×

Methods and systems for wired equivalent privacy and Wi-Fi protected access protection

  • US 8,281,392 B2
  • Filed: 08/11/2006
  • Issued: 10/02/2012
  • Est. Priority Date: 08/11/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method of disrupting attempts to break encryption or authentication associated with a wireless network, the method comprising the steps of:

  • monitoring the wireless network to detect weak initialization vectors, wherein the weak initialization vectors are weak due to reuse over a specified time period on the wireless network;

    monitoring the wireless network to detect known wired equivalent privacy keys being used; and

    transmitting random wired equivalent privacy encrypted frames on the wireless network responsive to the monitoring steps, the random wired equivalent privacy encrypted frames are operable to confuse unauthorized devices attempting to capture wired equivalent privacy encrypted frames to break the wired equivalent privacy key, wherein the random wired equivalent privacy encrypted frames each comprise random data encrypted with a different wired equivalent privacy key and random initialization vectors generated at a rate derived in response to monitored traffic, and wherein the random initialization vectors are different from monitored initialization vectors but logically correct and in sequence, wherein the random initialization vectors are invalid packets and are configured to pass validity checks while preventing an attacker to filter out the invalid packets thereby preventing decryption of the wired equivalent privacy key;

    wherein the monitoring step is performed by a plurality of distributed monitoring devices, the plurality of monitoring devices are connected to one or more servers; and

    wherein the servers are operable to receive and correlate data, events, and statistics from the distributed monitoring devices and to direct the distributed monitoring devices to perform the transmitting step responsive to any of a periodic interval, an intrusion alarm, a manual request, and an automatic request based on policy.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×