Patents by Inventor Scott Hrastar
Scott Hrastar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8060939Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.Type: GrantFiled: April 23, 2008Date of Patent: November 15, 2011Assignee: AirDefense, Inc.Inventors: Michael T. Lynn, Scott Hrastar
-
Patent number: 7526808Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.Type: GrantFiled: March 8, 2006Date of Patent: April 28, 2009Assignee: AirDefense, Inc.Inventors: Michael T. Lynn, Scott Hrastar
-
Publication number: 20080201763Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.Type: ApplicationFiled: April 23, 2008Publication date: August 21, 2008Inventors: Michael T. Lynn, Scott Hrastar
-
Patent number: 7383577Abstract: A network security system includes a system data store capable of storing a variety of data associated with an encrypted computer network and communications transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding to communications transmitted over the encrypted communication network are received. One or more tests are applied to the received data to determine whether a particular communication represents a potential security violation. An alarm may be generated based upon the results of the applied test or tests.Type: GrantFiled: June 3, 2002Date of Patent: June 3, 2008Assignee: AirDefense, Inc.Inventors: Scott Hrastar, Michael T. Lynn, Edwin L. Sale, Dawn M. Hollingsworth
-
Publication number: 20080046951Abstract: A modem apparatus including means for communicating authentication information of a host along a first path to prompt a first validation for receiving data over the first path, and means for communicating identifying information of the modem apparatus and a request for network resource allocation over the first path to prompt a second validation after the first validation, the second validation enabling the reception of data over a second path that has a higher rate of transmission than the first path.Type: ApplicationFiled: October 19, 2007Publication date: February 21, 2008Applicant: SCIENTIFIC-ATLANTA, INC.Inventors: Scott Hrastar, Roy Bowoutt
-
Patent number: 7277404Abstract: A wireless network sensor includes a system data store capable of storing a variety of data associated with a wireless computer network and communication(s) transmitted thereon, a communication interface supporting at least reception of wireless communication(s) over the wireless computer network and a system processor. Data is extracted into one or more logical units or frames according to the protocol of the wireless network from signal received by the communication interface. This extracted data is inspected and stored. In some embodiments, the stored data is aggregated with information subsequently derived from further received signals. The stored data can be locally or remotely analyzed to generate a security rating which can be forwarded to either a user or a further data processing system.Type: GrantFiled: February 6, 2003Date of Patent: October 2, 2007Assignee: AirDefense, Inc.Inventors: Fred C. Tanzella, Scott Hrastar
-
Publication number: 20070189194Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting wireless communication over the wireless computer network and a system processor. Configuration data associated with an access point on a wireless computer network potentially compromised by an intruder is received. Information contained within and/or derived from the received configuration data is stored. Communication with the intruder is continued by emulating the identification characteristics of the potentially compromised access point. A channel change request is transmitted to the potentially compromised access point to reroute communication between the potentially compromised access point and authorized stations such that communications may continue on a different channel.Type: ApplicationFiled: May 8, 2006Publication date: August 16, 2007Applicant: AirDefense, Inc.Inventor: Scott Hrastar
-
Publication number: 20070192870Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.Type: ApplicationFiled: March 8, 2006Publication date: August 16, 2007Inventors: Michael Lynn, Scott Hrastar
-
Publication number: 20070094741Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.Type: ApplicationFiled: October 20, 2006Publication date: April 26, 2007Applicant: AIRDEFENSE, INC.Inventors: Michael Lynn, Scott Hrastar
-
Patent number: 7086089Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding communications transmitted over the wireless communication network are received. One or more tests are applied to the received data to determine whether a particular communication represents a potential security violation. An alarm may be generated based upon the results of the applied test or tests.Type: GrantFiled: June 3, 2002Date of Patent: August 1, 2006Assignee: AirDefense, Inc.Inventors: Scott Hrastar, Michael T. Lynn, Edwin L. Sale, Dawn M. Hollingsworth
-
Publication number: 20060123133Abstract: Systems and methods for detecting unauthorized wireless devices on a network. Systems and methods include determining when an unauthorized wireless device is communicating with a wired device and can signal an alarm responsive to such condition.Type: ApplicationFiled: January 27, 2006Publication date: June 8, 2006Inventor: Scott Hrastar
