Patents by Inventor Mark Krischer

Mark Krischer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080295144
    Abstract: Methods and systems for use in a wireless client that includes one or more wireless network interfaces for communicating with at least one access point wherein the method enables the wireless client to validate the authenticity and integrity of received management frames. The method includes receiving a protected wireless network management frame from an access point verifying a message integrity check (MIC) appended to the protected wireless network management frame. One or more security policies are then conditionally applied based on a failure to verify the MIC.
    Type: Application
    Filed: December 6, 2005
    Publication date: November 27, 2008
    Applicant: Cisco Technology, Inc.
    Inventors: Nancy Cam-Winget, Mark Krischer, Robert B. O'Hara, JR.
  • Patent number: 7457620
    Abstract: A method, apparatus, and software containing computer readable code to implement the method implemented in a first wireless device. The method includes, for a particular network identifier active in a wireless network, transmitting frames configured to advertise the infrastructure network of the particular network identifier. The transmitting of off-channel beacons is in a provided channel different than the channel in which the access point of the infrastructure wireless of the particular network identifier transmits beacon frames. The transmitting of off-channel beacons further is at a rate higher than the beacon rate frame at which the access point of the infrastructure wireless of the particular network identifier transmits beacon frames.
    Type: Grant
    Filed: July 15, 2005
    Date of Patent: November 25, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Alex C. K. Lam, Brian Hart, Mark Krischer, David Sheldon Stephenson
  • Publication number: 20080184331
    Abstract: In one embodiment, a method includes receiving security context information relevant to a connection between a wireless network infrastructure component and a wireless client, wherein the security context information comprises at least, an identification of the wireless client, and wherein the security context information identifies any security protocols associated with the connection; validating the connection based on the security context information; and transmitting the security context information to one or more detector wireless access points.
    Type: Application
    Filed: January 29, 2007
    Publication date: July 31, 2008
    Applicant: Cisco Technology, Inc.
    Inventors: Nancy Cam-Winget, Mark Krischer, Robert B. O'Hara
  • Publication number: 20070218875
    Abstract: Methods, apparatuses and systems directed to detecting address spoofing in wireless networks by, after receiving a wireless management frame, transmitting verification messages to determine whether a given wireless node (e.g., a wireless access point, or wireless client) has legitimately lost its connection state.
    Type: Application
    Filed: March 16, 2006
    Publication date: September 20, 2007
    Applicant: Cisco Technlogy, Inc.
    Inventors: Patrice Calhoun, Nancy Cam-Winget, Mark Krischer, Robert O'Hara
  • Publication number: 20070014267
    Abstract: A method, apparatus, and software containing computer readable code to implement the method implemented in a first wireless device. The method includes, for a particular network identifier active in a wireless network, transmitting frames configured to advertise the infrastructure network of the particular network identifier. The transmitting of off-channel beacons is in a provided channel different than the channel in which the access point of the infrastructure wireless of the particular network identifier transmits beacon frames. The transmitting of off-channel beacons further is at a rate higher than the beacon rate frame at which the access point of the infrastructure wireless of the particular network identifier transmits beacon frames.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventors: Alex Lam, Brian Hart, Mark Krischer, David Stephenson
  • Publication number: 20060236109
    Abstract: A system and method that allows a device to complete a single complete authentication sequence to a AAA server resulting in as many secure sessions required for the different applications or subsystems determined by the client's identity and the AAA server's policy. As the device is authenticated, it is determined where there are other sessions for the device. The sessions are established by generating unique new keying material that is passed to each session. This can be accomplished by (a) the authenticator or AAA server issuing the keys and distributing them to both the supplicant and applications (via their authenticators); or (b) authenticator or the AAA server mutually generating the session unique keys with the supplicant that are then distributed to the applications (via their authenticators).
    Type: Application
    Filed: April 4, 2005
    Publication date: October 19, 2006
    Inventors: Mark Krischer, Nancy Cam Winget
  • Publication number: 20060236383
    Abstract: A system and method that supports disjoint authentication server farms and disjoint policy or authorization servers for multi-session establishment. The authentication server has global knowledge of authenticators for additional sessions for a supplicant and can split authentication requests as needed to different authentication servers. The split authentication and authorization requests can be aggregated should the other authentication and authorization servers have the capability to handle multiple requests. In the case of server farms, authentication and implied authorization requests can be split to facilitate load balancing.
    Type: Application
    Filed: November 18, 2005
    Publication date: October 19, 2006
    Inventors: Nancy Cam-Winset, Mark Krischer, Jeremy Stieglitz
  • Publication number: 20060193299
    Abstract: In a wireless local area network, a method for detecting the presence of an unauthorized device comprises: detecting the presence of neighboring devices from which management frames can be sent; saving a representation of each neighboring device present; receiving a management frame purporting to be from one of the detected device; determining that the received management frame was sent by an unauthorized device; and indicating the presence of the unauthorized device.
    Type: Application
    Filed: February 25, 2005
    Publication date: August 31, 2006
    Inventors: Nancy Winget, Mark Krischer, Timothy Olson, Sheausong Yang
  • Publication number: 20060023685
    Abstract: A method of wirelessly transmitting or receiving a packet of information, and an apparatus to wirelessly transmit or receive a packet of information. In the case of transmitting, the method includes streaming a data element, including at least some of the contents of the packet, over a network link during transmit time. In the case of receiving, the method includes streaming a data element, including at least some of the contents of the received packet, over a network link during receive time. The transmitting or receiving is by a station of a wireless network and the streaming is to or from the station from or to a network device coupled to the station by the network link.
