Containment of rogue systems in wireless network environments

Multiplex communications – Communication over free space – Having a plurality of contiguous regions served by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S401000, C726S002000

Reexamination Certificate

active

07453840

ABSTRACT:
Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.

REFERENCES:
patent: 5564079 (1996-10-01), Olsson
patent: 5684860 (1997-11-01), Milani et al.
patent: 6112095 (2000-08-01), Wax et al.
patent: 6115605 (2000-09-01), Siccardo et al.
patent: 6134448 (2000-10-01), Shoji et al.
patent: 6140964 (2000-10-01), Sugiura et al.
patent: 6198935 (2001-03-01), Saha et al.
patent: 6212391 (2001-04-01), Saleh et al.
patent: 6249252 (2001-06-01), Dupray
patent: 6259406 (2001-07-01), Sugiura et al.
patent: 6269246 (2001-07-01), Rao et al.
patent: 6275190 (2001-08-01), Sugiura et al.
patent: 6282427 (2001-08-01), Larsson et al.
patent: 6304218 (2001-10-01), Sugiura et al.
patent: 6414634 (2002-07-01), Tekinay
patent: 6415155 (2002-07-01), Koshima et al.
patent: 6441777 (2002-08-01), McDonald
patent: 6456892 (2002-09-01), Dara-Abrams et al.
patent: 6526283 (2003-02-01), Jang
patent: 6556942 (2003-04-01), Smith
patent: 6760318 (2004-07-01), Bims
patent: 6788658 (2004-09-01), Bims
patent: 6925070 (2005-08-01), Proctor, Jr.
patent: 6957067 (2005-10-01), Iyer et al.
patent: 7002943 (2006-02-01), Bhagwat et al.
patent: 7164663 (2007-01-01), Frank et al.
patent: 7212837 (2007-05-01), Calhoun et al.
patent: 2002/0073231 (2002-06-01), Quarterman et al.
patent: 2002/0174335 (2002-11-01), Zhang et al.
patent: 2002/0188723 (2002-12-01), Choi
patent: 2003/0023746 (2003-01-01), Loguinov
patent: 2003/0054794 (2003-03-01), Zhang
patent: 2003/0117985 (2003-06-01), Fijii et al.
patent: 2003/0135762 (2003-07-01), Macaulay
patent: 2003/0181215 (2003-09-01), Cromer et al.
patent: 2003/0185006 (2003-10-01), Bard
patent: 2003/0186679 (2003-10-01), Challener et al.
patent: 2003/0198208 (2003-10-01), Koos, Jr. et al.
patent: 2003/0219008 (2003-11-01), Hrastar
patent: 2004/0003285 (2004-01-01), Whelan et al.
patent: 2004/0008652 (2004-01-01), Tanzella et al.
patent: 2004/0023639 (2004-02-01), Noel, Jr.
patent: 2004/0023640 (2004-02-01), Ballai
patent: 2004/0047324 (2004-03-01), Diener
patent: 2004/0049699 (2004-03-01), Griffith et al.
patent: 2004/0076134 (2004-04-01), Barber et al.
patent: 2004/0176108 (2004-09-01), Misikangas
patent: 2004/0198392 (2004-10-01), Harvey et al.
patent: 2005/0021740 (2005-01-01), Bar et al.
patent: 2005/0030929 (2005-02-01), Swier et al.
patent: 2005/0073979 (2005-04-01), Barber et al.
patent: 2005/1146959 (2005-05-01), Challener et al.
patent: 2005/0207381 (2005-09-01), Aljadeff et al.
patent: 2005/0254474 (2005-11-01), Iyer et al.
patent: 2007/0192870 (2007-08-01), Lynn et al.
patent: 0 930 514 (1999-07-01), None
patent: 0 967 816 (1999-12-01), None
patent: 1 018 457 (2000-07-01), None
patent: 1 296 531 (2003-03-01), None
patent: 1 301 055 (2003-04-01), None
patent: 02044929 (1990-02-01), None
patent: WO 97/33386 (1997-09-01), None
patent: WO 98/41048 (1998-09-01), None
patent: WO 99/08909 (1999-02-01), None
patent: WO 02/43425 (2002-05-01), None
patent: WO 02/54813 (2002-07-01), None
patent: WO 03/023443 (2003-03-01), None
Chirumamilla, Mohan K. and Ramamurthy, Byrav, “Agent Based Intrusion Detection and Response System for Wireless LAN's” IEEE Int'l Conference on Communications, 2003, vol. 1, pp; 492-496.
“IBM Research Demonstrates Industry's First Auditing Tool for Wireless Network Security.” Jul. 12, 2001, Hawthorne, N.Y. IBM Research News, ′Online. URL: http://domino.research.ibm.com/comm/pr.nsf/pages
ews.20010712—wireless.html.
“IBM Researchers Demonstrate Industry's First Self-Diagnostic Wireless Security Monitoring Tool.” Jun. 21, 2002, Hawthorne, N.Y. IBM NIEUWS, ′Online URL: http://domino.research.ibm.com/comm/pr.nsf/pages
ews.20020617—dwsa.html.