-
Patent number: 7058796Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.Type: GrantFiled: June 3, 2002Date of Patent: June 6, 2006Assignee: AirDefense, Inc.Inventors: Michael T. Lynn, Scott Hrastar
-
Patent number: 7042852Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting wireless communication over the wireless computer network and a system processor. Configuration data associated with an access point on a wireless computer network potentially compromised by an intruder is received. Information contained within and/or derived from the received configuration data is stored. Communication with the intruder is continued by emulating the identification characteristics of the potentially compromised access point. A channel change request is transmitted to the potentially compromised access point to reroute communication between the potentially compromised access point and authorized stations such that communications may continue on a different channel.Type: GrantFiled: June 3, 2002Date of Patent: May 9, 2006Assignee: AirDefense, Inc.Inventor: Scott Hrastar
-
Publication number: 20060085543Abstract: An agent for monitoring a wireless device is provided. The agent compares communications against policy guidelines and determines whether a violation of the policy guidelines has been committed, and communicates information about the violation to an authorized user.Type: ApplicationFiled: October 19, 2005Publication date: April 20, 2006Inventors: Scott Hrastar, Subra Viswanathan
-
Publication number: 20050174961Abstract: This application is directed to systems and methods for adaptive monitoring of a wireless network with bandwidth constraints. A data unit from a wireless node is received. When a bandwidth constraint is satisfied, the received data unit is buffered. When the bandwidth constraint is not satisfied, the received or buffered data unit is transmitted to a monitoring processor. In some instances, downsampling, data discard and data aggregation can occur during the buffering process.Type: ApplicationFiled: February 6, 2004Publication date: August 11, 2005Inventor: Scott Hrastar
-
Publication number: 20040203764Abstract: A node identification and location system includes a system data store and a system processor. The system processor performs the node location function through appropriate methods such as described herein. In one such method, an address associated with a wireless node is received. A query is transmitted to each device in a wireless network capable of receiving signals from the wireless node. Responses are received from one or more responding devices. The position of the wireless node is calculated based upon the received one or more responses. The calculated position is outputted.Type: ApplicationFiled: June 3, 2002Publication date: October 14, 2004Inventors: Scott Hrastar, Michael T. Lynn
-
Publication number: 20030236990Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding communications transmitted over the wireless communication network are received. One or more tests are applied to the received data to determine whether a particular communication represents a potential security violation. An alarm may be generated based upon the results of the applied test or tests.Type: ApplicationFiled: June 3, 2002Publication date: December 25, 2003Inventors: Scott Hrastar, Michael T. Lynn, Edwin L. Sale, Dawn M. Hollingsworth
-
Publication number: 20030233567Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.Type: ApplicationFiled: June 3, 2002Publication date: December 18, 2003Inventors: Michael T. Lynn, Scott Hrastar
-
Publication number: 20030219008Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting wireless communication over the wireless computer network and a system processor. Configuration data associated with an access point on a wireless computer network potentially compromised by an intruder is received. Information contained within and/or derived from the received configuration data is stored. Communication with the intruder is continued by emulating the identification characteristics of the potentially compromised access point. A channel change request is transmitted to the potentially compromised access point to reroute communication between the potentially compromised access point and authorized stations such that communications may continue on a different channel.Type: ApplicationFiled: June 3, 2002Publication date: November 27, 2003Inventor: Scott Hrastar
-
Publication number: 20030217283Abstract: A network security system includes a system data store capable of storing a variety of data associated with an encrypted computer network and communications transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding to communications transmitted over the encrypted communication network are received. One or more tests are applied to the received data to determine whether a particular communication represents a potential security violation. An alarm may be generated based upon the results of the applied test or tests.Type: ApplicationFiled: June 3, 2002Publication date: November 20, 2003Inventors: Scott Hrastar, Michael T. Lynn, Edwin L. Sale, Dawn M. Hollingsworth