.Wireless networks security system
US7508799B2 (en)2002-01-292009-03-24Arch Wireless Operating Company, Inc.Managing wireless network data
SE0200311D0 (en)*2002-01-312002-01-31Ericsson Telefon Ab L M Method and system of channel resource allocation
US20030149891A1 (en)*2002-02-012003-08-07Thomsen Brant D.Method and device for providing network security by causing collisions
US7650634B2 (en)*2002-02-082010-01-19Juniper Networks, Inc.Intelligent integrated network security device
KR20040096616A (en)*2002-03-272004-11-16인터내셔널 비지네스 머신즈 코포레이션Methods apparatus and program products for wireless access points
US20030186679A1 (en)*2002-03-272003-10-02International Business Machines CorporationMethods, apparatus and program product for monitoring network security
US7236460B2 (en)*2002-03-292007-06-26Airmagnet, Inc.Detecting a counterfeit access point in a wireless local area network
US7711809B2 (en)*2002-04-042010-05-04Airmagnet, Inc.Detecting an unauthorized station in a wireless local area network
GB2389483A (en)2002-04-112003-12-10Apoapsis LtdWireless monitoring for performance and security of network
FI20020733A0 (en)2002-04-162002-04-16Nokia Corp Method and system for verifying the user of a data transfer device
US6664925B1 (en)2002-05-022003-12-16Microsoft CorporationMethod and system for determining the location of a mobile computer
US7382756B2 (en)*2002-05-042008-06-03Broadcom CorporationIntegrated user and radio management in a wireless network environment
US20040206999A1 (en)2002-05-092004-10-21Impinj, Inc., A Delaware CorporationMetal dielectric semiconductor floating gate variable capacitor
US7778606B2 (en)2002-05-172010-08-17Network Security Technologies, Inc.Method and system for wireless intrusion detection
US20040203764A1 (en)*2002-06-032004-10-14Scott HrastarMethods and systems for identifying nodes and mapping their locations
US7086089B2 (en)*2002-05-202006-08-01Airdefense, Inc.Systems and methods for network security
US7212837B1 (en)2002-05-242007-05-01Airespace, Inc.Method and system for hierarchical processing of protocol information in a wireless LAN
US7322044B2 (en)2002-06-032008-01-22Airdefense, Inc.Systems and methods for automated network policy exception detection and correction
US20030232598A1 (en)*2002-06-132003-12-18Daniel AljadeffMethod and apparatus for intrusion management in a wireless network using physical location determination
US7327697B1 (en)2002-06-252008-02-05Airespace, Inc.Method and system for dynamically assigning channels across multiple radios in a wireless LAN
US7042867B2 (en)*2002-07-292006-05-09Meshnetworks, Inc.System and method for determining physical location of a node in a wireless network during an authentication check of the node
US7068999B2 (en)*2002-08-022006-06-27Symbol Technologies, Inc.System and method for detection of a rogue wireless access point in a wireless communication network
US7082117B2 (en)2002-08-122006-07-25Harris CorporationMobile ad-hoc network with intrusion detection features and related methods
US20040203870A1 (en)2002-08-202004-10-14Daniel AljadeffMethod and system for location finding in a wireless local area network
KR100426317B1 (en)*2002-09-062004-04-06한국전자통신연구원System for providing a real-time attacking connection traceback using of packet watermark insertion technique and method therefor
US6957067B1 (en)2002-09-242005-10-18Aruba NetworksSystem and method for monitoring and enforcing policy within a wireless network
US6963289B2 (en)*2002-10-182005-11-08Aeroscout, Ltd.Wireless local area network (WLAN) channel radio-frequency identification (RFID) tag system and method therefor
US7540028B2 (en)2002-10-252009-05-26Intel CorporationDynamic network security apparatus and methods or network processors
