Patents Assigned to Network Security Technologies
  • Publication number: 20120309427
    Abstract: A wireless access device in a wireless network, whether a known or unknown entity, can be located using a geolocation system according to the present invention. A signal strength is determined by a wireless intrusion detection system (WIDS) node in a wireless network for each wireless access device that it detects. Based on the signal strength, an approximate distance from the node is determined, which, in one embodiment corresponds to a radius of a circle around the node. To account for error, an approximation band of the circle is calculated that will allow a user to determine the approximate location of the device within the wireless network.
    Type: Application
    Filed: December 2, 2010
    Publication date: December 6, 2012
    Applicant: NETWORK SECURITY TECHNOLOGIES, INC.
    Inventors: Elaine HARVEY, Matthew WALNOCK
  • Patent number: 7853250
    Abstract: A wireless access device in a wireless network, whether a known or unknown entity, can be located using a geolocation system. A signal strength is determined by a wireless intrusion detection system (WIDS) node in a wireless network for each wireless access device that it detects. Based on the signal strength, an approximate distance from the node is determined, which, in one embodiment corresponds to a radius of a circle around the node. To account for error, an approximation band of the circle is calculated that will allow a user to determine the approximate location of the device within the wireless network.
    Type: Grant
    Filed: April 3, 2003
    Date of Patent: December 14, 2010
    Assignee: Network Security Technologies, Inc.
    Inventors: Elaine Harvey, Matthew Walnock
  • Patent number: 7778606
    Abstract: A wireless intrusion detection system (WIDS) is disclosed for monitoring both authorized and unauthorized access to a wireless portion of a network. The WIDS consists of a collector and one or more nodes that communicate via an out of band means that is separate from the network. Unauthorized access points and unauthorized clients in the network can be detected. The WIDS can be used to monitor, for example, a network implemented using the 802.11 protocol. In addition, the WIDS can be used by one company to provide a service that monitors the wireless network of another company.
    Type: Grant
    Filed: May 17, 2002
    Date of Patent: August 17, 2010
    Assignee: Network Security Technologies, Inc.
    Inventors: Ken Ammon, Chris O'Ferrell, Wayne Mitzen, Dan Frasnelli, Lawrence Wimble, Yin Yang, Tom McHale, Rick Doten
  • Publication number: 20090296598
    Abstract: Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point.
    Type: Application
    Filed: May 21, 2009
    Publication date: December 3, 2009
    Applicant: NETWORK SECURITY TECHNOLOGIES, INC.
    Inventors: Elaine HARVEY, Matthew WALNOCK
  • Publication number: 20090300763
    Abstract: Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point.
    Type: Application
    Filed: April 10, 2009
    Publication date: December 3, 2009
    Applicant: NETWORK SECURITY TECHNOLOGIES, INC.
    Inventors: Elaine HARVEY, Matthew WALNOCK
  • Patent number: 7603710
    Abstract: Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point.
    Type: Grant
    Filed: April 3, 2003
    Date of Patent: October 13, 2009
    Assignee: Network Security Technologies, Inc.
    Inventors: Elaine Harvey, Matthew Walnock
  • Publication number: 20090007269
    Abstract: A device may create a new project that includes criteria, import findings from a group of different network security tools into the new project based on the criteria, normalize the imported findings, and store the normalized findings.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: Network Security Technologies, Inc.
    Inventor: Scott V. BIANCO
  • Patent number: 6144740
    Abstract: Disclosed is a method for designing public key cryptosystems against fault-based attacks in which secret information stored in a tamperfree device is revealed during the encryption/decryption or signature generation processes due to fault-based attacks. A new fault-resistant system which enables any fault existing in modular multiplications and exponential computations to be detected with a very high probability based on a coding approach. This method can be used to implement all cryptosystems whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.
    Type: Grant
    Filed: May 20, 1998
    Date of Patent: November 7, 2000
    Assignees: Network Security Technology Co., Lan-Ying Chiang
    Inventors: Chi-Sung Laih, Fu-Kuan Tu, Yung-Chen Lee
  • Patent number: 5619025
    Abstract: A method and apparatus for document verification exploits a temporally variable physical process to generate a reproducible effect that cannot be copied. A document such as a credit card is provided with a spot or stripe that incorporates at least one, and preferably a large plurality of photorefractive crystals arrayed in a random manner. The document verifying apparatus includes a coherent light source such as a diode laser to illuminate the photorefractive crystals, and a photosensor to receive light scattered from the photorefractive crystals. The random distribution and orientation of photorefractive crystals comprises a unique characteristic for each card or document, and this characteristic is not based on any assigned number or code. The response of photorefractive crystals to the coherent illumination comprises a time-varying characteristic that is dependent upon the intensity and temporal nature of the illumination itself.
    Type: Grant
    Filed: May 5, 1994
    Date of Patent: April 8, 1997
    Assignee: Network Security Technologies
    Inventors: Joel Hickman, Scott Phillips, Colin Brady