18521852. IDENTIFYING TRUSTED SERVICE SET IDENTIFIERS FOR WIRELESS NETWORKS simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

IDENTIFYING TRUSTED SERVICE SET IDENTIFIERS FOR WIRELESS NETWORKS

Organization Name

Cisco Technology, Inc.

Inventor(s)

Jay K. Johnston of Raleigh NC (US)

Jerome Henry of Pittsboro NC (US)

David C. White, Jr. of St. Petersburg FL (US)

Magnus Mortensen of Cary NC (US)

John M. Swartz of Lithia FL (US)

Robert E. Barton of Richmond (CA)

IDENTIFYING TRUSTED SERVICE SET IDENTIFIERS FOR WIRELESS NETWORKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18521852 titled 'IDENTIFYING TRUSTED SERVICE SET IDENTIFIERS FOR WIRELESS NETWORKS

Simplified Explanation

The patent application describes techniques for identifying a trusted SSID for a wireless network by comparing visual representations of different SSIDs. The process involves receiving network messages from different access points, determining visual similarity between SSIDs, and designating suspicious SSIDs based on this comparison.

  • The patent application focuses on identifying trusted SSIDs for wireless networks.
  • Visual representations of SSIDs are compared to determine similarity.
  • Suspicious SSIDs are designated based on the visual comparison.

Potential Applications

This technology could be applied in:

  • Wireless network security
  • Preventing unauthorized access to networks
  • Enhancing user trust in connecting to wireless networks

Problems Solved

  • Identifying trusted SSIDs
  • Preventing connection to potentially malicious networks
  • Improving network security

Benefits

  • Enhanced network security
  • Increased user confidence in connecting to wireless networks
  • Protection against potential cyber threats

Potential Commercial Applications

"Enhancing Wireless Network Security with Visual SSID Comparison"

Possible Prior Art

There may be prior art related to comparing SSIDs for network security purposes, but specific examples are not provided in the abstract.

Unanswered Questions

How does the visual comparison process work in detail?

The abstract mentions determining visual similarity between SSIDs, but it does not elaborate on the specific techniques or algorithms used for this comparison.

Are there any limitations to this visual comparison method?

It would be helpful to know if there are any potential drawbacks or challenges associated with relying on visual representations to identify trusted SSIDs.


Original Abstract Submitted

Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network, a first network message is received from a first access point (AP) identifying a first service set identifier (SSID) associated with a first wireless network, a second network message is received from a second AP identifying a second SSID associated with a second wireless network, and a visual similarity is determined between a first visual representation of the first SSID and a second visual representation of the second SSID. The second SSID is designated as suspicious based on the determined visual similarity.