Validity Report
Basic Report
US7409715B2 — Mechanism for detection of attacks based on impersonation in a wireless network
Priority Date: 2003-12-10, Publication Date: 2008-08-05, Current Assignee: WSOU Investments LLCReport Generated: 2024-01-16

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP1518372A2●●●●●INTEGRATED WIRELESS DISTRIBUTION AND MESH BACKHAUL NETWORKSGRANT2005-03-302002-06-28GreatBelAir Networks IncBelAir Networks Inc
EP1529363A1●●●●●MOBILE AD-HOC NETWORK WITH INTRUSION DETECTION FEATURES AND RELATED METHODSGRANT2005-05-112002-08-12GreatHarris CorpHarris Corp
EP1535158A2●●●●●MOBILE AD-HOC NETWORK WITH INTRUSION DETECTION FEATURES AND RELATED METHODSGRANT2005-06-012002-08-12GreatHarris CorpHarris Corp
EP1058420B1●●●●●Wireless network with a hidden nodeGRANT2011-07-271999-05-12GreatPhilips Intellectual Property and Standards GmbH, Koninklijke Philips Electronics NVPhilips Intellectual Property and Standards GmbH, Koninklijke Philips NV
EP1567926B1●●●●●METHOD  SYSTEM AND COMPUTER SOFTWARE PRODUCT FOR RESPONDING TO A COMPUTER INTRUSIONGRANT2006-09-272002-12-05GreatInternational Business Machines CorpInternational Business Machines Corp
US20120222087A1●●●●●APPLICATION BASED INTRUSION DETECTIONAPPLICATION2012-08-302003-06-10GreatInternational Business Machines CorpInternational Business Machines Corp
EP1535414A2●●●●●WIRELESS LOCAL ON METROPOLITAN AREA NETWORK WITH INTRUSION DETECTION FEATURES AND RELATED METHODSGRANT2005-06-012002-08-12GreatHarris CorpHarris Corp
EP1049294B1●●●●●Network with multiple network clusters for wireless communication of packetsGRANT2005-12-211999-04-28GreatPhilips Intellectual Property and Standards GmbH, Koninklijke Philips Electronics NVPhilips Intellectual Property and Standards GmbH, Koninklijke Philips NV
EP1530867A1●●●●●WIRELESS LOCAL OR METROPOLITAN AREA NETWORK WITH INTRUSION DETECTION FEATURES AND RELATED METHODSGRANT2005-05-182002-08-12GreatHarris CorpHarris Corp
US20030084322A1●●●●●System and method of an OS-integrated intrusion detection and anti-virus systemAPPLICATION2003-05-012001-10-31GreatHewlett Packard CoHewlett Packard Development Co LP
EP1470691A2●●●●●INTEGRATED NETWORK INTRUSION DETECTIONGRANT2004-10-272002-02-01GreatIntel CorpIntel Corp
EP0772931B1●●●●●METHOD AND APPARATUS FOR CONNECTING A WIRELESS LAN TO A WIRED LANGRANT1998-03-251994-07-29GreatInternational Business Machines CorpInternational Business Machines Corp
EP1195948B1●●●●●Wireless mobile network for locally routing multimedia contentGRANT2006-03-222000-10-06GreatMitsubishi Electric CorpMitsubishi Electric Corp
EP0695059A1●●●●●Wireless lan to wired lan bridgeGRANT1996-01-311994-07-29GreatInternational Business Machines CorpInternational Business Machines Corp
US20030084319A1●●●●●Node  method and computer readable medium for inserting an intrusion prevention system into a network stackAPPLICATION2003-05-012001-10-31GreatHewlett Packard CoHewlett Packard Development Co LP
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityAVERAGE
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
532
Recommended Classes
133
Government Assigned Classes
2
CPC
Title
Score
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)●●●●●
H04W12/08Access security●●●●●
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)●●●●●
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)●●●●●
H04L63/1416Event detection  e.g. attack signature detection●●●●●
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment●●●●●
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)●●●●●
H04W12/12Fraud detection●●●●●
H04L1/00Arrangements for detecting or preventing errors in the information received | correcting synchronisation | (ref: H04L7/00)| | | for digital computers | (ref: G06F11/00)|  | arrangements in the transmission path | (ref: H04B)●●●●●
H04L43/00Arrangements for monitoring or testing packet switching networks | networking arrangements or communications protocols for supporting networked applications for tracking the activity of the application user | (ref: H04L67/22)| | monitoring of computing systems | (ref: G06F11/30)| | monitoring of computer activity | (ref: G06F11/34)●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.