-
公开(公告)号:US20210126864A1
公开(公告)日:2021-04-29
申请号:US16661540
申请日:2019-10-23
Applicant: Cisco Technology, Inc.
Inventor: Atri Indiresan , Frank Brockners , Shwetha Subray Bhandari
IPC: H04L12/743 , H04L12/24 , H04L29/12 , H04L12/851
Abstract: This disclosure describes various methods, systems, and devices related to identifying path changes of data flows in a network. An example method includes receiving, at a node, a packet including a first path signature. The method further includes generating a second path signature by inputting the first path signature and one or more node details into a hash function. The method includes replacing the first path signature with the second path signature in the packet. The packet including the second path signature is forwarded by the node.
-
公开(公告)号:US10972381B2
公开(公告)日:2021-04-06
申请号:US16392299
申请日:2019-04-23
Applicant: Cisco Technology, Inc.
Inventor: Carlos M. Pignataro , Nagendra Kumar Nainar , Reshad Rahman , Frank Brockners , Shwetha Subray Bhandari
IPC: H04L12/707 , H04L12/703 , H04L29/06 , H04L12/24
Abstract: In one embodiment, in-band operations data (e.g., In-situ Operations, Administration, Maintenance and/or other operations data) is added to Seamless Bidirectional Forwarding (S-BFD) packets. In one embodiment, a S-BFD packet received by a node includes a BFD discriminator and operations data. Reactive processing is identified based on the BFD discriminator. The S-BFD packet and the operations data (e.g., in an operations data field in a header of the received S-BFD packet, in an IOAM Type-Length-Value (TLV), etc.) is processed according to the identified reactive function. Examples of these reactive actions include, but are not limited to, determining a result based on processing of said particular operations data by the local node or a remote analytics server, and sending a response packet including unprocessed and/or a result of the processed operations data (e.g., performance, loss, jitter, an indication of compliance with a service level agreement, and/or another data measurement or result).
-
93.
公开(公告)号:US20200322423A1
公开(公告)日:2020-10-08
申请号:US16783942
申请日:2020-02-06
Applicant: Cisco Technology, Inc.
Inventor: Sujal Sheth , Shwetha Subray Bhandari , Eric Voit , William F. Sulzen , Frank Brockners
Abstract: A verifier peer system transmits a request to an application of another peer system to obtain integrity data of the application. In response to the request, the verifier peer system obtains a response that includes kernel secure boot metrics of the other peer system and integrity data of the application and of any application dependencies. If the verifier peer system determines that the response is valid, the verifier peer system evaluates the integrity data and the kernel secure boot metrics against a set of Known Good Values to determine whether the integrity data and the kernel secure boot metrics are valid. If the integrity data and the kernel secure boot metrics are valid, the verifier peer system determines that the other peer system is trustworthy.
-
公开(公告)号:US20200322386A1
公开(公告)日:2020-10-08
申请号:US16684094
申请日:2019-11-14
Applicant: Cisco Technology, Inc.
Inventor: Selvaraj Mani , Frank Brockners , Shwetha Subray Bhandari
Abstract: Technologies for attestation techniques, systems, and methods to confirm the integrity of a device for service discovery and more specifically, for proving trustworthiness of particular service devices and/or mDNS controller/network elements with respect to DNS/mDNS service discovery. Such attestation techniques may implement canary stamps (e.g., tokens or metadata elements containing or reflecting security measures taken at the device).
-
公开(公告)号:US20200322380A1
公开(公告)日:2020-10-08
申请号:US16839576
申请日:2020-04-03
Applicant: Cisco Technology, Inc.
Inventor: Sujal Sheth , Shwetha Subray Bhandari , Eric Voit , William F. Sulzen , Frank Brockners
IPC: H04L29/06
Abstract: Systems, methods, and computer-readable media for discovering trustworthy devices through attestation and authenticating devices through mutual attestation. A relying node in a network environment can receive attestation information from an attester node in the network environment as part of a unidirectional push of information from the attester node according to a unidirectional link layer communication scheme. A trustworthiness of the attester node can be verified by identifying a level of trust of the attester node from the attestation information. Further, network service access of the attester node through the relying node in the network environment can be controlled based on the level of trust of the attester node identified from the attestation information.