US7184777B2 (en)2002-11-272007-02-27Cognio, Inc.Server and multiple sensor system for monitoring activity in a shared radio frequency band
US20040203910A1 (en)2002-12-312004-10-14International Business Machines CorporationSpatial boundary admission control for wireless networks
US20040143751A1 (en)2003-01-172004-07-22Cyrus PeikariProtection of embedded processing systems with a configurable, integrated, embedded firewall
US7460505B2 (en)2003-02-042008-12-02Polaris Wireless, Inc.Location estimation of wireless terminals through pattern matching of signal-strength differentials
US7603710B2 (en)*2003-04-032009-10-13Network Security Technologies, Inc.Method and system for detecting characteristics of a wireless network
US7346338B1 (en)*2003-04-042008-03-18Airespace, Inc.Wireless network system including integrated rogue access point detection
US7342906B1 (en)2003-04-042008-03-11Airespace, Inc.Distributed wireless network security system
US7646744B2 (en)*2003-04-072010-01-12Shaolin LiMethod of operating multi-antenna wireless data processing system
US7941855B2 (en)*2003-04-142011-05-10New Mexico Technical Research FoundationComputationally intelligent agents for distributed intrusion detection system and method of practicing same
US7324804B2 (en)*2003-04-212008-01-29Airdefense, Inc.Systems and methods for dynamic sensor discovery and selection
WO2004095192A2 (en)2003-04-212004-11-04Airdefense, Inc.Systems and methods for securing wireless computer networks
WO2004097584A2 (en)2003-04-282004-11-11P.G.I. Solutions LlcMethod and system for remote network security management
US20040235453A1 (en)2003-05-232004-11-25Chia-Hung ChenAccess point incorporating a function of monitoring illegal wireless communications
US7340247B1 (en)2003-05-292008-03-04Airespace, Inc.Wireless network infrastructure including wireless discovery and communication mechanism
US7453840B1 (en)*2003-06-302008-11-18Cisco Systems, Inc.Containment of rogue systems in wireless network environments
US7539169B1 (en)2003-06-302009-05-26Cisco Systems, Inc.Directed association mechanism in wireless network environments
US7286515B2 (en)2003-07-282007-10-23Cisco Technology, Inc.Method, apparatus, and software product for detecting rogue access points in a wireless network
US6990428B1 (en)2003-07-282006-01-24Cisco Technology, Inc.Radiolocation using path loss data
US7295831B2 (en)*2003-08-122007-11-133E Technologies International, Inc.Method and system for wireless intrusion detection prevention and security management
US20050114700A1 (en)2003-08-132005-05-26Sensory Networks, Inc.Integrated circuit apparatus and method for high throughput signature based network applications
JP4174392B2 (en)*2003-08-282008-10-29日本電気株式会社 Network unauthorized connection prevention system and network unauthorized connection prevention device
WO2005024598A2 (en)2003-09-092005-03-17Oto Software, IncMethod and system for securing and monitoring a wireless network
US7110756B2 (en)2003-10-032006-09-19Cognio, Inc.Automated real-time site survey in a shared frequency band environment
US9270643B2 (en)*2003-11-212016-02-23Intel CorporationState-transition based network intrusion detection
US7406320B1 (en)2003-12-082008-07-29Airtight Networks, Inc.Method and system for location estimation in wireless networks
US7856209B1 (en)2003-12-082010-12-21Airtight Networks, Inc.Method and system for location estimation in wireless networks
US7002943B2 (en)2003-12-082006-02-21Airtight Networks, Inc.Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7339914B2 (en)*2004-02-112008-03-04Airtight Networks, Inc.Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US7216365B2 (en)*2004-02-112007-05-08Airtight Networks, Inc.Automated sniffer apparatus and method for wireless local area network security
US7440434B2 (en)*2004-02-112008-10-21Airtight Networks, Inc.Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods
