Patents by Inventor Nancy Winget

Nancy Winget has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7370362
    Abstract: Methods and apparatus are disclosed for locating and disabling the switch port of a rogue wireless access point. In one embodiment, a network management device is configured to detect the presence of a rogue access point on a managed wireless network. Once detected, the management device may then instruct a special client, such as a scanning AP, to associate with the rogue access point and send a discovery packet through the rogue access point to network management device. The network management device upon receiving the discovery packet may thereby determine that the rogue access point is connected to a network managed by said network device. The network device may then utilize information contained in the discovery packet to locate the switch port to which the rogue access point is connected, and ultimately disable the switch port to which the rogue access point is connected.
    Type: Grant
    Filed: March 3, 2005
    Date of Patent: May 6, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Timothy Olson, Pauline Shuen, Ajit Sanzgiri, Nancy Winget, Pejman Roshan
  • Publication number: 20070288997
    Abstract: A method and system for handling roaming mobile nodes in a wireless network. The system uses a Subnet Context Manager to store current Network session keys, security policy and duration of the session (e.g. session timeout) for mobile nodes, which is established when the mobile node is initially authenticated. Pairwise transit keys are derived from the network session key. The Subnet Context Manager handles subsequent reassociation requests. When a mobile node roams to a new access point, the access point obtains the network session key from the Subnet Context Manager and validates the mobile node by computing a new pairwise transient key from the network session key.
    Type: Application
    Filed: July 2, 2007
    Publication date: December 13, 2007
    Inventors: Robert MEIER, Richard Rebo, Victor Griswold, Douglas Smith, Nancy Winget
  • Publication number: 20070076671
    Abstract: A method and system for network infrastructure driven context setup to facilitate roaming for a client coupled to the network. The method includes generating an optimized list of the client's neighbors. The list is suitably generated either statically or dynamically based on any number of parameters managed by the network element to ensure an optimal set of AP candidates are provided. At least one access point is selected from the optimized list.
    Type: Application
    Filed: September 30, 2005
    Publication date: April 5, 2007
    Inventors: Nancy Winget, Rajneesh Kumar
  • Publication number: 20060200862
    Abstract: Methods and apparatus are disclosed for locating and disabling the switch port of a rogue wireless access point. In one embodiment, a network management device is configured to detect the presence of a rogue access point on a managed wireless network. Once detected, the management device may then instruct a special client, such as a scanning AP, to associate with the rogue access point and send a discovery packet through the rogue access point to network management device. The network management device upon receiving the discovery packet may thereby determine that the rogue access point is connected to a network managed by said network device. The network device may then utilize information contained in the discovery packet to locate the switch port to which the rogue access point is connected, and ultimately disable the switch port to which the rogue access point is connected.
    Type: Application
    Filed: March 3, 2005
    Publication date: September 7, 2006
    Inventors: Timothy Olson, Pauline Shuen, Ajit Sanzgiri, Nancy Winget, Pejman Roshan
  • Publication number: 20060193299
    Abstract: In a wireless local area network, a method for detecting the presence of an unauthorized device comprises: detecting the presence of neighboring devices from which management frames can be sent; saving a representation of each neighboring device present; receiving a management frame purporting to be from one of the detected device; determining that the received management frame was sent by an unauthorized device; and indicating the presence of the unauthorized device.
    Type: Application
    Filed: February 25, 2005
    Publication date: August 31, 2006
    Inventors: Nancy Winget, Mark Krischer, Timothy Olson, Sheausong Yang
  • Publication number: 20050220054
    Abstract: A Wireless LAN Context Control Protocol (WLCCP) is used to establish and manage a wireless network topology and securely manages the “operational context” for mobile stations in a campus network. The WLCCP registration protocol can automatically create and delete links in the network, securely distribute operational context, and reliably establish Layer 2 forwarding paths on wireless links. A single infrastructure node is established as the central control point for each subnet, and enables APs and MNs to select the parent node that provides the “least-cost path” to a backbone LAN. Context messages provide a general-purpose transport for context and management information. WLCCP “Trace” messages facilitate network diagnostic tools. Ethernet or UDP/IP encapsulation can be used for WLCCP messages. Ethernet encapsulation is employed for intra-subnet (e.g. AP-to-AP or AP-to-SCM) WLCCP messages. IP encapsulation is used for inter-subnet WLCCP messages and may also be used for intra-subnet WLCCP messages.
