Patents by Inventor Scott Hrastar

Scott Hrastar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8060939
    Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.
    Type: Grant
    Filed: April 23, 2008
    Date of Patent: November 15, 2011
    Assignee: AirDefense, Inc.
    Inventors: Michael T. Lynn, Scott Hrastar
  • Patent number: 7526808
    Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.
    Type: Grant
    Filed: March 8, 2006
    Date of Patent: April 28, 2009
    Assignee: AirDefense, Inc.
    Inventors: Michael T. Lynn, Scott Hrastar
  • Publication number: 20080201763
    Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.
    Type: Application
    Filed: April 23, 2008
    Publication date: August 21, 2008
    Inventors: Michael T. Lynn, Scott Hrastar
  • Patent number: 7383577
    Abstract: A network security system includes a system data store capable of storing a variety of data associated with an encrypted computer network and communications transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding to communications transmitted over the encrypted communication network are received. One or more tests are applied to the received data to determine whether a particular communication represents a potential security violation. An alarm may be generated based upon the results of the applied test or tests.
    Type: Grant
    Filed: June 3, 2002
    Date of Patent: June 3, 2008
    Assignee: AirDefense, Inc.
    Inventors: Scott Hrastar, Michael T. Lynn, Edwin L. Sale, Dawn M. Hollingsworth
  • Publication number: 20080046951
    Abstract: A modem apparatus including means for communicating authentication information of a host along a first path to prompt a first validation for receiving data over the first path, and means for communicating identifying information of the modem apparatus and a request for network resource allocation over the first path to prompt a second validation after the first validation, the second validation enabling the reception of data over a second path that has a higher rate of transmission than the first path.
    Type: Application
    Filed: October 19, 2007
    Publication date: February 21, 2008
    Applicant: SCIENTIFIC-ATLANTA, INC.
    Inventors: Scott Hrastar, Roy Bowoutt
  • Patent number: 7277404
    Abstract: A wireless network sensor includes a system data store capable of storing a variety of data associated with a wireless computer network and communication(s) transmitted thereon, a communication interface supporting at least reception of wireless communication(s) over the wireless computer network and a system processor. Data is extracted into one or more logical units or frames according to the protocol of the wireless network from signal received by the communication interface. This extracted data is inspected and stored. In some embodiments, the stored data is aggregated with information subsequently derived from further received signals. The stored data can be locally or remotely analyzed to generate a security rating which can be forwarded to either a user or a further data processing system.
    Type: Grant
    Filed: February 6, 2003
    Date of Patent: October 2, 2007
    Assignee: AirDefense, Inc.
    Inventors: Fred C. Tanzella, Scott Hrastar
  • Publication number: 20070189194
    Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting wireless communication over the wireless computer network and a system processor. Configuration data associated with an access point on a wireless computer network potentially compromised by an intruder is received. Information contained within and/or derived from the received configuration data is stored. Communication with the intruder is continued by emulating the identification characteristics of the potentially compromised access point. A channel change request is transmitted to the potentially compromised access point to reroute communication between the potentially compromised access point and authorized stations such that communications may continue on a different channel.
    Type: Application
    Filed: May 8, 2006
    Publication date: August 16, 2007
    Applicant: AirDefense, Inc.
    Inventor: Scott Hrastar
  • Publication number: 20070192870
    Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.
    Type: Application
    Filed: March 8, 2006
    Publication date: August 16, 2007
    Inventors: Michael Lynn, Scott Hrastar
  • Publication number: 20070094741
    Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.
    Type: Application
    Filed: October 20, 2006
    Publication date: April 26, 2007
    Applicant: AIRDEFENSE, INC.
    Inventors: Michael Lynn, Scott Hrastar
  • Patent number: 7086089
    Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding communications transmitted over the wireless communication network are received. One or more tests are applied to the received data to determine whether a particular communication represents a potential security violation. An alarm may be generated based upon the results of the applied test or tests.
    Type: Grant
    Filed: June 3, 2002
    Date of Patent: August 1, 2006
    Assignee: AirDefense, Inc.
    Inventors: Scott Hrastar, Michael T. Lynn, Edwin L. Sale, Dawn M. Hollingsworth
  • Publication number: 20060123133
    Abstract: Systems and methods for detecting unauthorized wireless devices on a network. Systems and methods include determining when an unauthorized wireless device is communicating with a wired device and can signal an alarm responsive to such condition.
