-
公开(公告)号:US11290436B2
公开(公告)日:2022-03-29
申请号:US16249785
申请日:2019-01-16
Applicant: Cisco Technology, Inc.
Inventor: Dave Persaud , Xueqiang Ma , Kalyan K. Ghosh , Kondal R. Boreddy
Abstract: Techniques for key distribution are provided. A first symmetric key is generated for a first downstream site, and a second symmetric key is generated for a second downstream site. The first symmetric key is transmitted to the first downstream site, and the second symmetric key is transmitted to the second downstream site. Upon receiving an indication that the first symmetric key was successfully deployed at the first downstream site, the first symmetric key is deployed on a first network node of an upstream site. Finally, upon determining that the second symmetric key was not successfully deployed at the second downstream site, techniques include refraining from deploying the second symmetric key to a second network node of the upstream site, where the second network node continues to communicate with the second downstream site using an original symmetric key.