Detection of suspect wireless access points

A wireless access point and access point technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as malicious attacks and man-in-the-middle attacks

Active Publication Date: 2014-06-25
WITHSECURE CORP (A K A WITHSECURE OYJ)
View PDF5 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While there are numerous solutions to the problem of detecting suspicious wireless access points in a corporate infrastructure, there are no publicly known solutions to the problem of detecting suspicious or rogue wirel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection of suspect wireless access points
  • Detection of suspect wireless access points
  • Detection of suspect wireless access points

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to at least partially overcome the above-mentioned problems and difficulties, it is proposed herein to identify wireless access points that provide access services to client devices by using external wireless access point characteristics available to client devices. Specifically, these problems and difficulties can be mitigated by accumulating or collecting wireless access point identity information or reputation information from multiple client devices in a reputation system, which can include one or more networked backends server. The system may respond to a client device's reputation request regarding available wireless access points by sending the client device trust or reputation indication information associated with the available wireless access points. A trust or reputation indication may include or represent data indicative of a trustworthiness or reputation status of a wireless access point, or information associated with a wireless access point.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to aspects of the present invention there are provided methods and apparatus for detecting a suspect wireless access point in a communication network including a plurality of wireless access points (110), (114) providing access services to client devices (106), (112). Identity information associated with the wireless access points is collected from a multiplicity of client devices (106), (112); (A1). A reputation request is received from a client device (A2), the request including identity information of an available wireless access point (A3). The received identity information is compared with the collected identity information (A4) for determining an indication of trust of the available wireless access point (A5). The indication of trust of the available wireless access point is transmitted to the client device (A6). The wireless access points may include a cellular wireless access point or base station, wireless access point, a Wi-Fi access point, or a femto-cell access point.

Description

technical field [0001] The present invention relates to methods and apparatus for determining the identity of a wireless access point providing access services to client devices. In particular, the present invention relates to methods and apparatus for performing suspicious wireless access point detection. Background technique [0002] Criminals such as hackers are keen to exploit wireless access points so that they can maliciously steal sensitive information from or defraud client devices connected to the wireless access point. Some ways to exploit a wireless access point is to pretend to be the wireless access point and attack client devices connected to the "fake" wireless access point. Some of the most common attacks on client devices used by criminals are so-called "phishing" or "man-in-the-middle" attacks. [0003] A client device may include or represent any device used for wireless communication. Examples of client devices that may be used in certain embodiments o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W12/10H04W88/08H04L29/06
CPCH04L63/14H04L63/126H04W12/10H04W12/12H04W88/08H04W12/104H04W12/108H04W12/122
Inventor 麦卡·斯塔博格杨诺·尼美拉
Owner WITHSECURE CORP (A K A WITHSECURE OYJ)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products