Krischer
Achim Krischer, Wipperfurth DE
Patent application number | Description | Published |
---|---|---|
20090041916 | Method and device for cold-embossing a fatty food mass - The invention relates to a device and to a method for producing a consumable product, which is made of, at least partially, a fatty mass (M), in particular, containing cocoa and/or chocolate. Said device comprises a bearing surface ( | 02-12-2009 |
20090291181 | APPARATUS AND A METHOD FOR PRODUCING BOWL-SHAPED FOOD PRODUCTS - A method and apparatus for producing bowl-shaped food products from a fat-containing compound. The apparatus includes a mold block having hollow molds formed by depressions so as to define an inside surface of the food product and a support frame having a die block formed by die elements, each having a bulge for determining an outside surface of the food product. The interchangeable support frame is movable with respect to the mold block between an operating position and a non-operating position, such that in the operating position the die elements are disposed within a respective hollow mold. The die block and the mold block can be independently cooled during operation. The support frames and the die blocks can be quickly changed to form food products having different shapes. | 11-26-2009 |
Achim Krischer, Wipperfruth DE
Patent application number | Description | Published |
---|---|---|
20110127144 | Chain transporter system - A chain transporter system has a plurality of adapter elements mounted on spaced apart chain links with a separate mounting part received in each adapter element. Each adapter element includes a groove-type recess having a pair of opposed walls, each of which has an undercut. Each mounting part is received in the recess of an adapter element with extensions matingly received in the undercuts of the adapter element. | 06-02-2011 |
Horst G. Krischer, Westfield, IN US
Mark Krischer, Pymble AU
Patent application number | Description | Published |
---|---|---|
20090235077 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 09-17-2009 |
20090327736 | Insider attack defense for network client validation of network management frames - Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link message integrity check and an infrastructure management frame protection (IMFP) message integrity check contained in a broadcast management frame. | 12-31-2009 |
20110113252 | CONCIERGE REGISTRY AUTHENTICATION SERVICE - In an example embodiment described herein is an apparatus comprising a transceiver configured to send and receive data, and logic coupled to the transceiver. The logic is configured to determine from a beacon received by the wireless transceiver whether an associated wireless device sending the beacon supports a protocol for advertising available services from the associated wireless device. The logic is configured to send a request for available services from the associated wireless device via the wireless transceiver responsive to determining the associated wireless device supports the protocol. The logic is configured to receive a response to the request via the wireless transceiver, the response comprising a signature. The logic is configured to validate the response by confirming the signature comprises network data cryptographically bound with service data. | 05-12-2011 |
20130333012 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 12-12-2013 |
20150042792 | LOCATION BASED TECHNIQUE FOR DETECTING DEVICES EMPLOYING MULTIPLE ADDRESSES - In an example embodiment, there is described herein a location based detection technique that determines whether multiple requests from different addresses, such as a Layer 2 MAC (Media Access Control) address and/or layer 3 IP (Internet Protocol) address are being sent form a single device. In particular embodiments, if the device sends more than a predefined threshold number of requests, those requests can be ignored and/or denied. | 02-12-2015 |
Mark Krischer, Pymbie AU
Patent application number | Description | Published |
---|---|---|
20090125981 | SYSTEM AND METHOD FOR WIRELESS NETWORK AND PHYSICAL SYSTEM INTEGRATION - In one embodiment, an apparatus includes an intrusion detection arrangement and a location identification arrangement. The intrusion detection arrangement determines when a client without authorization attempts to access a wireless network of which the intrusion detection arrangement is a part. The location identification arrangement identifies at least a first approximate physical location of the client without authorization when the client without authorization attempts to access the wireless network. The location identification arrangement is configured to communicate the first approximate physical location to a surveillance arrangement which monitors the first approximate physical location | 05-14-2009 |
Mark Krischer, Nsw AU
Patent application number | Description | Published |
---|---|---|
20140237247 | SYSTEM AND METHOD FOR PROVISIONING AND AUTHENTICATING VIA A NETWORK - System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods (e.g. user names and passwords). The shared secret, referred to in this embodiment as the protected access credential may be advantageously used to mutually authenticate a server and a peer upon securing a tunnel for communication via a network. The present system and method disclosed and claimed herein, in one aspect thereof, comprises the steps of 1) providing a communication implementation between a first and a second party; 2) provisioning a secure credential between the first and the second party; and 3) establishing a secure tunnel between the first and the second party using the secure credential. | 08-21-2014 |