Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for protecting network management frames

A management frame and network technology, applied in the field of systems and methods for protecting network management frames, can solve problems such as action management frames affecting service quality and other capabilities, session interruption, and network session destruction.

Inactive Publication Date: 2006-11-15
CISCO TECH INC
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, such an attack could result in a session being dropped by an impostor masquerading as a legitimate user sending a disassociate request that subsequently disconnects the trusted user's session
[0005] In addition, network sessions may be destroyed if Action Management frames are forged, affecting quality of service and other capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for protecting network management frames
  • System and method for protecting network management frames

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The following include definitions of selected terms as used throughout this disclosure. These definitions include examples of various embodiments and / or component forms that fall within the scope of the terms and can be used for implementation. Of course, these examples are not intended to be limiting, and other embodiments may be implemented. The singular and plural forms of all terms fall within the following respective meanings:

[0016] As used herein, "computer-readable medium" refers to any medium that participates in providing, directly or indirectly, signals, instructions and / or data to one or more processors for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media may include, for example, optical or magnetic disks. Volatile media may include dynamic memory. Common forms of computer readable media include, for example, floppy disks, flexible disks, hard dis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

System architecture and corresponding method for securing the transmission of management frame packets on a network (e.g. IEEE 802.11) is provided. Once a trust relationship is created between a transmitter and a receiver on the network such that the transmitter is authorized to communicate over the network, a key and corresponding message integrity check may be generated in order to sign management frame communications via the network. The message integrity check and a replay protection value may be transmitted with the management frame packet. Upon receipt, the message integrity check and replay protection value are authenticated to verify permitted transmission of the management frame packet.

Description

Background technique [0001] The IEEE (Institute of Electrical and Electronics Engineers) 802.11 standard provides guidelines for allowing users to wirelessly connect to a network and use basic services provided therein. The need for secure and controlled access has become increasingly clear in recent years, given the large volumes of sensitive information transmitted on networks today. [0002] Efforts to secure and control access have traditionally been aimed at protecting the content of transmitted data, not at preventing session interruptions. In other words, existing efforts have only been directed at protecting the sensitivity of the content of the transmitted data, not at protecting the transmission of management frame packets that control session integrity and quality. [0003] Of course, network access can be restricted in many ways, including user logins and passwords, network identification with unique identification numbers embedded in network cards, callback schem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/28H04L12/56
CPCH04L41/00H04L63/08H04L63/083H04L63/123H04L63/126H04W12/12H04W84/12H04W12/106H04W12/069
Inventor 布哈瓦尼·萨泊塔南希·卡姆温恩特
Owner CISCO TECH INC