US7286833B2 (en)*2004-02-272007-10-23Airespace, Inc.Selective termination of wireless connections to refresh signal information in wireless node location infrastructure
US7302269B1 (en)2004-03-182007-11-27Cisco Technology, Inc.Radiolocation in a wireless network using time difference of arrival
US7496094B2 (en)2004-04-062009-02-24Airtight Networks, Inc.Method and system for allowing and preventing wireless devices to transmit wireless signals
US20060165073A1 (en)2004-04-062006-07-27Airtight Networks, Inc., (F/K/A Wibhu Technologies, Inc.)Method and a system for regulating, disrupting and preventing access to the wireless medium
JP4054341B2 (en)2004-05-172008-02-27三星電子株式会社 Fast handover method optimized for IEEE 802.11 network
US7447184B1 (en)2004-09-082008-11-04Airtight Networks, Inc.Method and system for detecting masquerading wireless devices in local area computer networks
US7286835B1 (en)*2004-09-102007-10-23Airespace, Inc.Enhanced wireless node location using differential signal strength metric
US20060070113A1 (en)2004-09-162006-03-30Airtight Networks, Inc. (F/K/A Wibhu Technologies, Inc.)Method for wireless network security exposure visualization and scenario analysis
US20060058062A1 (en)2004-09-162006-03-16Airtight Networks, Inc. (Fka Wibhu Technologies, Inc.)Method for wireless network security exposure visualization and scenario analysis
US20060193300A1 (en)2004-09-162006-08-31Airtight Networks, Inc. (F/K/A Wibhu Technologies, Inc.)Method and apparatus for monitoring multiple network segments in local area networks for compliance with wireless security policy
EP1794934A1 (en)2004-09-302007-06-13France Telecom S.A.Method, device a program for detecting an unauthorised connection to access points
US20060123133A1 (en)*2004-10-192006-06-08Hrastar Scott EDetecting unauthorized wireless devices on a wired network
KR100628325B1 (en)*2004-12-202006-09-27한국전자통신연구원 Intrusion detection sensor and wireless network intrusion detection system and method for detecting attack on wireless network
FR2881312A1 (en)2005-01-262006-07-28France TelecomMedium access control Internet protocol spoofing detecting method for e.g. corporate network, involves analyzing data fields of frames and triggering alarm in case of variation detected from analyzed data fields
US7370362B2 (en)*2005-03-032008-05-06Cisco Technology, Inc.Method and apparatus for locating rogue access point switch ports in a wireless network
US8437263B2 (en)*2005-03-112013-05-07Airmagnet, Inc.Tracing an access point in a wireless network
US20060264178A1 (en)*2005-05-202006-11-23Noble Gayle LWireless diagnostic systems
US7746862B1 (en)*2005-08-022010-06-29Juniper Networks, Inc.Packet processing in a multiple processor system
US7710933B1 (en)2005-12-082010-05-04Airtight Networks, Inc.Method and system for classification of wireless devices in local area computer networks
US7577424B2 (en)*2005-12-192009-08-18Airdefense, Inc.Systems and methods for wireless vulnerability analysis
US7570625B1 (en)*2006-01-102009-08-04Tw Acquisition, Inc.Detection of wireless devices
US8281392B2 (en)*2006-08-112012-10-02Airdefense, Inc.Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
EP1892913A1 (en)2006-08-242008-02-27Siemens AktiengesellschaftMethod and arrangement for providing a wireless mesh network
US7672283B1 (en)*2006-09-282010-03-02Trend Micro IncorporatedDetecting unauthorized wireless devices in a network
US7961725B2 (en)*2007-07-312011-06-14Symbol Technologies, Inc.Enterprise network architecture for implementing a virtual private network for wireless users by mapping wireless LANs to IP tunnels
US7970894B1 (en)2007-11-152011-06-28Airtight Networks, Inc.Method and system for monitoring of wireless devices in local area computer networks

