Information security – Access control or authentication – Network
Reexamination Certificate
2007-08-29
2008-11-04
Revak, Christopher A (Department: 2131)
Information security
Access control or authentication
Network
C726S022000
Reexamination Certificate
active
07448073
ABSTRACT:
Systems and methods for managing network traffic from an unknown wireless device on a computer network are presented. A security component residing in a wired area of the computer network is configured to passively monitor network traffic from a wireless area of the computer network for network traffic from an unknown wireless device. Upon detecting network traffic from an unknown wireless device, the security component probes the unknown wireless device to determine at least one characteristic of the wireless device. After probing the device, the security component generates a device profile of the unknown wireless device according to the at least one determined characteristic. Access privileges are determined to give to the unknown wireless device according to the determined profile and activities exhibited by the wireless device. Thereafter, network traffic from the unknown wireless device is permitted to pass to the computer network according to the determined access privileges.
REFERENCES:
patent: 6279113 (2001-08-01), Vaidya
patent: 6408391 (2002-06-01), Huff
patent: 6560611 (2003-05-01), Nine
patent: 6754488 (2004-06-01), Won
patent: 7020476 (2006-03-01), Day
patent: 7068998 (2006-06-01), Zavidniak
patent: 7069438 (2006-06-01), Balabine
patent: 7277404 (2007-10-01), Tanzella
patent: 7295524 (2007-11-01), Gray
patent: 7340768 (2008-03-01), Rosenberger
patent: 2003/0120934 (2003-06-01), Ortiz
patent: 2003/0217283 (2003-11-01), Hrastar
patent: 2003/0217289 (2003-11-01), Ammon
patent: 2004/0003285 (2004-01-01), Whelan
patent: 2004/0008652 (2004-01-01), Tanzella
patent: 2004/0034773 (2004-02-01), Balabine
patent: 2004/0098610 (2004-05-01), Hrastar
patent: 2004/0121787 (2004-06-01), Day
patent: 2004/0157624 (2004-08-01), Hrastar
patent: 2004/0209634 (2004-10-01), Hrastar
patent: 2004/0210654 (2004-10-01), Hrastar
patent: 2004/0215957 (2004-10-01), Moineau
patent: 2004/0252837 (2004-12-01), Harvey et al.
patent: 1039689 (2000-09-01), None
patent: 1760611 (2007-03-01), None
patent: 00/34867 (2000-06-01), None
patent: 00/70458 (2000-11-01), None
patent: 01/71499 (2001-09-01), None
patent: 02/082730 (2002-10-01), None
patent: 03/100559 (2003-12-01), None
patent: 2004/017552 (2004-02-01), None
patent: 2004/062160 (2004-07-01), None
patent: WO 2004/092925 (2004-10-01), None
patent: 2004/095192 (2004-11-01), None
patent: 2005/024598 (2005-03-01), None
Asaka, M., “Information Gathering With Mobile Agents for an Intrusion Detection System,” Systems and Computers in Japan 30(2):31-37, 1999.
Denning, D.E., “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering SE-13(2):222-232, Feb. 1987.
Goan, T., “A Cop on the Beat: Collecting and Appraising Intrusion,” Communications of the ACM 42(7):46-52, Jul. 1999.
Kluepfel, H.M., “Foiling the Wiley Hacker: More Than Analysis and Containment,” Proceedings of the Annual IEEE International Carnahan Conference on Security Technology (1989 ICCST), Zurich, Oct. 3-5, 1989, pp. 15-21.
Labuschagne, L., and J.H.P. Eloff, “The Use of Real-Time Risk Analysis to Enable Dynamic Activation of Countermeasures,” Computers & Security 17(4):347-357, 1998.
Lin, L.-M., “A Case Study on Hunting a Brilliant Hacker,” Proceedings of the 25th Annual IEEE International Conference on Security Technolgy, Taipei, Oct. 1-3, 1991, pp. 177-180.
McKosky, R.A., and S.G. Shiva, “A File Integrity Checking System to Detect and Recover From Program Modification Attacks in Multi-User Computer Systems,” Computers & Security 9(5):431-446, 1990.
Snapp, S.R., et al., “DIDS (Distribution Intrusion Detection System): Motivation, Architecture, and an Early Prototype,” Proceedings of the 14th National Computer Security Conference, Washington, D.C., Oct. 1991, pp. 167-176, <http://seclab.cs.ucdavis.edu/papers/DIDS.ncsc91.pdf>.
Stoll, C., “Stalking the Wily Hacker,” Communications of the ACM 31(5):484-497, May 1988.
Christensen O'Connor Johnson & Kindness PLLC
Revak Christopher A
Wimetrics Corporation
LandOfFree
System and method for wireless local area network monitoring... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for wireless local area network monitoring..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for wireless local area network monitoring... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4032474