METHOD AND SYSTEM FOR PREVENTION OF UNAUTHORIZED COMMUNICATION OVER 802.11W AND RELATED WIRELESS PROTOCOLS
First Claim
1. A method for disrupting undesirable wireless communication in wireless network, the method comprising:
- providing one or more sniffer devices to monitor wireless communications in a wireless network;
detecting a wireless connection established between an access point device and a client device using the one or more sniffer devices, the wireless connection being configured for not being disconnected upon receiving a spoofed disconnection request transmitted from a wireless device other than the access point device and the client device; and
disrupting the wireless connection established between the access point device and the client device by transmitting one or more spoofed connection requests from at least one of the one or more sniffer devices.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for disrupting undesirable wireless communication in wireless network is provided. The method includes providing one or more sniffer devices to monitor wireless communications in a wireless network and detecting a wireless connection established between an access point device and a client device using the one or more sniffer devices. Preferably, the wireless connection is configured for not being disconnected upon receiving a spoofed disconnection request transmitted from a wireless device other than the access point device and the client device. The method also includes disrupting the wireless connection established between the access point device and the client device by transmitting one or more spoofed connection requests from at least one of the one or more sniffer devices.
-
Citations
26 Claims
-
1. A method for disrupting undesirable wireless communication in wireless network, the method comprising:
-
providing one or more sniffer devices to monitor wireless communications in a wireless network; detecting a wireless connection established between an access point device and a client device using the one or more sniffer devices, the wireless connection being configured for not being disconnected upon receiving a spoofed disconnection request transmitted from a wireless device other than the access point device and the client device; and disrupting the wireless connection established between the access point device and the client device by transmitting one or more spoofed connection requests from at least one of the one or more sniffer devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for disrupting undesirable wireless communication in wireless network, the method comprising:
-
providing one or more sniffer devices spatially disposed over a geographic region associated with the wireless network to monitor wireless communications in the wireless network; receiving information associated with an undesirable wireless link between an access point device and a client device at at least one of the one or more sniffer devices, the information including wireless MAC addresses of the access point device and the client device, respectively; and driving the undesirable wireless link between the access point device and the client device in a state of deadlock by transmitting one or more spoofed connection requests from at least one of the one or more sniffer devices while the undesirable wireless link is in a state of being connected, each of the one or more spoofed connection requests including the wireless MAC address of the client device as originator identity and the wireless MAC address of the access point device as destination identity. - View Dependent Claims (22, 23, 24, 25)
-
-
26. An apparatus for disrupting undesirable wireless communication, the apparatus comprising:
-
a memory module comprising one or more computer memory devices, the memory module storing; one or more first codes for receiving information associated with a wireless connection established between an access point device and a client device in a wireless network, the information including wireless MAC addresses of the access point device and the client device, respectively; one or more second codes for receiving instruction for disrupting the wireless connection established between the access point device and the client device; and one or more third codes for formatting one or more connection requests, each of the one or more connection requests including the wireless MAC address of the client device as originator identity and the wireless MAC address of the access point device as destination identity; a processor module comprising one or more micro processing devices, the processor module being for executing at least the first one or more codes, the second one or more codes, and the third one or more codes; and a transmitter module including one or more wireless communication transmitting interfaces for transmitting the one or more connection requests to disrupt the wireless connection established between the access point device and the client device.
-
Specification