Patent Citations (50)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020143935A1 (en)*1995-11-162002-10-03David SchenkelMethod of determining the topology of a network of objects
US6728670B2 (en)*1995-11-162004-04-27Peregrine Systems, Inc.Method of determining the topology of a network by transmitting and monitoring sequences of orthogonal signals
US20030051032A1 (en)*1995-11-162003-03-13David SchenkelMethod of determining the topology of a network of objects
US5987611A (en)*1996-12-311999-11-16Zone Labs, Inc.System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6618355B1 (en)*1999-05-072003-09-09Carriercomm, Inc.Service tariffing based on usage indicators in a radio based network
US20030195002A1 (en)*2000-08-112003-10-16Singhal Sandeep KishanSeamless user mobility in a short-range wireless networking environment
US7127524B1 (en)*2000-12-292006-10-24Vernier Networks, Inc.System and method for providing access to a network with selective network address translation
US20020167965A1 (en)*2001-01-182002-11-14James BeasleyLink context mobility method and system for providing such mobility, such as a system employing short range frequency hopping spread spectrum wireless protocols
US20030167405A1 (en)*2001-07-272003-09-04Gregor FreundSystem methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices
US20030051170A1 (en)*2001-08-152003-03-13Spearman Anthony C.Secure and seemless wireless public domain wide area network and method of using the same
US7035633B2 (en)*2001-10-232006-04-25Bellsouth Intellectual Property CorporationApparatus for providing a gateway between a wired telephone and a wireless telephone network
US20030106067A1 (en)*2001-11-302003-06-05Hoskins Steve J.Integrated internet protocol (IP) gateway services in an RF cable network
US7236470B1 (en)*2002-01-112007-06-26Broadcom CorporationTracking multiple interface connections by mobile stations
US6745333B1 (en)*2002-01-312004-06-013Com CorporationMethod for detecting unauthorized network access by having a NIC monitor for packets purporting to be from itself
US6897776B1 (en)*2002-02-062005-05-24Intermec Ip Corp.Electronic countermeasure (ECM) system and method
US7154888B1 (en)*2002-02-082006-12-26Cisco Technology, Inc.Method for classifying packets using multi-class structures
US20030161265A1 (en)*2002-02-252003-08-28Jingjun CaoSystem for end user monitoring of network service conditions across heterogeneous networks
US6754488B1 (en)*2002-03-012004-06-22Networks Associates Technologies, Inc.System and method for detecting and locating access points in a wireless network
US20030188012A1 (en)*2002-03-292003-10-02Ford Daniel E.Access control system and method for a networked computer system
US7277404B2 (en)*2002-05-202007-10-02Airdefense, Inc.System and method for sensing wireless LAN activity
US20070094741A1 (en)*2002-05-202007-04-26Airdefense, Inc.Active Defense Against Wireless Intruders
US20040157624A1 (en)*2002-05-202004-08-12Hrastar Scott E.Systems and methods for adaptive location tracking
US7383577B2 (en)*2002-05-202008-06-03Airdefense, Inc.Method and system for encrypted network management and intrusion detection
US7058796B2 (en)*2002-05-202006-06-06Airdefense, Inc.Method and system for actively defending a wireless LAN against attacks
US7042852B2 (en)*2002-05-202006-05-09Airdefense, Inc.System and method for wireless LAN dynamic channel change with honeypot trap
US20030229703A1 (en)*2002-06-062003-12-11International Business Machines CorporationMethod and apparatus for identifying intrusions into a network data processing system
US20050226195A1 (en)*2002-06-072005-10-13Paris Matteo NMonitoring network traffic
US20040003285A1 (en)*2002-06-282004-01-01Robert WhelanSystem and method for detecting unauthorized wireless access points
US20040047356A1 (en)*2002-09-062004-03-11Bauer Blaine D.Network traffic monitoring
US7316031B2 (en)*2002-09-062008-01-01Capital One Financial CorporationSystem and method for remotely monitoring wireless networks
US20040049699A1 (en)*2002-09-062004-03-11Capital One Financial CorporationSystem and method for remotely monitoring wireless networks
US7340768B2 (en)*2002-09-232008-03-04Wimetrics CorporationSystem and method for wireless local area network monitoring and intrusion detection
US20040107219A1 (en)*2002-09-232004-06-03Wimetrics CorporationSystem and method for wireless local area network monitoring and intrusion detection
US7346065B2 (en)*2002-10-012008-03-18Nec Infrontia CorporationBridge apparatus and bridge method
US20040103282A1 (en)*2002-11-262004-05-27Robert Meier802.11 Using a compressed reassociation exchange to facilitate fast handoff
US20050055578A1 (en)*2003-02-282005-03-10Michael WrightAdministration of protection of data accessible by a mobile device
US7478420B2 (en)*2003-02-282009-01-13Novell, Inc.Administration of protection of data accessible by a mobile device
US20040209634A1 (en)*2003-04-212004-10-21Hrastar Scott E.Systems and methods for adaptively scanning for wireless communications
US20040209617A1 (en)*2003-04-212004-10-21Hrastar Scott E.Systems and methods for wireless network site survey systems and methods
US20040210654A1 (en)*2003-04-212004-10-21Hrastar Scott E.Systems and methods for determining wireless network topology
US20050025182A1 (en)*2003-06-252005-02-03Ala NazariSystems and methods using multiprotocol communication
US20050007961A1 (en)*2003-07-092005-01-13Fujitsu Network Communications, Inc.Processing data packets using markers
US7257107B2 (en)*2003-07-152007-08-14Highwall Technologies, LlcDevice and method for detecting unauthorized, “rogue” wireless LAN access points
US20050030929A1 (en)*2003-07-152005-02-10Highwall Technologies, LlcDevice and method for detecting unauthorized, "rogue" wireless LAN access points
US20050039047A1 (en)*2003-07-242005-02-17Amit RaikarMethod for configuring a network intrusion detection system
US20050042999A1 (en)*2003-08-222005-02-24Rappaport Theodore S.Broadband repeater with security for ultrawideband technologies
US20050094630A1 (en)*2003-10-312005-05-05Ezio ValdevitNetwork path tracing method
US20050094568A1 (en)*2003-10-312005-05-05Josh JuddNetwork path tracing method
US20050174961A1 (en)*2004-02-062005-08-11Hrastar Scott E.Systems and methods for adaptive monitoring with bandwidth constraints
US20070189290A1 (en)*2006-02-142007-08-16Packethop, Inc.Dynamic multicasting scheme for mesh networks