“Ekahau Logical Areas-location enabling the Wi-Fi-network.” Apr. 4, 2003. Ekahau, Inc., Saratoga, CA. Company's URL: www.ekahau.com.
“Ekahau Positioning Engine 2.0: Product Overview.” Apr. 4, 2003. Ekahau, Inc., Saratoga, CA. URL: http://www.ekahau.com/products/positioningengine/.
“Ekahau Positioning Engine 2.0: Data Sheet.” Apr. 4, 2003. Ekahau, Inc., Saratoga, CA. URL: http://www.ekahau.com/pdf/EPE—2.0—datasheet.PDF.
“Indoor Positioning in 802.11b Networks.” Apr. 4, 2003. Ekahau, Inc., Saratoga, CA. URL:http://www.ekahau.com/products/positioningengine/features.html.
“InFielder.” Apr. 22, 2003. Wireless Valley, Austin TX. URL: http://www.wirelessvalley.com/Products/InFielder/InFielder.asp.
“LANFielder.” Apr. 22, 2003. Wireless Valley, Austin, TX. URL: http://www.wirelessvalley.com/Products/LANFielder/LANFielder.asp.
“Optimatic,” Apr. 22, 2003. Wireless Valley, Austin, TX. URL: http://www.wirelessvalley.com/Products/Optimatic/Optimatic.asp.
“Predictor.” Apr. 22, 2003. Wireless Valley, Austin, TX. URL: http://www.wirelessvalley.com/Products/Predictor/Predictor.asp.
“LANFielder Product Literature.” Feb. 10, 2004. Wireless Valley, Austin, TX. URL:http://www.wirelessvalley.com/Assets/brochures/LanFielder.pdf.
Conley, C., “Securing WLANS with Location-Enabled Networks.” Wireless Security Perspectives, vol. 5,No. 3.Mar. 2003. Organization's URL: www.cnp-wireless.com/wsp.html.
“Company Information.” Apr. 6, 2004. Corsair Communications:A LightBridge Company, Burlington, MA. Company's URL:www.lightbridge.com.
“Corporate Fact Sheet.” Aruba Wireless Networks, San Jose, CA. Feb. 10, 2004. URL: http://www.arubanetworks.com/pdf/corporate—fact—sheet.pdf.
“Airwave Rogue Access Point Dectection.” 2002. Airwave Wireless, Inc. San Mateo, CA. URL: http://airwave.com/features.html.
Geier, J. “Identifying Rogue Access Points.” Jan. 6, 2003. Wi-Fi Planet Tutorials. URL: http://www.wi-fiplanet.com/tutorials/article.php/1564431.
Brewin, B. “IBM Develops Tool to Detect Rogue Wireless LAN Access Points.” Jun. 17, 2002. Computerworld, Framingham, MA, URL: http://www.computerworld.com/mobiletopics/mobile/story/0,10801,72065,00.html.
Bulusu, N., Heidemann, J., Estrin, D. “GPS-less Low Cost Outdoor Localization for Very Small Devices.”IEEE Personal Communications, Oct. 2000. URL: http://lecs.cs.ucla.edu/˜butusu/papers/Bulusu00a.pdf.
“Assessing Wireless Security with AiroPeek and AiroPeek NX.” A WildPackets Academy Tutorial from www.wildpackets.com, WildPackets Inc., Walnut Creek, CA. Jan. 16, 2003. URL: http://www.wildpackets.com/elements/whitepapers/AiroPeek—Security.pdf.
“AiroPeek and Wireless Security: Identifying and Locating Rogue Access Points.” A WildPackets Academy Tutorial from www.wildpackets.com, WildPackets Inc., Walnut Creek, CA. Jan. 16, 2003. URL: http://www.wildpackets.com/elements/whitepapers/RogueAccessPoints.pdf.
Craiger, J.P. “802.11, 802.1x, and Wireless Security.” Jun. 23, 2002. From the SANS' Information Security Reading Room on www.sans.org, The SANS Institute, Bethesda, MD. URL: http://www.sans.org/rr/papers/88/171.pdf.
Baily, S. “Is IEEE 802.1X Ready for General Deployment?” Apr. 7, 2002. From the SANS' Information Security Reading Room on www.sans.org, The SANS Institute, Bethesda, MD. URL: http://www.sans.org/rr/papers/9/709.pdf.
International Standard, ISO/IEC 8802-11 ANSI/IEEE Std. 802.11, 1999 Edition, Part II: Wireless LAN Medium Access Control (MAC) and Physic

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Containment of rogue systems in wireless network environments does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Containment of rogue systems in wireless network environments, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Containment of rogue systems in wireless network environments will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4038138

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.