会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • PAIR-WISE KEYING FOR TUNNELED VIRTUAL PRIVATE NETWORKS
    • 用于隧道虚拟私有网络的配对关键
    • US20100223458A1
    • 2010-09-02
    • US12394847
    • 2009-02-27
    • David McGrewBrian E. Weis
    • David McGrewBrian E. Weis
    • H04L9/00
    • H04L9/0827H04L9/0833H04L9/0866H04L9/0891H04L63/0272H04L63/062H04L63/065H04L63/164
    • In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an attacker who compromises one of the devices in a VPN cannot use the keys gained by that compromise to decrypt the packets from the other gateways in the VPN, or spoof one of the communicating gateways. The method is resistant to collusion when co-operating attackers overtake several VPN gateways and observe the keys stored in those gateways. In an embodiment, a VPN gateway comprises a cryptographic data processor configured to encrypt and to decrypt data packets; group key management logic; and Key Generation System logic. In one approach a gateway performs, in relation to adding a group member, receiving in a security association (SA) message secret data for use in the KGS; and derives keys for secure communication with one or more peer VPN gateways using the secret data.
    • 在一个实施例中,用于生成和分发密钥的方法保持组VPN的可扩展性,但也提供真正的成对密钥,使得危及VPN中的一个设备的攻击者不能使用该妥协所获得的密钥解密 VPN中的其他网关的报文,或欺骗一个通信网关。 当合作攻击者超过几个VPN网关并观察存储在那些网关中的密钥时,该方法抵抗串通。 在一个实施例中,VPN网关包括被配置为加密和解密数据分组的密码数据处理器; 组密钥管理逻辑; 和密钥生成系统逻辑。 在一种方法中,网关关于添加组成员,在安全关联(SA)消息中接收用于KGS的消息秘密数据; 并且导出用于使用秘密数据与一个或多个对等VPN网关进行安全通信的密钥。
    • 5. 发明授权
    • Method and apparatus to minimize database exchange in OSPF by using a SHA-1 digest value
    • 通过使用SHA-1摘要值来最小化OSPF中的数据库交换的方法和设备
    • US07664789B2
    • 2010-02-16
    • US11292534
    • 2005-12-02
    • Sina MirtorabiAbhay RoyBrian E. WeisScott Roy Fluhrer
    • Sina MirtorabiAbhay RoyBrian E. WeisScott Roy Fluhrer
    • H04L12/28G06F7/00G06F17/30G06F15/173
    • H04L45/02
    • The present invention provides a method of determining whether database located on a first router is synchronized with the database located on a second router by performing a hash function on the values contained in a link state database to derive a SHA-1 digest value. In an embodiment, the digest value is based on LSA type. The digest value is exchanged initially during a database description packet swap between the first router and second router. If the digest values are the same, the databases are already synchronized. The routers thus skip the database description packet exchange of LSAs in the database and go directly to FULL state, indicating full synchronization between databases on the first and second router and announcing adjacency to each other. If the digest differs, normal database description packet exchange is performed as specified in OSPF.
    • 本发明提供一种通过对包含在链路状态数据库中的值执行散列函数来确定位于第一路由器上的数据库是否与位于第二路由器上的数据库同步的方法,以导出SHA-1摘要值。 在一个实施例中,摘要值基于LSA类型。 最初在第一路由器和第二路由器之间的数据库描述包交换期间交换摘要值。 如果摘要值相同,则数据库已经同步。 因此,路由器跳过数据库中的LSA的数据库描述数据包交换,并直接进入FULL状态,表示第一和第二路由器上的数据库之间的完全同步,并宣布彼此相邻。 如果摘要不同,则按照OSPF中的规定执行正常的数据库描述数据包交换。
    • 7. 发明申请
    • MULTI-DOMAIN DYNAMIC GROUP VIRTUAL PRIVATE NETWORKS
    • 多域动态组虚拟私有网络
    • US20080215880A1
    • 2008-09-04
    • US11681277
    • 2007-03-02
    • James Neil GuichardWarren Scott WainnerBrian E. Weis
    • James Neil GuichardWarren Scott WainnerBrian E. Weis
    • H04L9/00
    • H04L63/0272H04L12/4641H04L63/0428H04L63/065
    • Systems and/or methods of secure communication of information between multi-domain virtual private networks (VPNs) are presented. A dynamic group VPN (DGVPN) can reside in one domain and a disparate DGVPN can reside in a disparate domain. An administrative security authority (ASA) can be employed in each domain. Each ASA can generate and exchange respective keying material and crypto-policy information to be used for inter-domain communications when routing data from a member in one DGVPN to a member(s) in the disparate DGVPN, such that an ASA in one domain can facilitate encryption of data in accordance with the policy of the other domain before the data is sent to the other domain. Each ASA can establish a key server to generate the keying material and crypto-policy information associated with its local DGVPN, and such material and information can be propagated to intra-domain members.
    • 介绍了多域虚拟专用网(VPN)之间信息安全通信的系统和/或方法。 动态组VPN(DGVPN)可以驻留在一个域中,并且不同的DGVPN可以驻留在不同的域中。 可以在每个域中使用一个管理安全机构(ASA)。 当将数据从一个DGVPN中的成员路由到不同DGVPN中的成员时,每个ASA可以生成和交换各自的密钥资料和加密策略信息,以用于域间通信,使得一个域中的ASA可以 在将数据发送到其他域之前,便于根据其他域的策略对数据进行加密。 每个ASA可以建立一个密钥服务器来生成与其本地DGVPN相关联的密钥资料和加密策略信息,这样的材料和信息可以传播到域内成员。
    • 8. 发明授权
    • Key generation for networks
    • 网络的关键一代
    • US08867747B2
    • 2014-10-21
    • US12414772
    • 2009-03-31
    • David A. McGrewBrian E. Weis
    • David A. McGrewBrian E. Weis
    • H04L9/08
    • H04L9/0869H04L9/083
    • Systems, methods, and other embodiments associated with key generation for networks are described. One example method includes configuring a key server with a pseudo-random function (PRF). The key server may provide keying material to gateways. The method may also include controlling the key server to generate a cryptography data structure (e.g., D-matrix) based, at least in part, on the PRF and a seed value. The method may also include controlling the key server to selectively distribute a portion of the cryptography data structure and/or data derived from the cryptography data structure to a gateway. The gateway may then encrypt communications based, at least in part, on the portion of the cryptography data structure. The method may also include selectively distributing an epoch value to members of the set of gateways that may then decrypt an encrypted communication based, at least in part, on the epoch value.
    • 描述了与网络的密钥生成相关联的系统,方法和其他实施例。 一个示例性方法包括配置具有伪随机函数(PRF)的密钥服务器。 密钥服务器可以向网关提供密钥材料。 该方法还可以包括:至少部分地基于PRF和种子值来控制密钥服务器以生成加密数据结构(例如,D矩阵)。 该方法还可以包括控制密钥服务器以选择性地将加密数据结构的一部分和/或从加密数据结构导出的数据分发到网关。 网关可以至少部分地基于加密数据结构的一部分加密通信。 该方法还可以包括选择性地将时代值分配到该组网关的成员,该网关组可以至少部分地基于时期值来解密加密的通信。