Patents by Inventor Nancy Cam Winget
Nancy Cam Winget has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7788492Abstract: A method and system for pre-authenticating a pre-establishing key management on a roaming device prior to re-association to facilitate fast hand-off in a wireless network is described. For enhanced mobility, both authentication and key establishment is performed prior to re-association of the roaming device between access points. When the roaming device enters in contact with one of the access points, a local authentication is performed between the access point and the roaming device prior to re-association with the access point to allow for fast hand-offs of the device between access points within the network.Type: GrantFiled: August 17, 2007Date of Patent: August 31, 2010Assignee: Cisco Technology, Inc.Inventor: Nancy Cam Winget
-
Patent number: 7706345Abstract: A Wireless LAN Context Control Protocol (WLCCP) is used to establish and manage a wireless network topology and securely manages the “operational context” for mobile stations in a campus network. The WLCCP registration protocol can automatically create and delete links in the network, securely distribute operational context, and reliably establish Layer 2 forwarding paths on wireless links. A single infrastructure node is established as the central control point for each subnet, and enables APs and MNs to select the parent node that provides the “least-cost path” to a backbone LAN. Context messages provide a general-purpose transport for context and management information. WLCCP “Trace” messages facilitate network diagnostic tools. Ethernet or UDP/IP encapsulation can be used for WLCCP messages. Ethernet encapsulation is employed for intra-subnet (e.g. AP-to-AP or AP-to-SCM) WLCCP messages. IP encapsulation is used for inter-subnet WLCCP messages and may also be used for intra-subnet WLCCP messages.Type: GrantFiled: June 29, 2009Date of Patent: April 27, 2010Assignee: Cisco Technology, Inc.Inventors: Robert Meier, Richard D. Rebo, Victor J. Griswold, Douglas Smith, Nancy Cam Winget
-
Publication number: 20090327736Abstract: Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link message integrity check and an infrastructure management frame protection (IMFP) message integrity check contained in a broadcast management frame.Type: ApplicationFiled: December 6, 2005Publication date: December 31, 2009Applicant: Cisco Technology, Inc.Inventors: Nancy Cam-Winget, Mark Krischer, Robert B. O'Hara, JR.
-
Patent number: 7640430Abstract: A Machine Authentication PAC (Protected Access Credential) serves as machine credentials to obtain network access without requiring server storage and management of the additional set of credentials. The first time authentication is performed, user authentication is executed. After the supplicant and server have mutually authenticated each other and satisfied other validations, the supplicant requests a Machine Authentication PAC from the server. The Server randomly generates a cryptographic key (Device Key) and sends it to the supplicant along with an encrypted ticket, comprising the Device Key and other information and encrypted with a key only known to the Server. The supplicant caches the Machine Authentication PAC in its non-volatile memory for future use. When the machine needs to access certain network services before a user is available, the supplicant uses the Machine Authentication PAC to gain authorization for the machine to limited access on the network, without requiring user input.Type: GrantFiled: April 4, 2005Date of Patent: December 29, 2009Assignee: Cisco Technology, Inc.Inventors: Hao Zhou, Joseph Salowey, Nancy Cam Winget
-
Patent number: 7631347Abstract: A system and method that supports disjoint authentication server farms and disjoint policy or authorization servers for multi-session establishment. The authentication server has global knowledge of authenticators for additional sessions for a supplicant and can split authentication requests as needed to different authentication servers. The split authentication and authorization requests can be aggregated should the other authentication and authorization servers have the capability to handle multiple requests. In the case of server farms, authentication and implied authorization requests can be split to facilitate load balancing.Type: GrantFiled: November 18, 2005Date of Patent: December 8, 2009Assignee: Cisco Technology, Inc.Inventors: Nancy Cam-Winget, Mark Krischer, Jeremy Stieglitz
-
Patent number: 7624270Abstract: The present invention communication network system and method facilitates authentication and registration in a communication network as mobile nodes move from one geographical region to another. Multiple wireless domain services (WDSs) share client authentication information permitting relatively seamless roaming between subnets with minimal interruptions and delays. In one embodiment, a wireless domain service network communication method is performed utilizing partial authentication processes. A mobile node engages in an authentication protocol with a first wireless domain service (WDS) access point in a first subnet. The authentication credentials are forwarded to a second wireless domain service in a second subnet if the authentication protocol is successfully completed. The forwarded authentication credentials are utilized to authenticate the client entering the service area of the second wireless domain service in the second subnet.Type: GrantFiled: February 18, 2005Date of Patent: November 24, 2009Assignee: Cisco Technology, Inc.Inventors: Arnavkumar M. Pathan, Patrick Pak-Chiu Leung, John F. Wakerly, Nancy Cam Winget, Robert Charles Meier
-
