Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data
Reexamination Certificate
2011-02-01
2011-02-01
Moazzami, Nasser (Department: 2436)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Packet header designating cryptographically protected data
C713S178000, C713S181000, C726S013000
Reexamination Certificate
active
07882349
ABSTRACT:
Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link message integrity check and an infrastructure management frame protection (IMFP) message integrity check contained in a broadcast management frame.
REFERENCES:
patent: 5440633 (1995-08-01), Augustine et al.
patent: 6775804 (2004-08-01), Dawson
patent: 6782503 (2004-08-01), Dawson
patent: 6804257 (2004-10-01), Benayoun et al.
patent: 6965674 (2005-11-01), Whelan et al.
patent: 6996712 (2006-02-01), Perlman et al.
patent: 7024553 (2006-04-01), Morimoto
patent: 7096359 (2006-08-01), Agrawal et al.
patent: 7292842 (2007-11-01), Suzuki
patent: 7376235 (2008-05-01), Kuehnel
patent: 7415652 (2008-08-01), Szeremi
patent: 2003/0177391 (2003-09-01), Ofek et al.
patent: 2003/0185239 (2003-10-01), Miller et al.
patent: 2003/0204717 (2003-10-01), Kuehnel
patent: 2004/0006705 (2004-01-01), Walker
patent: 2004/0047308 (2004-03-01), Kavanagh et al.
patent: 2004/0078598 (2004-04-01), Barber et al.
patent: 2004/0107366 (2004-06-01), Belfanz et al.
patent: 2004/0203764 (2004-10-01), Hrastar et al.
patent: 2004/0240412 (2004-12-01), Winget
patent: 2005/0015471 (2005-01-01), Zhang et al.
patent: 2005/0141498 (2005-06-01), Cam-Winget et al.
patent: 2005/0149764 (2005-07-01), Bahl et al.
patent: 2007/0195830 (2007-08-01), Lorek et al.
patent: 2008/0295144 (2008-11-01), Cam-Winget
http://wwvv.tech-faq.com/wireless-networks/rsn-robust-secure-network.shtml, “What is RSN (Robust Secure Network)?”, Sep. 2, 2004.
http://www.eetimes.com/printableArticle.jhtml?doc—id=OEG20021126S0003&—requestid=. . . , “Diving into the 802.11iSpec: A Tutorial”, Sep. 2, 2004.
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration; PCT/US06/61576 dated Jul. 21, 2008; 12 pages.
Arbaugh et al., “Your 802.11 Wireless Network has no Clothes”, 2001, University of Maryland, pp. 1-13.
Bernard Aboba, “IEEE 802.11Pre-Authentication,” XP-002339240, Jun. 17, 2002, pp. 1-47.
Congdon et al., “IEEE 802.11 RADIUS Usage Guidelines”, NWG, p. 1-30.
Gast, Matthew, “802.11 Wireless Networks, The Definitive Guide”, Oreielly, 2002, chapters 2, 4, 6, 7, and 14.
Cisco Technology Administration, “Wireless LAN Security”, Feb. 6, 2001.
Cisco Technology Administration, “Wireless LAN Security in Depth”, Jan. 15, 2002.
Cisco Technology Administration, “A Comprehensive Review of 802.11 Wireless LAN Security”, Aug. 27, 2002.
TECH FAQ, “What is RSN (Robust Secure Network)”, Sep. 2, 2004.
Dennis Eaton, “Diving into the 802.11 Spec: A Tutorial”, Nov. 26, 2002.
Cam-Winget Nancy
Krischer Mark
O'Hara, Jr. Robert B.
Cisco Technology Inc.
Moazzami Nasser
Reza Mohammad W
Tucker Ellis & West LLP
LandOfFree
Insider attack defense for network client validation of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Insider attack defense for network client validation of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Insider attack defense for network client validation of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2649466