Method and system for detecting and preventing access...

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000, C380S278000, C709S224000, C709S227000, C709S238000, C370S338000, C455S410000

Reexamination Certificate

active

07823199

ABSTRACT:
A wireless computer network includes components cooperating together to prevent access intrusions by detecting unauthorized devices connected to the network, disabling the network connections to the devices, and then physically locating the devices. The network can detect both unauthorized client stations and unauthorized edge devices such as wireless access points (APs). The network can detect intruders by monitoring information transferred over wireless channels, identifying protocol state machine violations, tracking roaming behavior of clients, and detecting network addresses being improperly used in multiple locations. Upon detecting an intruder, the network can automatically locate and shut off the physical/logical port to which the intruder is connected.

REFERENCES:
patent: 5265005 (1993-11-01), Schmidt et al.
patent: 5412721 (1995-05-01), Rager et al.
patent: 5598412 (1997-01-01), Griffith et al.
patent: 5659604 (1997-08-01), Beckmann
patent: 6137802 (2000-10-01), Jones et al.
patent: 6252507 (2001-06-01), Gagnon
patent: 6304851 (2001-10-01), Kmack et al.
patent: 6363489 (2002-03-01), Comay et al.
patent: 6400925 (2002-06-01), Tirabassi et al.
patent: 6459557 (2002-10-01), Haensgen et al.
patent: 6584113 (2003-06-01), Manduley et al.
patent: 6654588 (2003-11-01), Moskowitz et al.
patent: 6687833 (2004-02-01), Osborne et al.
patent: 6732176 (2004-05-01), Stewart et al.
patent: 6766453 (2004-07-01), Nessett et al.
patent: 6986021 (2006-01-01), Master et al.
patent: 7140040 (2006-11-01), McBrearty et al.
patent: 7159237 (2007-01-01), Schneier et al.
patent: 7181530 (2007-02-01), Halasz et al.
patent: 7251725 (2007-07-01), Loison et al.
patent: 7370362 (2008-05-01), Olson et al.
patent: 7440573 (2008-10-01), Lor et al.
patent: 2001/0045451 (2001-11-01), Tan et al.
patent: 2001/0046224 (2001-11-01), Ryu
patent: 2002/0040389 (2002-04-01), Gerba et al.
patent: 2002/0055924 (2002-05-01), Liming
patent: 2002/0066034 (2002-05-01), Schlossberg et al.
patent: 2002/0197978 (2002-12-01), Zavidniak
patent: 2003/0031188 (2003-02-01), Ishibashi
patent: 2003/0033413 (2003-02-01), Willson et al.
patent: 2003/0058095 (2003-03-01), Satoh
patent: 2003/0065934 (2003-04-01), Angelo et al.
patent: 2003/0135762 (2003-07-01), Macaulay
patent: 2003/0142641 (2003-07-01), Sumner et al.
patent: 2003/0149887 (2003-08-01), Yadav
patent: 2004/0125781 (2004-07-01), Walter et al.
patent: 2004/0224690 (2004-11-01), Choi et al.
patent: 2004/0252837 (2004-12-01), Harvey et al.
patent: 2004/0255154 (2004-12-01), Kwan et al.
patent: 2005/0114473 (2005-05-01), Guy et al.
patent: 2005/0149443 (2005-07-01), Torvinen
patent: 2005/0254474 (2005-11-01), Iyer et al.
patent: 2007/0064647 (2007-03-01), Prasad
patent: 2008/0043686 (2008-02-01), Sperti et al.
Yongguang Zhang and Wenke Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” ACM MOBICOM, 2000, pp. 275-283.
Sonali Bhargava and Dharma Agrawal, “Security Enhancements in AODV protocol for Wireless Ad Hoc Networks,” IEEE 2001, pp. 2143-2147.
Nikita Borisov, Ian Goldberg, and David Wagner, “Intercepting Mobile Communications: The Insecurity of 802.11,” 2001, pp. 1-13.
W. Arbaugh, N. Shankar, Y.C. Justin Wan, “Your 802.11 Wireless Network has No Clothes,” Mar. 30, 2001, pp. 1-13.
