1
Scott E Hrastar: Systems and methods for automated network policy exception detection and correction. AirDefense, Clements Walker, Lawrence A Baratta Jr, Christopher L Bernard, January 22, 2008: US07322044 (165 worldwide citation)


The present invention is directed to systems and methods for automated detection of one or more wireless network policy violations and/or enforcement of such policies. A wireless network policy violation is detected. Associated with the detected violation are one or more wireless network attributes. ...


2
Scott E Hrastar, Subra Viswanathan: Personal wireless monitoring agent. AirDefense, Clements Bernard PLLC, Lawrence A Baratta Jr, Christopher L Bernard, June 5, 2012: US08196199 (114 worldwide citation)


An agent for monitoring a wireless device is provided. The agent compares communications against policy guidelines and determines whether a violation of the policy guidelines has been committed, and communicates information about the violation to an authorized user.


3
Scott Hrastar, Michael T Lynn, Edwin L Sale, Dawn M Hollingsworth: Method and system for encrypted network management and intrusion detection. AirDefense, Clements Bernard Miller, Lawrence A Baratta Jr, Christopher L Bernard, June 3, 2008: US07383577 (77 worldwide citation)


A network security system includes a system data store capable of storing a variety of data associated with an encrypted computer network and communications transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding ...


4
Scott Hrastar, Michael T Lynn, Edwin L Sale, Dawn M Hollingsworth: Systems and methods for network security. AirDefense, Fish & Richardson P C, August 1, 2006: US07086089 (60 worldwide citation)


A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting communication over a communication channel and a system processor. Data corresponding co ...


5
Scott Hrastar: System and method for wireless LAN dynamic channel change with honeypot trap. AirDefense, Jones Day, May 9, 2006: US07042852 (45 worldwide citation)


A network security system includes a system data store capable of storing a variety of data associated with a wireless computer network and communication transmitted thereon, a communication interface supporting wireless communication over the wireless computer network and a system processor. Config ...


6
Fred C Tanzella, Scott Hrastar: System and method for sensing wireless LAN activity. AirDefense, Clements Walker, Lawrence A Baratta Jr, Christopher L Bernard, October 2, 2007: US07277404 (43 worldwide citation)


A wireless network sensor includes a system data store capable of storing a variety of data associated with a wireless computer network and communication(s) transmitted thereon, a communication interface supporting at least reception of wireless communication(s) over the wireless computer network an ...


7
Scott E Hrastar: Systems and methods for adaptively scanning for wireless communications. AirDefense, Clements Bernard Miller, Lawrence A Baratta Jr, Christopher L Bernard, April 15, 2008: US07359676 (42 worldwide citation)


This application is directed to systems and methods for adaptively scanning for wireless communications. Scan data associated with scanning one or more wireless network channels based upon a scan pattern is received. Each wireless channel has a designation of primary or secondary with at least one c ...


8
Michael T Lynn, Scott Hrastar: Method and system for actively defending a wireless LAN against attacks. AirDefense, Jones Day, June 6, 2006: US07058796 (42 worldwide citation)


A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusio ...


9
Hrastar Scott E: Systems and methods for securing wireless computer networks. Airdefense, KERVEN David S, November 4, 2004: WO/2004/095192 (39 worldwide citation)


This application is directed to systems and methods for securing a wireless network site. In some implementations, the system can survey a wireless network site by contacting a wireless receiver and then retrieving and coordinating a client identifier, RF signal characteristics, and coordinate infor ...


10
Scott E Hrastar: Systems and methods for wireless network site survey. AirDefense, Clements Bernard PLLC, Lawrence A Baratta Jr, April 21, 2009: US07522908 (30 worldwide citation)


This application is directed to systems and methods for surveying a wireless network site. A wireless network receiver or proxy is contacted. One or more client identifiers are received from the contacted receiver or proxy. Coordinate information is also received from the contacted receiver or proxy ...



Click the thumbnails below to visualize the patent trend.