Publication number: 20090262718Abstract: A Wireless LAN Context Control Protocol (WLCCP) is used to establish and manage a wireless network topology and securely manages the “operational context” for mobile stations in a campus network. The WLCCP registration protocol can automatically create and delete links in the network, securely distribute operational context, and reliably establish Layer 2 forwarding paths on wireless links. A single infrastructure node is established as the central control point for each subnet, and enables APs and MNs to select the parent node that provides the “least-cost path” to a backbone LAN. Context messages provide a general-purpose transport for context and management information. WLCCP “Trace” messages facilitate network diagnostic tools. Ethernet or UDP/IP encapsulation can be used for WLCCP messages. Ethernet encapsulation is employed for intra-subnet (e.g. AP-to-AP or AP-to-SCM) WLCCP messages. IP encapsulation is used for inter-subnet WLCCP messages and may also be used for intra-subnet WLCCP messages.Type: ApplicationFiled: June 29, 2009Publication date: October 22, 2009Inventors: Robert MEIER, Richard D. Rebo, Victor J. Griswold, Douglas Smith, Nancy Cam Winget
-
Patent number: 7602746Abstract: Methods, apparatuses, and systems directed to facilitating the application of pre-allocation policies in a wireless network environment. According to one implementation of the present invention, a central controller, or other control point in a wireless network infrastructure, applies one or more policies that limit the number of resource pre-allocations a given wireless client may establish with one or more wireless access points. In one implementation, the central controller provides a pre-allocation list to a wireless client that is requesting pre-allocation. By limiting a wireless client's ability to pre-allocate resources, the central controller optimally manages the resources of the wireless network. In alternative embodiments, the central controller can terminate pre-allocations between a wireless client and one or more wireless access points to enforce pre-allocation policy on the wireless network infrastructure.Type: GrantFiled: December 21, 2005Date of Patent: October 13, 2009Assignee: Cisco Technology, Inc.Inventors: Patrice R. Calhoun, Nancy Cam-Winget, Robert B. O'Hara, Jr.
-
Publication number: 20090235077Abstract: A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key.Type: ApplicationFiled: April 27, 2009Publication date: September 17, 2009Inventors: Nancy Cam Winget, Mark Krischer, Sheausong Yang, Ajit Sanzgiri, Timothy Olson, Pauline Shuen
-
Publication number: 20090232311Abstract: The present invention is contemplates an automatic, secure AP configuration protocol. Public/private keys and public key (PK) methods are used to automatically establish a mutual trust relationship and a secure channel between an AP and at least one configuration server. An AP automatically forwards a location identifier to the configuration server, and the configuration server delivers common, AP specific, and location specific configuration parameters to the AP.Type: ApplicationFiled: April 27, 2009Publication date: September 17, 2009Inventors: Robert C. MEIER, Nancy Cam Winget, Robert Bell
-
Patent number: 7561549Abstract: A Wireless LAN Context Control Protocol (WLCCP) is used to establish and manage a wireless network topology and securely manages the “operational context” for mobile stations in a campus network. The WLCCP registration protocol can automatically create and delete links in the network, securely distribute operational context, and reliably establish Layer 2 forwarding paths on wireless links. A single infrastructure node is established as the central control point for each subnet, and enables APs and MNs to select the parent node that provides the “least-cost path” to a backbone LAN. Context messages provide a general-purpose transport for context and management information. WLCCP “Trace” messages facilitate network diagnostic tools. Ethernet or UDP/IP encapsulation can be used for WLCCP messages. Ethernet encapsulation is employed for intra-subnet (e.g. AP-to-AP or AP-to-SCM) WLCCP messages. IP encapsulation is used for inter-subnet WLCCP messages and may also be used for intra-subnet WLCCP messages.Type: GrantFiled: May 4, 2005Date of Patent: July 14, 2009Assignee: Cisco Technology, Inc.Inventors: Robert Meier, Richard D. Rebo, Victor J. Griswold, Douglas Smith, Nancy Cam Winget
-
Patent number: 7562224Abstract: A system and method that allows a device to complete a single complete authentication sequence to a AAA server resulting in as many secure sessions required for the different applications or subsystems determined by the client's identity and the AAA server's policy. As the device is authenticated, it is determined where there are other sessions for the device. The sessions are established by generating unique new keying material that is passed to each session. This can be accomplished by (a) the authenticator or AAA server issuing the keys and distributing them to both the supplicant and applications (via their authenticators); or (b) authenticator or the AAA server mutually generating the session unique keys with the supplicant that are then distributed to the applications (via their authenticators).Type: GrantFiled: April 4, 2005Date of Patent: July 14, 2009Assignee: Cisco Technology, Inc.Inventors: Mark Krischer, Nancy Cam Winget
-
Patent number: 7558960Abstract: A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key.Type: GrantFiled: January 5, 2005Date of Patent: July 7, 2009Assignee: Cisco Technology, Inc.Inventors: Nancy Cam Winget, Mark Krishcer, Timothy Olson, Pauline Shuen, Ajit Sanzgiri, Sheausong Yang
-
Patent number: 7542572Abstract: The present invention is contemplates an automatic, secure AP configuration protocol. Public/private keys and public key (PK) methods are used to automatically establish a mutual trust relationship and a secure channel between an AP and at least one configuration server. An AP automatically forwards a location identifier to the configuration server, and the configuration server delivers common, AP specific, and location specific configuration parameters to the AP.Type: GrantFiled: December 1, 2004Date of Patent: June 2, 2009Inventors: Robert C. Meier, Nancy Cam Winget, Robert Bell