    Type: Application
    Filed: September 1, 2005
    Publication date: February 2, 2006
    Inventors: Mark Krischer, Philip Ryan, Michael Webb
  • Publication number: 20060014522
    Abstract: A method of wirelessly transmitting or receiving a packet of information, and an apparatus to wirelessly transmit or receive a packet of information. In the case of transmitting, the method includes streaming a data element, including at least some of the contents of the packet, over a network link during transmit time, including encrypting the data element during the streaming in real time prior to the transfer over the network link. In the case of receiving, the method includes streaming a data element, including at least some of the contents of the received packet, over a network link during receive time, including decrypting the data element during the streaming in real time after to the transfer over the network link. The transmitting or receiving is by a station of a wireless network and the streaming is to or from the station from or to a network device coupled to the station by the network link.
    Type: Application
    Filed: August 5, 2005
    Publication date: January 19, 2006
    Inventors: Mark Krischer, Philip Ryan, Michael Webb
  • Patent number: 6970446
    Abstract: A method of wirelessly transmitting or receiving a packet of information, and an apparatus to wirelessly transmit or receive a packet of information. In the case of transmitting, the method includes streaming a data element, including at least some of the contents of the packet, over a network link during transmit time, including encrypting the data element during the streaming in real time prior to the transfer over the network link. In the case of receiving, the method includes streaming a data element, including at least some of the contents of the received packet, over a network link during receive time, including decrypting the data element during the streaming in real time after to the transfer over the network link. The transmitting or receiving is by a station of a wireless network and the streaming is to or from the station from or to a network device coupled to the station by the network link.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: November 29, 2005
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Krischer, Philip J. Ryan, Michael J. Webb
  • Patent number: 6954450
    Abstract: A method of wirelessly transmitting or receiving a packet of information, and an apparatus to wirelessly transmit or receive a packet of information. In the case of transmitting, the method includes streaming a data element, including at least some of the contents of the packet, over a network link during transmit time. In the case of receiving, the method includes streaming a data element, including at least some of the contents of the received packet, over a network link during receive time. The transmitting or receiving is by a station of a wireless network and the streaming is to or from the station from or to a network device coupled to the station by the network link.
    Type: Grant
    Filed: November 26, 2003
    Date of Patent: October 11, 2005
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Krischer, Philip J. Ryan, Michael J. Webb
  • Publication number: 20050141498
    Abstract: A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key.
    Type: Application
    Filed: January 5, 2005
    Publication date: June 30, 2005
    Inventors: Nancy Cam Winget, Mark Krischer, Timothy Olson, Pauline Shuen, Ajit Sanzgiri, Sheausong Yang
  • Publication number: 20050120213
    Abstract: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods (e.g. user names and passwords). The shared secret, referred to in this embodiment as the protected access credential may be advantageously used to mutually authenticate a server and a peer upon securing a tunnel for communication via a network. The present system and method disclosed and claimed herein, in one aspect thereof, comprises the steps of 1) providing a communication implementation between a first and a second party; 2) provisioning a secure credential between the first and the second party; and 3) establishing a secure tunnel between the first and the second party using the secure credential.
    Type: Application
    Filed: December 1, 2003
    Publication date: June 2, 2005
    Applicant: Cisco Technology, Inc.
    Inventors: Nancy Winget, Hao Zhou, Mark Krischer, Joseph Salowey, Jeremy Stieglitz, Saar Gillai, Padmanabha Jakkahalli
  • Publication number: 20050111471
    Abstract: A method of wirelessly transmitting or receiving a packet of information, and an apparatus to wirelessly transmit or receive a packet of information. In the case of transmitting, the method includes streaming a data element, including at least some of the contents of the packet, over a network link during transmit time. In the case of receiving, the method includes streaming a data element, including at least some of the contents of the received packet, over a network link during receive time. The transmitting or receiving is by a station of a wireless network and the streaming is to or from the station from or to a network device coupled to the station by the network link.
    Type: Application
    Filed: November 26, 2003
    Publication date: May 26, 2005
    Inventors: Mark Krischer, Philip Ryan, Michael Webb
  • Publication number: 20050111472
    Abstract: A method of wirelessly transmitting or receiving a packet of information, and an apparatus to wirelessly transmit or receive a packet of information. In the case of transmitting, the method includes streaming a data element, including at least some of the contents of the packet, over a network link during transmit time, including encrypting the data element during the streaming in real time prior to the transfer over the network link. In the case of receiving, the method includes streaming a data element, including at least some of the contents of the received packet, over a network link during receive time, including decrypting the data element during the streaming in real time after to the transfer over the network link. The transmitting or receiving is by a station of a wireless network and the streaming is to or from the station from or to a network device coupled to the station by the network link.
    Type: Application
    Filed: March 31, 2004
    Publication date: May 26, 2005
    Inventors: Mark Krischer, Philip Ryan, Michael Webb
  • Publication number: 20050097362
    Abstract: A method and implementation is disclosed for secure communication between two or more parties. A secure tunnel is established between parties using an encryption algorithm. An authentication process is performed between parties over the secured tunnel. The provisioning of credentials is thereafter performed between parties.
    Type: Application
    Filed: November 5, 2003
    Publication date: May 5, 2005
    Inventors: Nancy Winget, Mark Krischer, Ilan Frenkel, Hao Zhou