Detecting Compromised Certificate Authority
    13.
    发明申请
    Detecting Compromised Certificate Authority 有权
    检测被破坏的认证机构

    公开(公告)号:US20170005805A1

    公开(公告)日:2017-01-05

    申请号:US14788862

    申请日:2015-07-01

    Abstract: A computer-implemented method is provided to detect a compromised Certificate Authority (CA). Over time reports are received containing data describing certificate authority certificates captured from messages exchanged between clients and servers. These reports may be received by a central computing entity. Metadata and statistics for certificates contained in the reports are stored. It is determined whether a certificate authority has been compromised based on the metadata and statistics.

    Abstract translation: 提供了一种计算机实现的方法来检测受损的证书颁发机构(CA)。 随着时间的推移,报告包含描述从客户机和服务器之间交换的消息中获取的证书颁发机构证书的数据。 这些报告可能由中央计算实体接收。 存储报告中包含的证书的元数据和统计信息。 确定证书颁发机构是否已经基于元数据和统计信息进行泄密。

    Engagement and disengagement of transport layer security proxy services with encrypted handshaking

    公开(公告)号:US11483292B2

    公开(公告)日:2022-10-25

    申请号:US17116111

    申请日:2020-12-09

    Abstract: Techniques are presented herein for engagement and disengagement of Transport Layer Security proxy services with encrypted handshaking. In one embodiment, a first initial message of a first encrypted handshaking procedure for a first secure communication session between a first device and a second device is intercepted at a proxy device. The first initial message includes first key exchange information for encrypting the first encrypted handshaking procedure. A copy of the first initial message is stored at the proxy device. A second initial message of a second encrypted handshaking procedure for a second secure communication session between the proxy device and the second device is sent from the proxy device to the second device. The second initial message includes second key exchange information for encrypting the second encrypted handshaking procedure. The proxy device determines, based on the second encrypted handshaking procedure, whether to remain engaged or to disengage.

    Engagement and disengagement of transport layer security proxy services with encrypted handshaking

    公开(公告)号:US10911409B2

    公开(公告)日:2021-02-02

    申请号:US15984637

    申请日:2018-05-21

    Abstract: Techniques are presented herein for engagement and disengagement of Transport Layer Security proxy services with encrypted handshaking. In one embodiment, a first initial message of a first encrypted handshaking procedure for a first secure communication session between a first device and a second device is intercepted at a proxy device. The first initial message includes first key exchange information for encrypting the first encrypted handshaking procedure. A copy of the first initial message is stored at the proxy device. A second initial message of a second encrypted handshaking procedure for a second secure communication session between the proxy device and the second device is sent from the proxy device to the second device. The second initial message includes second key exchange information for encrypting the second encrypted handshaking procedure. The proxy device determines, based on the second encrypted handshaking procedure, whether to remain engaged or to disengage.

    Asymmetric hub and spoke overlay network

    公开(公告)号:US11943078B2

    公开(公告)日:2024-03-26

    申请号:US17860926

    申请日:2022-07-08

    Abstract: Techniques for a hub node, provisioned in a site of a hub and spoke overlay network, to receive, store, and/or forward network routing information associated with a spoke, and send packets directly to spoke(s) that are remote from the hub node. A first hub node may receive a network advertisement including a border gateway protocol (BGP) large community string from a first spoke local to the first hub node. The first hub node may send the BGP large community string to a second hub node remote from the first hub node. The second hub node may decode network routing information from the BGP large community string and store the network routing information locally. The second hub node may send a packet from a second spoke local to the second hub node directly to the first spoke without the data packet being routed via the first hub node.

    Managing Encrypted Server-Name-Indication (ESNI) at Proxy Devices

    公开(公告)号:US20220303251A1

    公开(公告)日:2022-09-22

    申请号:US17833458

    申请日:2022-06-06

    Abstract: In one embodiment, a network security device is configured to monitor data traffic between a first device and a second device. The network security device may be configured to intercept a first initial message of a first encrypted handshaking procedure for a first secure communication session between the first device and the second device, the first initial message specifying a hostname that has been encrypted using first key information associated with the network security device, decrypt at least a portion of the first initial message using the first key information to determine the hostname, re-encrypt the hostname using second key information associated with the second device, and send, to the second device, a second initial message of a second encrypted handshaking procedure for a second secure communication session between the network security device and the second device, the second initial message specifying the hostname re-encrypted using the second key information.

    Hierarchical activation of scripts for detecting a security threat to a network using a programmable data plane

    公开(公告)号:US11095670B2

    公开(公告)日:2021-08-17

    申请号:US16030116

    申请日:2018-07-09

    Abstract: In one example embodiment, a network management device generates a first script defining a first function for detecting a first customizable network event in a sequence of customizable network events indicative of a security threat to a network. The network management device activates the first script at a first network device in the network so as to cause the first network device to execute the first function for detecting the first customizable network event, and obtains, from the first network device, one or more indications that the first network device has detected the first customizable network event. Based on the one or more indications, the network management device determines whether to activate a second script defining a second function for detecting a second customizable network event in the sequence at a second network device in the network capable of detecting the second customizable network event.

Patent Agency Ranking