Cited By (67)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
USRE45649E1 (en)2000-09-282015-08-11Vivint, Inc.Method and process for configuring a premises for monitoring
US8700769B2 (en)2000-09-282014-04-15Vig Acquisitions Ltd., L.L.C.System and method for providing configurable security monitoring utilizing an integrated information system
US8392552B2 (en)2000-09-282013-03-05Vig Acquisitions Ltd., L.L.C.System and method for providing configurable security monitoring utilizing an integrated information system
US20020143938A1 (en)*2000-09-282002-10-03Bruce AlexanderSystem and method for providing configurable security monitoring utilizing an integrated information system
US7627665B2 (en)2000-09-282009-12-01Barker Geoffrey TSystem and method for providing configurable security monitoring utilizing an integrated information system
USRE43598E1 (en)2000-09-282012-08-21Vig Acquisitions Ltd., L.L.C.Method and process for configuring a premises for monitoring
US7933989B1 (en)*2002-01-252011-04-26Barker Geoffrey TPredictive threat assessment
US7480715B1 (en)*2002-01-252009-01-20Vig Acquisitions Ltd., L.L.C.System and method for performing a predictive threat assessment based on risk factors
US20140298467A1 (en)*2004-02-112014-10-02Airtight Networks, Inc.Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US20100132040A1 (en)*2004-02-112010-05-27Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US20120240196A1 (en)*2004-02-112012-09-20Airtight Networks, Inc.Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US7536723B1 (en)*2004-02-112009-05-19Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US9003527B2 (en)*2004-02-112015-04-07Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US20130117851A1 (en)*2004-02-112013-05-09Airtight Networks, Inc.Automated method and system for monitoring local area computer networks for unauthorized wireless access
US8789191B2 (en)*2004-02-112014-07-22Airtight Networks, Inc.Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US7873998B1 (en)*2005-07-192011-01-18Trustwave Holdings, Inc.Rapidly propagating threat detection
US7912048B2 (en)*2006-04-202011-03-22International Business Machines CorporationApparatus and method for detecting network address translation device
US20070258452A1 (en)*2006-04-202007-11-08Naoto ShimizuApparatus and method for detecting network address translation device
US8260895B2 (en)*2006-06-092012-09-04Asustek ComputerComputer and main circuit board thereof
US20070286229A1 (en)*2006-06-092007-12-13Asustek Computer Inc.Computer and main circuit board thereof
US20080186932A1 (en)*2007-02-052008-08-07Duy Khuong DoApproach For Mitigating The Effects Of Rogue Wireless Access Points
US10798634B2 (en)2007-04-272020-10-06Extreme Networks, Inc.Routing method and system for a wireless network
US9590822B2 (en)2008-05-142017-03-07Aerohive Networks, Inc.Predictive roaming between subnets
US10700892B2 (en)2008-05-142020-06-30Extreme Networks Inc.Predictive roaming between subnets
US9787500B2 (en)2008-05-142017-10-10Aerohive Networks, Inc.Predictive and nomadic roaming of wireless clients across different network subnets
US10880730B2 (en)2008-05-142020-12-29Extreme Networks, Inc.Predictive and nomadic roaming of wireless clients across different network subnets
US9338816B2 (en)2008-05-142016-05-10Aerohive Networks, Inc.Predictive and nomadic roaming of wireless clients across different network subnets
US10181962B2 (en)2008-05-142019-01-15Aerohive Networks, Inc.Predictive and nomadic roaming of wireless clients across different network subnets
US10064105B2 (en)2008-05-142018-08-28Aerohive Networks, Inc.Predictive roaming between subnets
US10945127B2 (en)2008-11-042021-03-09Extreme Networks, Inc.Exclusive preshared key authentication
US9674892B1 (en)2008-11-042017-06-06Aerohive Networks, Inc.Exclusive preshared key authentication
US10772081B2 (en)2009-01-212020-09-08Extreme Networks, Inc.Airtime-based packet scheduling for wireless networks
US9572135B2 (en)2009-01-212017-02-14Aerohive Networks, Inc.Airtime-based packet scheduling for wireless networks
