Patents Assigned to Network Security Technologies
-
Publication number: 20120309427Abstract: A wireless access device in a wireless network, whether a known or unknown entity, can be located using a geolocation system according to the present invention. A signal strength is determined by a wireless intrusion detection system (WIDS) node in a wireless network for each wireless access device that it detects. Based on the signal strength, an approximate distance from the node is determined, which, in one embodiment corresponds to a radius of a circle around the node. To account for error, an approximation band of the circle is calculated that will allow a user to determine the approximate location of the device within the wireless network.Type: ApplicationFiled: December 2, 2010Publication date: December 6, 2012Applicant: NETWORK SECURITY TECHNOLOGIES, INC.Inventors: Elaine HARVEY, Matthew WALNOCK
-
Patent number: 7853250Abstract: A wireless access device in a wireless network, whether a known or unknown entity, can be located using a geolocation system. A signal strength is determined by a wireless intrusion detection system (WIDS) node in a wireless network for each wireless access device that it detects. Based on the signal strength, an approximate distance from the node is determined, which, in one embodiment corresponds to a radius of a circle around the node. To account for error, an approximation band of the circle is calculated that will allow a user to determine the approximate location of the device within the wireless network.Type: GrantFiled: April 3, 2003Date of Patent: December 14, 2010Assignee: Network Security Technologies, Inc.Inventors: Elaine Harvey, Matthew Walnock
-
Patent number: 7778606Abstract: A wireless intrusion detection system (WIDS) is disclosed for monitoring both authorized and unauthorized access to a wireless portion of a network. The WIDS consists of a collector and one or more nodes that communicate via an out of band means that is separate from the network. Unauthorized access points and unauthorized clients in the network can be detected. The WIDS can be used to monitor, for example, a network implemented using the 802.11 protocol. In addition, the WIDS can be used by one company to provide a service that monitors the wireless network of another company.Type: GrantFiled: May 17, 2002Date of Patent: August 17, 2010Assignee: Network Security Technologies, Inc.Inventors: Ken Ammon, Chris O'Ferrell, Wayne Mitzen, Dan Frasnelli, Lawrence Wimble, Yin Yang, Tom McHale, Rick Doten
-
Publication number: 20090296598Abstract: Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point.Type: ApplicationFiled: May 21, 2009Publication date: December 3, 2009Applicant: NETWORK SECURITY TECHNOLOGIES, INC.Inventors: Elaine HARVEY, Matthew WALNOCK
-
Publication number: 20090300763Abstract: Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point.Type: ApplicationFiled: April 10, 2009Publication date: December 3, 2009Applicant: NETWORK SECURITY TECHNOLOGIES, INC.Inventors: Elaine HARVEY, Matthew WALNOCK
-
Patent number: 7603710Abstract: Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point.Type: GrantFiled: April 3, 2003Date of Patent: October 13, 2009Assignee: Network Security Technologies, Inc.Inventors: Elaine Harvey, Matthew Walnock
-
Publication number: 20090007269Abstract: A device may create a new project that includes criteria, import findings from a group of different network security tools into the new project based on the criteria, normalize the imported findings, and store the normalized findings.Type: ApplicationFiled: June 29, 2007Publication date: January 1, 2009Applicant: Network Security Technologies, Inc.Inventor: Scott V. BIANCO
-
Patent number: 6144740Abstract: Disclosed is a method for designing public key cryptosystems against fault-based attacks in which secret information stored in a tamperfree device is revealed during the encryption/decryption or signature generation processes due to fault-based attacks. A new fault-resistant system which enables any fault existing in modular multiplications and exponential computations to be detected with a very high probability based on a coding approach. This method can be used to implement all cryptosystems whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.Type: GrantFiled: May 20, 1998Date of Patent: November 7, 2000Assignees: Network Security Technology Co., Lan-Ying ChiangInventors: Chi-Sung Laih, Fu-Kuan Tu, Yung-Chen Lee
-
Patent number: 5619025Abstract: A method and apparatus for document verification exploits a temporally variable physical process to generate a reproducible effect that cannot be copied. A document such as a credit card is provided with a spot or stripe that incorporates at least one, and preferably a large plurality of photorefractive crystals arrayed in a random manner. The document verifying apparatus includes a coherent light source such as a diode laser to illuminate the photorefractive crystals, and a photosensor to receive light scattered from the photorefractive crystals. The random distribution and orientation of photorefractive crystals comprises a unique characteristic for each card or document, and this characteristic is not based on any assigned number or code. The response of photorefractive crystals to the coherent illumination comprises a time-varying characteristic that is dependent upon the intensity and temporal nature of the illumination itself.Type: GrantFiled: May 5, 1994Date of Patent: April 8, 1997Assignee: Network Security TechnologiesInventors: Joel Hickman, Scott Phillips, Colin Brady