Methods and Systems For Wired Equivalent Privacy and Wi-Fi Protected Access Protection
First Claim
Patent Images
1. A method of disrupting attempts to break encryption or authentication associated with a wireless network, the method comprising the steps of:
- receiving a condition while monitoring the wireless network; and
transmitting random wired equivalent privacy encrypted frames on the wireless network responsive to the condition in the monitoring step, the random wired equivalent privacy encrypted frames are operable to confuse unauthorized devices attempting to capture wired equivalent privacy encrypted frames to break the wired equivalent privacy key.
9 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for disrupting potential attacks on a wireless network through transmission of random data.
-
Citations
28 Claims
-
1. A method of disrupting attempts to break encryption or authentication associated with a wireless network, the method comprising the steps of:
-
receiving a condition while monitoring the wireless network; and transmitting random wired equivalent privacy encrypted frames on the wireless network responsive to the condition in the monitoring step, the random wired equivalent privacy encrypted frames are operable to confuse unauthorized devices attempting to capture wired equivalent privacy encrypted frames to break the wired equivalent privacy key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of thwarting an attack against authentication on a Wi-Fi protected access wireless network, the method comprising the steps of:
-
monitoring the wireless network; and transmitting random challenge-response frames on the wireless network responsive to a condition in the monitoring step, the random challenge-response frames are operable to thwart attacks against authentication by forcing a rotation of the keys thereby preventing sniffing attacks by a rogue device. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method of using one or more wireless sensors as active transmitting devices to disrupt a reconnaissance attack, the method comprising the steps of:
-
monitoring the wireless network to collect wireless traffic data, using any of wireless sensors, wireless access points, wireless client devices configured with a software agent, and combinations thereof; detecting active reconnaissance probe requests based upon collected wireless traffic data; and transmitting random probe requests in response to detection of active reconnaissance probe requests, the random probe requests are operable to thwart a rogue device from performing the reconnaissance attack. - View Dependent Claims (17)
-
-
18. A method of using one or more wireless sensors to disrupt denial-of-service, insertion, and masquerade attacks on a wireless network, the method comprising the steps of:
-
monitoring the wireless network, the monitoring is performed by any of wireless sensors, wireless access points, wireless client devices configured with a software agent, and combinations thereof; and transmitting random probe requests in response to an unauthorized frame transmission, the random probe request is operable to create errors in the unauthorized frame transmission such that a device discards the unauthorized frame transmission. - View Dependent Claims (19, 20, 21)
-
-
22. A method to disrupt a packet on a wireless network, the method comprising:
-
monitoring one or more bits of a wireless frame, the one or more bits comprise the source address, the destination address, and the frame type; determining if the wireless frame is unauthorized or an attack frame; and if the wireless frame is unauthorized or an attack frame, injecting noise in the frame body of the wireless frame such that a recipient of the wireless frame discards the wireless frame. - View Dependent Claims (23)
-
-
24. A method of disrupting attempts to break encryption or authentication associated with a wireless network, the method comprising the steps of:
-
receiving a protection request from a monitoring device, the protection request comprising an instruction to protect a wireless network from any of a plurality of wireless attacks; transmitting random protection frames on the wireless network based upon the protection request, the random protection frames being operable to confuse unauthorized devices attempting to collect information from the wireless network. - View Dependent Claims (25, 26, 27, 28)
-
Specification