Funk Software, Inc., “Product News: RADIUS/AAA Solutions on Wireless Networks”,Sep. 30, 2002,available at: http://web.archive.org/web/20040215160450/www.funk.com/radius/News/wireless.asp.
Funk Software, Inc., “Data Sheet: Steel-Belted Radius/Global Enterprise Edition”,Feb. 4, 2004,avail. at: http://web.archive.org/web/20040204113333/www.funk.com/radius/enterprise/gee—ds.asp.
Funk Software, Inc., “Data Sheet: Steel-Belted Radius/GEE Appliance”,Feb. 4, 2004,avail. at: http://web.archive.org/web/20040204113816/www.funk.com/radius/enterprise
ei—gee—ds.asp.
Funk Software, Inc., “White Paper: Centralized Remote Access Authentication with RADIUS”,Feb. 4, 2004,avail. at: http://web.archive.org/web/20040215054514/www.funk.com/radius/Solns/rad—wp.asp.
Funk, P. et al., “EAP Tunneled TLS Authentication Protocol(EAP-TTLS)”, Mar. 2002,avail. at: http://www.ietf.org/proceedings/02mar/slides/eap-l/sld001.htm.
Blunk, L. et al., “PPP Extensible Authentication Protocol(EAP)”, RFC 2284, Network Working Group, Mar. 1998,avail. at: http://www.faqs.org/rfcs/rfc2284.html.
Hussain, S., “How to Convert Ether Type Packet to 802.11”,Apr. 18, 2002,avail. at: http://lists.linux-wlan.com/pipermail/linux-wlan-devel/2002-April/001036.html.
Zorn, G., “Deriving Keys for Use With Microsoft Point-to-Point Encryption(MPPE)”, RFC 3079, Network Working Group, Mar. 2001,avail. at: http://www/faqs.org/rfcs/rfc3079.html.
Calhoun, P. et al., “Extensible Authentication Protocol Support in RADIUS”,RFC 2138, RADIUS Working Group, May 8, 1998,avail. at: http:/www.freeradius.org/rfc/draft-ietf-radius-eap-05.txt.
Zorn, G., “Microsoft Vendor-Specific RADIUS Attributes”,RFC 2548, Network Working Group, Mar. 1999,avail. at: http://www.faqs.org/rfcs/rfc2548.html.
Funk Software, “Comprehensive RADIUS/AAA Solution for the Global Enterprise”, Feb. 22, 2003, pp. 1-6, obtained from http://web.archive.org/web/20030222134138/http://www.funk.com/radius/enterprise/gee—ds.asp and htttp://web.archive.org/web/20030202140410/www.funk.com/radius/enterprise/feat—ee—rfc.asp, which is a link from the first mentioned page.
Office Action for U.S. Appl. No. 10/774,079 Mailed Apr. 30, 2008, 22 pages.
Final Office Action for U.S. Appl. No. 10/774,079 Mailed Feb. 2, 2009, 28 pages.
Office Action for U.S. Appl. No. 10/774,079 Mailed Oct. 5, 2009, 35 pages.
Final Office Action for U.S. Appl. No. 10/774,079 Mailed May 24, 2010, 40 pages.
Office Action for U.S. Appl. No. 10/773,394 Mailed Feb. 20, 2007, 19 pages.
Restriction Requirement for U.S. Appl. No. 10/773,394 Mailed Sep. 7, 2007, 9 pages.
Office Action for U.S. Appl. No. 10/773,394 Mailed Nov. 27, 2007, 12 pages.
Final Office Action for U.S. Appl. No. 10/773,394 Mailed Aug. 6, 2008, 12 pages.
Notice of Allowance for U.S. Appl. No. 10/773,394 Mailed Apr. 16, 2009, 12 pages.
Office Action for U.S. Appl. No. 10/773,487 Mailed Mar. 23, 2006, 11 pages.
Office Action for U.S. Appl. No. 10/773,487 Mailed Feb. 21, 2007, 4 pages.
Final Office Action for U.S. Appl. No. 10/773,487 Mailed Sep. 21, 2006, 5 pages.
Notice of Allowance for U.S. Appl. No. 10/773,487 Mailed Sep. 6, 2007, 7 Pages.
Office Action for U.S. Appl. No. 11/961,677 Mailed Sep. 2, 2009., 13 pages.
Final Office Action for U.S. Appl. No. 11/961,677 Mailed May 11, 2020., 12 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for detecting and preventing access... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for detecting and preventing access..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for detecting and preventing access... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4231076

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.