Patents by Inventor Giorgio Freguglia

Giorgio Freguglia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8621201
    Abstract: In a wireless communications network including at least one authenticator and at least one authentication server, wherein the authenticator is adapted to interact with the authentication server for authenticating supplicants in order to conditionally grant thereto access to the wireless communications network, a short authentication method for authenticating a supplicant, the method including: providing a shared secret, shared by and available at the supplicant and the authentication server; having the supplicant provide to the authenticator an authentication token, wherein the authentication token is based on the shared secret available thereat; having the authenticator forward the authentication token to the authentication server; having the authentication server ascertain an authenticity of the received authentication token based on the shared secret available thereat; in case the authenticity of the authentication token is ascertained, having the authentication server generate a first authentication key b
    Type: Grant
    Filed: June 29, 2005
    Date of Patent: December 31, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali, Romano Fantacci, Leonardo Maccari, Tommaso Pecorella
  • Patent number: 8369830
    Abstract: A method of detecting attacks in a wireless data communications network, includes: monitoring wireless traffic over the wireless data communications network; deriving a first network state from the monitored wireless traffic; acquiring trusted information indicative of a wireless network state from at least one apparatus of a network infrastructure; establishing a second network state based on the acquired trusted information; comparing the derived first network state with the second network state, and determining a wireless network attack in case of incoherence between the derived first network state compared to the second network state.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: February 5, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Luigi Sperti, Maria José Mollo, Federico Frosali, Giorgio Freguglia
  • Patent number: 8370894
    Abstract: A method of enforcing security policies in a mobile ad-hoc network, includes: entrusting at least one first network node along a data traffic route from a data traffic origin node to a data traffic destination node, with the enforcing of predefined security policies on the data traffic; and entrusting at least one second network node, distinct from said first network node, with the control of the enforcement of the security policies by the first network node.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: February 5, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali
  • Publication number: 20100058442
    Abstract: A method of enforcing security policies in a mobile ad-hoc network, includes: entrusting at least one first network node along a data traffic route from a data traffic origin node to a data traffic destination node, with the enforcing of predefined security policies on the data traffic; and entrusting at least one second network node, distinct from said first network node, with the control of the enforcement of the security policies by the first network node.
    Type: Application
    Filed: December 26, 2006
    Publication date: March 4, 2010
    Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali
  • Publication number: 20090217033
    Abstract: In a wireless communications network including at least one authenticator and at least one authentication server, wherein the authenticator is adapted to interact with the authentication server for authenticating supplicants in order to conditionally grant thereto access to the wireless communications network, a short authentication method for authenticating a supplicant, the method including: providing a shared secret, shared by and available at the supplicant and the authentication server; having the supplicant provide to the authenticator an authentication token, wherein the authentication token is based on the shared secret available thereat; having the authenticator forward the authentication token to the authentication server; having the authentication server ascertain an authenticity of the received authentication token based on the shared secret available thereat; in case the authenticity of the authentication token is ascertained, having the authentication server generate a first authentication key b
    Type: Application
    Filed: June 29, 2005
    Publication date: August 27, 2009
    Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali, Romano Fantacci, Leonardo Maccari, Tommaso Pecorella
  • Publication number: 20080043686
    Abstract: A method of detecting attacks in a wireless data communications network, includes: monitoring wireless traffic over the wireless data communications network; deriving a first network state from the monitored wireless traffic; acquiring trusted information indicative of a wireless network state from at least one apparatus of a network infrastructure; establishing a second network state based on the acquired trusted information; comparing the derived first network state with the second network state, and determining a wireless network attack in case of incoherence between the derived first network state compared to the second network state.
    Type: Application
    Filed: December 30, 2004
    Publication date: February 21, 2008
    Applicant: TELECOM ITALIA S.P.A.
    Inventors: Luigi Sperti, Maria Mollo, Federico Frosali, Giorgio Freguglia