-
公开(公告)号:US20200322356A1
公开(公告)日:2020-10-08
申请号:US16808114
申请日:2020-03-03
Applicant: Cisco Technology, Inc.
Inventor: Sujal Sheth , Shwetha Subray Bhandari , Eric Voit , William F. Sulzen , Frank Brockners , Selvaraj Mani , Eliot Lear
Abstract: Systems, methods, and computer-readable media are disclosed for measurement of trustworthiness of network devices prior to their configuration and deployment in a network. In one aspect of the present disclosure, a method for pre-configuration of network devices includes receiving, at a dynamic host configuration server, a first request from a network device for configuration data, the configuration data including at least an IP address; sending, by the dynamic host configuration server, a second request to the network device for attestation information; verifying, by the dynamic host configuration server, the network device based on the attestation information; and assigning, by the dynamic host configuration server, the configuration data to the network device upon verifying the network device.
-
97.
公开(公告)号:US20200322224A1
公开(公告)日:2020-10-08
申请号:US16728323
申请日:2019-12-27
Applicant: Cisco Technology, Inc.
Inventor: Sujal Sheth , Shwetha Subray Bhandari , Eric Voit , William F. Sulzen , Frank Brockners
IPC: H04L12/24 , H04W84/18 , H04W40/24 , H04L12/751 , H04L12/721
Abstract: Systems, methods, and computer-readable media for assessing reliability and trustworthiness of devices operating within a network. A recipient node in a network environment can receive a neighbor discovery (ND) message from an originating node in the network environment that are both implementing a neighbor discovery protocol. Trustworthiness of the originating node can be verified by identifying a level of trust of the originating node based on attestation information for the originating node included in the ND message received at the recipient node. Connectivity with the recipient node through the network environment can be managed based on the level of trust of the originating node identified from the attestation information included in the ND message.
-
公开(公告)号:US20200320199A1
公开(公告)日:2020-10-08
申请号:US16752488
申请日:2020-01-24
Applicant: Cisco Technology, Inc.
Inventor: Sujal Sheth , Shwetha Subray Bhandari , Eric Voit , William F. Sulzen , Frank Brockners
Abstract: Technologies for attestation techniques, systems, and methods to confirm the integrity of a device for establishing and/or maintaining a trustworthy encrypted network session. An example method can include sending, via a server and using a cryptographic security protocol, a message associated with establishing an encrypted network session; receiving a response from a client device; identifying a level of trust of the client device based on the response; determining whether to perform a next step in the cryptographic security protocol based on the level of trust, wherein the cryptographic security protocol comprises at least one of a Secure Shell (SSH) protocol, a Transport Layer Security (TLS) protocol, a Secure Sockets Layer (SSL) protocol, and an Internet Protocol Security (IPsec) protocol.
-
公开(公告)号:US10652078B2
公开(公告)日:2020-05-12
申请号:US15949189
申请日:2018-04-10
Applicant: Cisco Technology, Inc.
Inventor: David D. Ward , Carlos M. Pignataro , Frank Brockners , Shwetha Subray Bhandari
Abstract: Embodiments of the disclosure pertain to activating in-band OAM based on a triggering event. Aspects of the embodiments are directed to receiving a first notification indicating a problem in a network; triggering a data-collection feature on one or more nodes in the network for subsequent packets that traverse the one or more nodes; evaluating a subsequent packet that includes data augmented by the data collection feature; and determining the problem in the network based on the data augmented to the subsequent packet.
-
公开(公告)号:US20170366456A1
公开(公告)日:2017-12-21
申请号:US15188810
申请日:2016-06-21
Applicant: CISCO TECHNOLOGY, INC.
IPC: H04L , H04L29/06 , H04L12/733
CPC classification number: H04L45/741 , H04L45/02 , H04L45/04 , H04L45/20 , H04L45/26 , H04L45/34 , H04L45/42 , H04L69/22
Abstract: Aspects of the embodiments are directed to systems, apparatuses and methods performed at a network element. Embodiments include receiving a packet; identifying a hop number for the network element; identifying a unique identifier for the network element; determining a path identifier based on the hop number and the unique identifier; augmenting the packet metadata with the path identifier; and transmitting the packet to a next network element.
-
-
-
-
-
-
-
-
-