NETWORK SECURITY FROM HOST AND NETWORK IMPERSONATION

    公开(公告)号:US20220116354A1

    公开(公告)日:2022-04-14

    申请号:US17492214

    申请日:2021-10-01

    摘要: Systems and methods may include sending, to a network registrar, a first message including a first nonce generated by a host computing device, and receiving, from the network registrar, a second message including a second nonce, the second nonce being signed by the network registrar via a private key of a first public key infrastructure (PKI) key pair of the network registrar via a first signature. The method further includes sending a first neighbor advertisement (NA) message to the host computing device including the second nonce. The second nonce and the private key of the network registrar verifies the first signature from the network registrar, the verification of the first signature indicating that the router is not impersonating the network.

    Dynamic device isolation in a network

    公开(公告)号:US11283831B2

    公开(公告)日:2022-03-22

    申请号:US16421858

    申请日:2019-05-24

    摘要: In one embodiment, a device in a network inserts a profile tag into an address request sent by an endpoint node in the network to a lookup service. The lookup service is configured to identify one or more addresses with which the endpoint node is authorized to communicate based on a profile for the endpoint node associated with the inserted profile tag. The device receives an address response sent from the lookup service to the endpoint node that indicates the set of one or more addresses with which the endpoint node is authorized to communicate. The device determines whether a communication between the endpoint node and a particular network address is authorized using the set of one or more addresses with which the endpoint node is authorized to communicate. The device blocks the communication based on a determination that the particular network address is not in the set of one or more addresses with which the endpoint node is authorized to communicate.

    DETERMINING SESSION DURATION FOR DEVICE AUTHENTICATION

    公开(公告)号:US20220070156A1

    公开(公告)日:2022-03-03

    申请号:US17004368

    申请日:2020-08-27

    IPC分类号: H04L29/06 H04L29/08

    摘要: This disclosure describes techniques for authenticating a user device for a session. For instance, an authentication entity may authenticate a user device using single sign-on authentication and/or multi-factor authentication. The authentication entity may then determine a duration for which the user device is authenticated for the session. For example, the authentication entity may receive information representing a state of an environment of the user device. The authentication entity may then use the information to identify one or more transitions associated with the environment between the session and a previous session. Using the one or more transitions, the authentication entity may determine the duration for the session by increasing or decreasing a previous duration associated with the previous session.

    REVERSE OPERATIONS, ADMINISTRATION AND MAINTENANCE (OAM) SIGNALING IN A MESH NETWORK

    公开(公告)号:US20210105668A1

    公开(公告)日:2021-04-08

    申请号:US16594316

    申请日:2019-10-07

    IPC分类号: H04W28/22

    摘要: In one embodiment, a device in a mesh network joins a source-destination oriented partial directed acyclic graph (SDO-PDAG) between a source node and a destination node in the network. The device receives operations, administration and maintenance (OAM) packets flooded along reverse paths of the SDO-PDAG. The device determines, based on the received OAM packets, packet drop rate (PDR) capacities of different paths between the device and the destination node. The device replicates a data packet sent from the source node to the destination node along two or more of the paths between the device and the destination node, based on the determined PDR capacities of those paths.

    Distributed constrained tree formation for deterministic multicast

    公开(公告)号:US10652135B2

    公开(公告)日:2020-05-12

    申请号:US15216007

    申请日:2016-07-21

    摘要: In one embodiment, a multicast listener device floods a path lookup request to search for a multicast tree, and may then receive path lookup responses from candidate nodes on the multicast tree, where each of the path lookup responses indicates a unicast routing cost from a respective candidate node to the multicast listener device, and where each of the candidate nodes is configured to suppress a path lookup response if a total path latency from a source of the multicast tree to the multicast listener device via that respective candidate node is greater than a maximum allowable path latency. The multicast listener device may then select a particular candidate node as a join point for the multicast tree based on the particular node having a lowest associated unicast routing cost to the multicast listener device from among the candidate nodes, and joins the multicast tree at the selected join point.

    Clock harmonization in deterministic networks

    公开(公告)号:US10348481B1

    公开(公告)日:2019-07-09

    申请号:US15966131

    申请日:2018-04-30

    IPC分类号: H04L7/00

    摘要: In one embodiment, a device in a network receives a plurality of packets from one or more neighbors of the device. Each of the packets has a scheduled delivery time interval according to a deterministic communication schedule. The device determines an amount of clock drift for each of the one or more neighbors of the device by comparing arrival times of the received packets to their scheduled delivery time intervals according to the deterministic communication schedule. The device calculates a clock adjustment based on the amount of clock drift for each of the one or more neighbors. The device adjusts a clock of the device using the calculated clock adjustment.