1.
    发明专利
    未知

    公开(公告)号:AT513403T

    公开(公告)日:2011-07-15

    申请号:AT04794759

    申请日:2004-10-12

    Applicant: CISCO TECH INC

    Abstract: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods (e.g. user names and passwords). The shared secret, referred to in this embodiment as the protected access credential may be advantageously used to mutually authenticate a server and a peer upon securing a tunnel for communication via a network. The present system and method disclosed and claimed herein, in one aspect thereof, comprises the steps of 1) providing a communication implementation between a first and a second party; 2) provisioning a secure credential between the first and the second party; and 3) establishing a secure tunnel between the first and the second party using the secure credential.

    System and method for provisioning and authenticating via a network

    公开(公告)号:AU2004297933B2

    公开(公告)日:2010-01-07

    申请号:AU2004297933

    申请日:2004-10-12

    Applicant: CISCO TECH INC

    Abstract: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods (e.g. user names and passwords). The shared secret, referred to in this embodiment as the protected access credential may be advantageously used to mutually authenticate a server and a peer upon securing a tunnel for communication via a network. The present system and method disclosed and claimed herein, in one aspect thereof, comprises the steps of 1) providing a communication implementation between a first and a second party; 2) provisioning a secure credential between the first and the second party; and 3) establishing a secure tunnel between the first and the second party using the secure credential.

    Method and apparatus to inline encryption and decryption for a wireless station

    公开(公告)号:AU2004297923A1

    公开(公告)日:2005-06-23

    申请号:AU2004297923

    申请日:2004-07-19

    Applicant: CISCO TECH INC

    Abstract: A method of wirelessly transmitting or receiving a packet of information, and an apparatus to wirelessly transmit or receive a packet of information. In the case of transmitting, the method includes streaming a data element, including at least some of the contents of the packet, over a network link during transmit time, including encrypting the data element during the streaming in real time prior to the transfer over the network link. In the case of receiving, the method includes streaming a data element, including at least some of the contents of the received packet, over a network link during receive time, including decrypting the data element during the streaming in real time after to the transfer over the network link. The transmitting or receiving is by a station of a wireless network and the streaming is to or from the station from or to a network device coupled to the station by the network link.

    NETWORK CLIENT VALIDATION OF NETWORK MANAGEMENT FRAMES
    5.
    发明申请
    NETWORK CLIENT VALIDATION OF NETWORK MANAGEMENT FRAMES 审中-公开
    网络客户端验证网络管理框架

    公开(公告)号:WO2007111721A9

    公开(公告)日:2008-10-23

    申请号:PCT/US2006061573

    申请日:2006-12-04

    Applicant: CISCO TECH INC

    Abstract: Methods and systems for use in a wireless client (110) that includes one or more wireless network interfaces for communicating with at least one access point (130) wherein the method enables the wireless client (110) to validate the authenticity and integrity of received management frames, The method includes receiving a protected wireless network management frame from an access point (130) verifying a message integrity check (MIC) appended to the protected wireless network management frame. One or more security policies are then conditionally applied based on a failure to verify the MIC.

    Abstract translation: 一种在无线客户端(110)中使用的方法和系统,其包括用于与至少一个接入点(130)通信的一个或多个无线网络接口,其中所述方法使无线客户端(110)能够验证所接收的管理的真实性和完整性 该方法包括从验证附加到受保护的无线网络管理帧的消息完整性检查(MIC)的接入点(130)接收受保护的无线网络管理帧。 然后基于验证MIC的故障有条件地应用一个或多个安全策略。

    NETWORK CLIENT VALIDATION OF NETWORK MANAGEMENT FRAMES
    7.
    发明申请
    NETWORK CLIENT VALIDATION OF NETWORK MANAGEMENT FRAMES 审中-公开
    网络客户端验证网络管理框架

    公开(公告)号:WO2007111721A2

    公开(公告)日:2007-10-04

    申请号:PCT/US2006061573

    申请日:2006-12-04

    Applicant: CISCO TECH INC

    Abstract: Methods and systems for use in a wireless client that includes one or more wireless network interfaces for communicating with at least one access point wherein the method enables the wireless client to validate the authenticity and integrity of received management frames. The method includes receiving a protected wireless network management frame from an access point verifying a message integrity check (MIC) appended to the protected wireless network management frame. One or more security policies are then conditionally applied based on a failure to verify the MIC.

    Abstract translation: 一种用于无线客户端的方法和系统,包括用于与至少一个接入点进行通信的一个或多个无线网络接口,其中所述方法使无线客户端能够验证所接收的管理帧的真实性和完整性。 该方法包括从验证附加到受保护的无线网络管理帧的消息完整性检查(MIC)的接入点接收受保护的无线网络管理帧。 然后基于验证MIC的故障有条件地应用一个或多个安全策略。

    LOCATION BASED TECHNIQUE FOR DETECTING DEVICES EMPLOYING MULTIPLE ADDRESSES
    8.
    发明申请
    LOCATION BASED TECHNIQUE FOR DETECTING DEVICES EMPLOYING MULTIPLE ADDRESSES 审中-公开
    用于检测使用多个地址的设备的基于位置的技术

    公开(公告)号:WO2015021344A3

    公开(公告)日:2015-04-09

    申请号:PCT/US2014050260

    申请日:2014-08-08

    Applicant: CISCO TECH INC

    Abstract: In an example embodiment, there is described herein a location based detection technique that determines whether multiple requests from different addresses, such as a Layer 2 MAC (Media Access Control) address and/or layer 3 IP (Internet Protocol) address are being sent form a single device. In particular embodiments, if the device sends more than a predefined threshold number of requests, those requests can be ignored and/or denied.

    Abstract translation: 在示例实施例中,这里描述了基于位置的检测技术,其确定是否正在从诸如第2层MAC(媒体访问控制)地址和/或第3层IP(因特网协议)地址的不同地址的多个请求形式 单一设备。 在特定实施例中,如果设备发送超过预定义的阈值数量的请求,则可以忽略和/或拒绝那些请求。

    CONCIERGE REGISTRY AUTHENTICATION SERVICE

    公开(公告)号:IN2862DEN2012A

    公开(公告)日:2015-07-24

    申请号:IN2862DEN2012

    申请日:2012-04-03

    Applicant: CISCO TECH INC

    Abstract: In an example embodiment described herein is an apparatus comprising a transceiver configured to send and receive data, and logic coupled to the transceiver. The logic is configured to determine from a beacon received by the wireless transceiver whether an associated wireless device sending the beacon supports a protocol for advertising available services from the associated wireless device. The logic is configured to send a request for available services from the associated wireless device via the wireless transceiver responsive to determining the associated wireless device supports the protocol. The logic is configured to receive a response to the request via the wireless transceiver, the response comprising a signature. The logic is configured to validate the response by confirming the signature comprises network data cryptographically bound with service data.

Patent Agency Ranking