会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • DYNAMIC VPN POLICY MODEL WITH ENCRYPTION AND TRAFFIC ENGINEERING RESOLUTION
    • 具有加密和交通工程分辨率的动态VPN策略模型
    • WO2017031305A1
    • 2017-02-23
    • PCT/US2016/047534
    • 2016-08-18
    • CISCO TECHNOLOGY, INC.
    • MAINO, Fabio, R.MICLEA, HoriaEVANS, JohnWEIS, Brian, EliotERMAGAN, Vina
    • H04L12/715H04L12/24
    • H04L47/781H04L41/0823H04L41/5025H04L43/0882H04L45/64
    • High-level network policies that represent a virtual private network (VPN) as a high-level policy model are received. The VPN is to provide secure connectivity between connection sites of the VPN based on the high-level network policies. The high-level network policies are translated into low-level device configuration information represented in a network overlay and used for configuring a network underlay that provides the connections sites to the VPN. The network underlay is configured with the device configuration information so that the network underlay implements the VPN in accordance with the high-level policies. It is determined whether the network underlay is operating to direct traffic flows between the connection sites in compliance with the high-level network policies. If it is determined that the network underlay is not operating in compliance, the network underlay is reconfigured with new low-level device configuration information so that the network underlay operates in compliance.
    • 收到代表虚拟专用网(VPN)作为高级策略模型的高级网络策略。 VPN是基于高级网络策略在VPN的连接站点之间提供安全连接。 高级网络策略被转换为在网络覆盖中表示的低级设备配置信息,并用于配置向VPN提供连接站点的网络底层。 网络底层配置了设备配置信息,使得网络底层根据高级策略实现VPN。 确定网络底层是否正在操作以在连接站点之间引导符合高级网络策略的业务流。 如果确定网络底层不符合操作,则使用新的低级设备配置信息来重新配置网络底层,使得网络底层符合操作。
    • 2. 发明申请
    • SYSTEM FOR CRYPTOGRAPHIC KEY SHARING AMONG NETWORKED KEY SERVERS
    • 网络关键服务器中的CRYPTOGRAPHIC KEY SHARING系统
    • WO2015038234A1
    • 2015-03-19
    • PCT/US2014/046636
    • 2014-07-15
    • CISCO TECHNOLOGY, INC.
    • WEIS, Brian, EliotSEEWALD, Maik, GuenterLOBO, Ruben, Gerald
    • H04L29/06H04L9/08H04L29/08
    • H04L9/08H04L9/083H04L63/06H04L63/062H04L67/12H04L67/16
    • A technique for key sharing among multiple key servers connected to one another over a communication network is provided herein. Each key sever of the multiple key servers stores respective cryptographic keys, and provides the keys to a local device group connected with the key server, to enable the device group to encrypt messages with the keys. Each key server acts as a proxy for the other key servers in order to receive other keys from the other key servers over the network, and provide the other keys to the device group for use to decrypt messages received from other local device groups respectively connected with the other key servers that were encrypted with the other keys and to check message integrity. The multiple key servers may share keys with each other directly, or alternatively, indirectly through a central key server, as needed to support secure communications between their respective device groups.
    • 本文提供了通过通信网络彼此连接的多个密钥服务器之间的密钥共享的技术。 多个密钥服务器的每个密钥服务器存储相应的密钥,并且将密钥提供给与密钥服务器连接的本地设备组,以使设备组能够利用密钥加密消息。 每个密钥服务器充当其他密钥服务器的代理,以便通过网络从其他密钥服务器接收其他密钥,并向设备组提供其他密钥以用于解密从分别与 使用其他密钥加密并检查消息完整性的其他密钥服务器。 多个密钥服务器可以根据需要直接或间接地通过中央密钥服务器彼此共享密钥,以支持它们各自的设备组之间的安全通信。