-
公开(公告)号:US20190116158A1
公开(公告)日:2019-04-18
申请号:US15784708
申请日:2017-10-16
Applicant: Cisco Technology, Inc.
Inventor: Prashanth Patil , K. Tirumaleswar Reddy , Justin James Muller , Judith Ying Priest , Puneeth Rao Lokapalli
IPC: H04L29/06
Abstract: In a network that includes a client, a server and one or more proxy entities that intercept network traffic between the client and the server, a computer-implemented method is provided including: establishing trust with a permissioned distributed database; computing hashes from packet payloads of network traffic originated, intercepted or received; storing the hashes to the permissioned distributed database so that the permissioned distributed database maintains hashes computed from packets of the network traffic originated, intercepted or received by the client, server and the one or more proxy entities; and validating the hashes by comparing, with each other, the hashes stored to the permissioned distributed database by the client, server and the one or more proxy entities to determine whether any packet payload of the network traffic was modified in transit.
-
公开(公告)号:US20190014124A1
公开(公告)日:2019-01-10
申请号:US15644982
申请日:2017-07-10
Applicant: Cisco Technology, Inc.
Inventor: K. Tirumaleswar Reddy , Prashanth Patil , Carlos M. Pignataro , Puneeth Rao Lokapalli , Judith Ying Priest
CPC classification number: H04L63/108 , H04L9/3236 , H04L41/5019 , H04L41/5051 , H04L41/5096 , H04L63/1458 , H04L63/164 , H04L63/20 , H04L67/125 , H04L2209/20 , H04L2209/38 , H04L2209/56
Abstract: Managing policies for a chain of administrative domains, from end-to-end, includes receiving, at a network device associated with an administrative domain that is part of a chain of administrative domains provisioning an Internet-based application or an Internet-based service to a network, a root block for a blockchain. The root block is generated by a network device in the network and includes a request for a specific network parameter over a specific time period. The network device associated with the administrative domain appends a first block to the blockchain including the root block to accept the request and configures the administrative domain in accordance with the specific network parameter when an end-to-end path in the chain of administrative domains accepts the request. The network device associated with the administrative domain also generates blockchain transactions that append network status updates to the blockchain during the specific time period.
-
公开(公告)号:US10742612B2
公开(公告)日:2020-08-11
申请号:US15784708
申请日:2017-10-16
Applicant: Cisco Technology, Inc.
Inventor: Prashanth Patil , K. Tirumaleswar Reddy , Justin James Muller , Judith Ying Priest , Puneeth Rao Lokapalli
Abstract: In a network that includes a client, a server and one or more proxy entities that intercept network traffic between the client and the server, a computer-implemented method is provided including: establishing trust with a permissioned distributed database; computing hashes from packet payloads of network traffic originated, intercepted or received; storing the hashes to the permissioned distributed database so that the permissioned distributed database maintains hashes computed from packets of the network traffic originated, intercepted or received by the client, server and the one or more proxy entities; and validating the hashes by comparing, with each other, the hashes stored to the permissioned distributed database by the client, server and the one or more proxy entities to determine whether any packet payload of the network traffic was modified in transit.
-
公开(公告)号:US10735203B2
公开(公告)日:2020-08-04
申请号:US15728208
申请日:2017-10-09
Applicant: Cisco Technology, Inc.
Inventor: K. Tirumaleswar Reddy , Prashanth Patil , Puneeth Rao Lokapalli , Carlos M. Pignataro
Abstract: In an example embodiment, a validating peer of a plurality of validating peers in a blockchain network receives, from a non-validating peer, a request to create a root block of a blockchain. The root block includes information related to a potential computer security threat. The validating peer creates the root block with a root block pending validation status. The validating peer shares, with other validating peers of the plurality of validating peers, a notification of the root block with the root block pending validation status to provide an indication of the information. The validating peer determines whether the information is authentic. If the information is determined to be authentic, the validating peer changes the root block pending validation status to a root block authenticated validation status and shares, with the other validating peers, a notification of the root block authenticated validation status to indicate that the information is authentic.
-
公开(公告)号:US10419446B2
公开(公告)日:2019-09-17
申请号:US15644982
申请日:2017-07-10
Applicant: Cisco Technology, Inc.
Inventor: K. Tirumaleswar Reddy , Prashanth Patil , Carlos M. Pignataro , Puneeth Rao Lokapalli , Judith Ying Priest
Abstract: Managing policies for a chain of administrative domains, from end-to-end, includes receiving, at a network device associated with an administrative domain that is part of a chain of administrative domains provisioning an Internet-based application or an Internet-based service to a network, a root block for a blockchain. The root block is generated by a network device in the network and includes a request for a specific network parameter over a specific time period. The network device associated with the administrative domain appends a first block to the blockchain including the root block to accept the request and configures the administrative domain in accordance with the specific network parameter when an end-to-end path in the chain of administrative domains accepts the request. The network device associated with the administrative domain also generates blockchain transactions that append network status updates to the blockchain during the specific time period.
-
公开(公告)号:US20190109717A1
公开(公告)日:2019-04-11
申请号:US15728208
申请日:2017-10-09
Applicant: Cisco Technology, Inc.
Inventor: K. Tirumaleswar Reddy , Prashanth Patil , Puneeth Rao Lokapalli , Carlos M. Pignataro
Abstract: In an example embodiment, a validating peer of a plurality of validating peers in a blockchain network receives, from a non-validating peer, a request to create a root block of a blockchain. The root block includes information related to a potential computer security threat. The validating peer creates the root block with a root block pending validation status. The validating peer shares, with other validating peers of the plurality of validating peers, a notification of the root block with the root block pending validation status to provide an indication of the information. The validating peer determines whether the information is authentic. If the information is determined to be authentic, the validating peer changes the root block pending validation status to a root block authenticated validation status and shares, with the other validating peers, a notification of the root block authenticated validation status to indicate that the information is authentic.
-
-
-
-
-