    Type: Application
    Filed: May 4, 2005
    Publication date: October 6, 2005
    Inventors: Robert Meier, Richard Rebo, Victor Griswold, Douglas Smith, Nancy Winget
  • Publication number: 20050143065
    Abstract: The present invention communication network system and method facilitates authentication and registration in a communication network as mobile nodes move from one geographical region to another. Multiple wireless domain services (WDSs) share client authentication information permitting relatively seamless roaming between subnets with minimal interruptions and delays. In one embodiment, a wireless domain service network communication method is performed utilizing partial authentication processes. A mobile node engages in an authentication protocol with a first wireless domain service (WDS) access point in a first subnet. The authentication credentials are forwarded to a second wireless domain service in a second subnet if the authentication protocol is successfully completed. The forwarded authentication credentials are utilized to authenticate the client entering the service area of the second wireless domain service in the second subnet.
    Type: Application
    Filed: February 18, 2005
    Publication date: June 30, 2005
    Inventors: Arnavkumar Pathan, Patrick Leung, John Wakerly, Nancy Winget, Robert Meier
  • Publication number: 20050120213
    Abstract: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods (e.g. user names and passwords). The shared secret, referred to in this embodiment as the protected access credential may be advantageously used to mutually authenticate a server and a peer upon securing a tunnel for communication via a network. The present system and method disclosed and claimed herein, in one aspect thereof, comprises the steps of 1) providing a communication implementation between a first and a second party; 2) provisioning a secure credential between the first and the second party; and 3) establishing a secure tunnel between the first and the second party using the secure credential.
    Type: Application
    Filed: December 1, 2003
    Publication date: June 2, 2005
    Applicant: Cisco Technology, Inc.
    Inventors: Nancy Winget, Hao Zhou, Mark Krischer, Joseph Salowey, Jeremy Stieglitz, Saar Gillai, Padmanabha Jakkahalli
  • Publication number: 20050097362
    Abstract: A method and implementation is disclosed for secure communication between two or more parties. A secure tunnel is established between parties using an encryption algorithm. An authentication process is performed between parties over the secured tunnel. The provisioning of credentials is thereafter performed between parties.
    Type: Application
    Filed: November 5, 2003
    Publication date: May 5, 2005
    Inventors: Nancy Winget, Mark Krischer, Ilan Frenkel, Hao Zhou
  • Publication number: 20050086465
    Abstract: System architecture and corresponding method for securing the transmission of management frame packets on a network (e.g. IEEE 802.11) is provided. Once a trust relationship is created between a transmitter and a receiver on the network such that the transmitter is authorized to communicate over the network, a key and corresponding message integrity check may be generated in order to sign management frame communications via the network. The message integrity check and a replay protection value may be transmitted with the management frame packet. Upon receipt, the message integrity check and replay protection value are authenticated to verify permitted transmission of the management frame packet.
    Type: Application
    Filed: October 16, 2003
    Publication date: April 21, 2005
    Applicant: Cisco Technology, Inc.
    Inventors: Bhawani Sapkota, Nancy Winget
  • Publication number: 20050086481
    Abstract: A method for transmitting multicast messages where a group key is generated for signing the multicast message transmitted on a network. Next, the system establishes a group key name corresponding to the group key. Once the group key name is established, the data packet is transmitted together with the group key name, the group key and the multicast message. Upon receipt, the recipient validates the group key name in the received data packet by comparing the received group key name to a group key name table in order to determine the intended group recipients.
    Type: Application
    Filed: October 15, 2003
    Publication date: April 21, 2005
    Applicant: Cisco Technology, Inc.
    Inventor: Nancy Winget
  • Publication number: 20050060319
    Abstract: A technique for network planning that includes an interface for guiding a network user through the network allocation process, such as defining groups of clients based on their capabilities. Portions of the wireless local area network infrastructure, e.g., access points, are allocated among the groups. When a client attempts to associate with an access point, the access point determines the client capabilities. If the client is supported by the access point, the access point allows the client to associate and sends the client a message that contains a prioritized list of other nearby access points allocated to service that client, otherwise the access point sends a prioritized roaming list of nearby access points to the client that are allocated to serve that type of client. Feedback is provided by the network infrastructure enabling a network user or the network to automatically reallocate resources based on the feedback.
    Type: Application
    Filed: October 1, 2004
    Publication date: March 17, 2005
    Inventors: Bretton Douglas, Arnold Bilstad, Timothy Olson, David Stephenson, Sheausong Yang, Nancy Winget, Stuart Norman, Robert Meier, Douglas Smith