HASH-BASED KEY DISTRIBUTION
    1.
    发明申请

    公开(公告)号:US20200169390A1

    公开(公告)日:2020-05-28

    申请号:US16570791

    申请日:2019-09-13

    Abstract: A method for securing communications for a given network is provided. The method comprises by at least one node(i) of the network configured to utilize pairwise keys: generating a set of encryption keys; and transmitting the set of encryption keys to a controller for the network; by the controller, executing a key selection process wherein for each node(j) in the network an encryption key J is selected from the set of encryption keys; assigning the encryption key J to the node(j); and transmitting the selected encryption key J to the node(j); by each node(j), generating an encryption key I to the node(i); and sending the encryption key I to the node(i) via the controller.

    Network load balancing
    2.
    发明授权

    公开(公告)号:US10951528B2

    公开(公告)日:2021-03-16

    申请号:US16021349

    申请日:2018-06-28

    Abstract: A method of routing network traffic may include determining a first data link preference configuration indicating a first preference order for a first plurality of data links over which a first network device communicates. The method may also include receiving a second data link preference configuration indicating a second preference order for a second plurality of data links over which a second network device communicates. The method may additionally include, based on a combination of the first data link preference configuration and the second data link preference configuration, determining a preferred data link to transmit data from the first network device to the second network device. The method may include transmitting data over the preferred data link from the first network device to the second network device.

    Hash-based key distribution
    3.
    发明授权

    公开(公告)号:US10419211B1

    公开(公告)日:2019-09-17

    申请号:US14953431

    申请日:2015-11-30

    Abstract: A method for securing communications for a given network is provided. The method comprises by at least one node(i) of the network configured to utilize pairwise keys: generating a set of encryption keys; and transmitting the set of encryption keys to a controller for the network; by the controller, executing a key selection process wherein for each node(j) in the network an encryption key J is selected from the set of encryption keys; assigning the encryption key J to the node(j); and transmitting the selected encryption key J to the node(j); by each node(j), generating an encryption key I for the node(i); and sending the encryption key I to the node(i) via the controller.

    Hash-based key distribution
    4.
    发明授权

    公开(公告)号:US12069164B2

    公开(公告)日:2024-08-20

    申请号:US16570791

    申请日:2019-09-13

    Abstract: A method for securing communications for a given network is provided. The method comprises by at least one node(i) of the network configured to utilize pairwise keys: generating a set of encryption keys; and transmitting the set of encryption keys to a controller for the network; by the controller, executing a key selection process wherein for each node(j) in the network an encryption key J is selected from the set of encryption keys; assigning the encryption key J to the node(j); and transmitting the selected encryption key J to the node(j); by each node(j), generating an encryption key I to the node(i); and sending the encryption key I to the node(i) via the controller.

    Secure network communication
    5.
    发明授权

    公开(公告)号:US11381386B2

    公开(公告)日:2022-07-05

    申请号:US16021427

    申请日:2018-06-28

    Abstract: A method may include transmitting a first public encryption key from to a control device and encrypting a first packet for a remote network device utilizing a first private encryption key correlated with the first public encryption key. The method may also include generating a second public encryption key and a second private encryption key and transmitting the second public encryption key to the control device. The method may additionally include receiving a first message from the remote network device that the remote network device received the second public encryption key from the control device, and after receiving the first message from the remote network device that the remote network device received the second public encryption key, encrypting a second packet utilizing the second private encryption key.

Patent Agency Ranking