-
Patent number: 7526092Abstract: A method of providing a protocol for rekeying between two stations is disclosed. The method can include providing a first set of messages for computing a new key and reserving an auxiliary storage area for the new key. The first set of messages comprises an enable exchange. The method also includes providing a second set of messages to obsolete an old key and switch to the new key. The second set of messages comprises a transition exchange. In one embodiment, the protocol includes rekeying between multiple stations, and the rekey coordinator sends the first set of messages to a plurality of rekey participants. The auxiliary storage area allows multiplexing in both the enable and transition exchanges, thereby facilitating an efficient and safe rekey operation.Type: GrantFiled: June 15, 2007Date of Patent: April 28, 2009Assignee: Atheros Communications, Inc.Inventors: Gregory L. Chesson, Nancy Cam-Winget
-
Patent number: 7477747Abstract: A method and system for performing pre-authentication across inter-subnets. A pre-authentication request is received by a first access point associated with a first subnet from a mobile node requesting that is requesting pre-authentication with a second access point associated with a second subnet. The request is forwarded by the access point to a first authenticator that is the authenticator for the first subnet. The first authenticator obtains from a root infrastructure node the address for a second authenticator that is the authenticator for the second access point. The first authenticator then pre-authenticates the mobile node with the second authenticator by sending a message to the address for the second authenticator.Type: GrantFiled: February 4, 2005Date of Patent: January 13, 2009Inventors: Jeremy Stieglitz, Nancy Cam Winget
-
Publication number: 20080295144Abstract: Methods and systems for use in a wireless client that includes one or more wireless network interfaces for communicating with at least one access point wherein the method enables the wireless client to validate the authenticity and integrity of received management frames. The method includes receiving a protected wireless network management frame from an access point verifying a message integrity check (MIC) appended to the protected wireless network management frame. One or more security policies are then conditionally applied based on a failure to verify the MIC.Type: ApplicationFiled: December 6, 2005Publication date: November 27, 2008Applicant: Cisco Technology, Inc.Inventors: Nancy Cam-Winget, Mark Krischer, Robert B. O'Hara, JR.
-
Publication number: 20080282327Abstract: A system that enables network authorization status to be conveyed to the device requesting network services within or outside the scope of an authentication exchange is provided. The authorization status notification or information can be automatically generated or otherwise triggered by a request from the user or device. For instance, a query can be employed to solicit device authorization status related to a particular service or group of services. Additionally, authorization status notification can be automatically triggered based upon a change in the device authorization state.Type: ApplicationFiled: May 6, 2008Publication date: November 13, 2008Applicant: Cisco Technology, Inc.Inventors: Nancy Cam Winget, Joseph A. Salowey, James Edward Burns, Susan Elizabeth Thomson, Hao Zhou
-
Patent number: 7451316Abstract: A wireless station prepares to roam by pre-authenticating itself with a neighboring access point. The wireless station sends a rekey request, which can include an incremented rekey number. The wireless station receives a rekey response. The rekey response can include the incremented rekey number. Because the wireless station is pre-authenticated, after it roams it only needs to perform a two-way handshake with a new access point to establish secure communications with the new access point. The two-way handshake starts by the wireless station sending a reassociation request to the neighboring access point, the reassociation request comprising the incremented rekey number established during pre-authentication. The wireless station receives a reassociation response from the neighboring access point. To protect against replay attacks, the neighboring access point can verify the rekey number sent in the reassociation request matches the rekey number sent in the rekey response.Type: GrantFiled: July 15, 2004Date of Patent: November 11, 2008Inventors: David E. Halasz, Nancy Cam Winget, Robert C. Meier
-
Publication number: 20080250500Abstract: Detection of a man-in-the-middle attack. In particular implementations, a method includes detecting a first event comprising notification of an invalid wireless management frame operable to cause a termination of a connection between a wireless client and a wireless access point, wherein the notification is based on a failed verification of a management integrity code (MIC) appended to the wireless management frame. The method also includes detecting a second event involving notification of either an authentication failure associated with the wireless client or a connection between the wireless client and a rogue access point. The method also includes performing one or more actions upon detection of the first event and the second event within a threshold period of time of each other.Type: ApplicationFiled: April 5, 2007Publication date: October 9, 2008Applicant: Cisco Technology, Inc.Inventors: Timothy S. Olson, Arun Khanna, Bruce McMurdo, Nancy Cam-Winget, Liwen Wu