    Type: Application
    Filed: January 27, 2006
    Publication date: June 8, 2006
    Inventor: Scott Hrastar
  • Patent number: 7058796
    Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.
    Type: Grant
    Filed: June 3, 2002
    Date of Patent: June 6, 2006
    Assignee: AirDefense, Inc.
    Inventors: Michael T. Lynn, Scott Hrastar
  • Patent number: 7042852
    Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting wireless communication over the wireless computer network and a system processor. Configuration data associated with an access point on a wireless computer network potentially compromised by an intruder is received. Information contained within and/or derived from the received configuration data is stored. Communication with the intruder is continued by emulating the identification characteristics of the potentially compromised access point. A channel change request is transmitted to the potentially compromised access point to reroute communication between the potentially compromised access point and authorized stations such that communications may continue on a different channel.
    Type: Grant
    Filed: June 3, 2002
    Date of Patent: May 9, 2006
    Assignee: AirDefense, Inc.
    Inventor: Scott Hrastar
  • Publication number: 20060085543
    Abstract: An agent for monitoring a wireless device is provided. The agent compares communications against policy guidelines and determines whether a violation of the policy guidelines has been committed, and communicates information about the violation to an authorized user.
    Type: Application
    Filed: October 19, 2005
    Publication date: April 20, 2006
    Inventors: Scott Hrastar, Subra Viswanathan
  • Publication number: 20050174961
    Abstract: This application is directed to systems and methods for adaptive monitoring of a wireless network with bandwidth constraints. A data unit from a wireless node is received. When a bandwidth constraint is satisfied, the received data unit is buffered. When the bandwidth constraint is not satisfied, the received or buffered data unit is transmitted to a monitoring processor. In some instances, downsampling, data discard and data aggregation can occur during the buffering process.
    Type: Application
    Filed: February 6, 2004
    Publication date: August 11, 2005
    Inventor: Scott Hrastar
  • Publication number: 20040203764
    Abstract: A node identification and location system includes a system data store and a system processor. The system processor performs the node location function through appropriate methods such as described herein. In one such method, an address associated with a wireless node is received. A query is transmitted to each device in a wireless network capable of receiving signals from the wireless node. Responses are received from one or more responding devices. The position of the wireless node is calculated based upon the received one or more responses. The calculated position is outputted.
    Type: Application
    Filed: June 3, 2002
    Publication date: October 14, 2004
    Inventors: Scott Hrastar, Michael T. Lynn
  • Publication number: 20030236990
    Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding communications transmitted over the wireless communication network are received. One or more tests are applied to the received data to determine whether a particular communication represents a potential security violation. An alarm may be generated based upon the results of the applied test or tests.
    Type: Application
    Filed: June 3, 2002
    Publication date: December 25, 2003
    Inventors: Scott Hrastar, Michael T. Lynn, Edwin L. Sale, Dawn M. Hollingsworth
  • Publication number: 20030233567
    Abstract: A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point.
    Type: Application
    Filed: June 3, 2002
    Publication date: December 18, 2003
    Inventors: Michael T. Lynn, Scott Hrastar
  • Publication number: 20030219008
    Abstract: A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting wireless communication over the wireless computer network and a system processor. Configuration data associated with an access point on a wireless computer network potentially compromised by an intruder is received. Information contained within and/or derived from the received configuration data is stored. Communication with the intruder is continued by emulating the identification characteristics of the potentially compromised access point. A channel change request is transmitted to the potentially compromised access point to reroute communication between the potentially compromised access point and authorized stations such that communications may continue on a different channel.
    Type: Application
    Filed: June 3, 2002
    Publication date: November 27, 2003
    Inventor: Scott Hrastar
  • Publication number: 20030217283
    Abstract: A network security system includes a system data store capable of storing a variety of data associated with an encrypted computer network and communications transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding to communications transmitted over the encrypted communication network are received. One or more tests are applied to the received data to determine whether a particular communication represents a potential security violation. An alarm may be generated based upon the results of the applied test or tests.
    Type: Application
    Filed: June 3, 2002
    Publication date: November 20, 2003
    Inventors: Scott Hrastar, Michael T. Lynn, Edwin L. Sale, Dawn M. Hollingsworth