US10219254B2 (en)2009-01-212019-02-26Aerohive Networks, Inc.Airtime-based packet scheduling for wireless networks
US9867167B2 (en)2009-01-212018-01-09Aerohive Networks, Inc.Airtime-based packet scheduling for wireless networks
US20120304294A1 (en)*2009-03-182012-11-29Yuji FujiwaraNetwork Monitoring Apparatus and Network Monitoring Method
US8694624B2 (en)2009-05-192014-04-08Symbol Technologies, Inc.Systems and methods for concurrent wireless local area network access and sensing
US20100296496A1 (en)*2009-05-192010-11-25Amit SinhaSystems and methods for concurrent wireless local area network access and sensing
US9900251B1 (en)2009-07-102018-02-20Aerohive Networks, Inc.Bandwidth sentinel
US11115857B2 (en)2009-07-102021-09-07Extreme Networks, Inc.Bandwidth sentinel
US10412006B2 (en)2009-07-102019-09-10Aerohive Networks, Inc.Bandwith sentinel
US9814055B2 (en)2010-09-072017-11-07Aerohive Networks, Inc.Distributed channel selection for wireless networks
US10966215B2 (en)2010-09-072021-03-30Extreme Networks, Inc.Distributed channel selection for wireless networks
US10390353B2 (en)2010-09-072019-08-20Aerohive Networks, Inc.Distributed channel selection for wireless networks
US8769688B2 (en)*2011-09-232014-07-01Universidad Politécnica de P.R.Simultaneous determination of a computer location and user identification
US20130081137A1 (en)*2011-09-232013-03-28Arturo GeigelSimultaneous Determination of a Computer Location and User Identification
US10833948B2 (en)2011-10-312020-11-10Extreme Networks, Inc.Zero configuration networking on a subnetted network
US10091065B1 (en)2011-10-312018-10-02Aerohive Networks, Inc.Zero configuration networking on a subnetted network
US10205604B2 (en)2012-06-142019-02-12Aerohive Networks, Inc.Multicast to unicast conversion technique
US9565125B2 (en)2012-06-142017-02-07Aerohive Networks, Inc.Multicast to unicast conversion technique
US10523458B2 (en)2012-06-142019-12-31Extreme Networks, Inc.Multicast to unicast conversion technique
US9729463B2 (en)2012-06-142017-08-08Aerohive Networks, Inc.Multicast to unicast conversion technique
US20140254389A1 (en)*2013-03-052014-09-11Qualcomm IncorporatedSystems and methods for monitoring wireless communications
US10841104B2 (en)2013-03-152020-11-17Poltorak Technologies LlcSystem and method for secure relayed communications from an implantable medical device
US10027703B2 (en)2013-03-152018-07-17Aerohive Networks, Inc.Managing rogue devices through a network backhaul
US12225141B2 (en)2013-03-152025-02-11Poltorak Technologies LlcSystem and method for secure relayed communications from an implantable medical device
US10389650B2 (en)2013-03-152019-08-20Aerohive Networks, Inc.Building and maintaining a network
US10305695B1 (en)2013-03-152019-05-28Poltorak Technologies LlcSystem and method for secure relayed communications from an implantable medical device
US9215075B1 (en)2013-03-152015-12-15Poltorak Technologies LlcSystem and method for secure relayed communications from an implantable medical device
US9413772B2 (en)2013-03-152016-08-09Aerohive Networks, Inc.Managing rogue devices through a network backhaul
US10542035B2 (en)2013-03-152020-01-21Aerohive Networks, Inc.Managing rogue devices through a network backhaul
US11930126B2 (en)2013-03-152024-03-12Piltorak Technologies LLCSystem and method for secure relayed communications from an implantable medical device
US9942051B1 (en)2013-03-152018-04-10Poltorak Technologies LlcSystem and method for secure relayed communications from an implantable medical device
US11588650B2 (en)2013-03-152023-02-21Poltorak Technologies LlcSystem and method for secure relayed communications from an implantable medical device
US10419458B2 (en)2016-01-212019-09-17Cyiot LtdDistributed techniques for detecting atypical or malicious wireless communications activity
US20210217284A1 (en)*2018-07-132021-07-15Carrier CorporationRadio frequency presence alert system
US11941960B2 (en)*2018-07-132024-03-26Carrier CorporationRadio frequency presence alert system

Also Published As

Publication numberPublication date
US7339914B2 (en)2008-03-04
US9003527B2 (en)2015-04-07
US20120240196A1 (en)2012-09-20
US20140298467A1 (en)2014-10-02
US20100132040A1 (en)2010-05-27
US8789191B2 (en)2014-07-22
US7536723B1 (en)2009-05-19
US20130117851A1 (en)2013-05-09
US20050259611A1 (en)2005-11-24

Similar Documents

PublicationPublication DateTitle
US7339914B2 (en)Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US7216365B2 (en)Automated sniffer apparatus and method for wireless local area network security
US7970894B1 (en)Method and system for monitoring of wireless devices in local area computer networks
US7764648B2 (en)Method and system for allowing and preventing wireless devices to transmit wireless signals
US7856656B1 (en)Method and system for detecting masquerading wireless devices in local area computer networks
US7440434B2 (en)Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods
US7558253B1 (en)Method and system for disrupting undesirable wireless communication of devices in computer networks
US7710933B1 (en)Method and system for classification of wireless devices in local area computer networks
US7971253B1 (en)Method and system for detecting address rotation and related events in communication networks
EP1976227B1 (en)Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US20090016529A1 (en)Method and system for prevention of unauthorized communication over 802.11w and related wireless protocols
US20060193300A1 (en)Method and apparatus for monitoring multiple network segments in local area networks for compliance with wireless security policy
US20150040194A1 (en)Monitoring of smart mobile devices in the wireless access networks
US7333800B1 (en)Method and system for scheduling of sensor functions for monitoring of wireless communication activity
TaoA novel intrusion detection system for detection of MAC address spoofing in wireless networks

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:AIRTIGHT NETWORKS, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BHAGWAT, PRAVIN;GOGATE, SHANTANU;KING, DAVID;REEL/FRAME:020436/0797;SIGNING DATES FROM 20040826 TO 20040827

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:WESTERN ALLIANCE BANK, CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:MOJO NETWORKS, INC.;REEL/FRAME:041802/0489

Effective date:20170329

ASAssignment

Owner name:MOJO NETWORKS, INC., FORMERLY KNOWN AS AIRTIGHT NE

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:WESTERN ALLIANCE BANK;REEL/FRAME:046553/0702

Effective date:20180802


[8]ページ先頭

©2009-2025 Movatter.jp