Zero-trust authentication for secure remote direct memory access

    公开(公告)号:US12113859B2

    公开(公告)日:2024-10-08

    申请号:US18498950

    申请日:2023-10-31

    CPC classification number: H04L67/1097 H04L63/0435 H04L63/20

    Abstract: Various example embodiments for supporting zero-trust policy enforcement in a communication system are presented herein. Various example embodiments for supporting zero-trust policy enforcement in a communication system may be configured to support zero-trust policy enforcement, including zero-trust authentication, for Remote Direct Memory Access (RDMA) communications. Various example embodiments for supporting zero-trust policy enforcement for RDMA communications may be configured to support transparent zero-trust policy enforcement for RDMA communications by leveraging programmable Smart Network Interface Cards (SmartNICs). Various example embodiments for supporting zero-trust policy enforcement for RDMA communications based on leveraging of programmable SmartNICs may be configured to support zero-trust policy enforcement for RDMA communications by applying zero-trust policies on a connection-by-connection basis within SmartNICs for RDMA connections between RDMA applications hosted on end hosts served by the SmartNICs.

    SECURE DATA ROUTING WITH CHANNEL RESILIENCY
    4.
    发明公开

    公开(公告)号:US20240333642A1

    公开(公告)日:2024-10-03

    申请号:US18194413

    申请日:2023-03-31

    Applicant: SCATR LLC

    Abstract: A secure data routing method and system are disclosed. Logical communication channels are established that each associate an IP address and a protocol port associated with a first computer system to an IP address and a protocol port associated with a second or third computer system. Some logical communication channels associated with the second computer system and some logical communication channels associated with the third computer system are associated with the same IP address and protocol port associated with the first computer system. Data packets are received and parsed to find tokens embedded in the headers. A first data packet embedding a first token is associated to a first source and is decrypted using a first decryption key associated with the first source. A second data packet embedding a second token is associated to a second source and is decrypted using a second decryption key associated with the second source.

    AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK

    公开(公告)号:US20240305607A1

    公开(公告)日:2024-09-12

    申请号:US18666254

    申请日:2024-05-16

    Applicant: UAB 360 IT

    Abstract: The disclosure discloses a first server determining an encrypted authentication packet including (i) a crypted code field that indicates a type of the encryption authentication packet, (ii) a crypted payload field that includes an encrypted initial authentication packet, determined by utilizing a nonce, an encryption key, and an encryption algorithm, and (iii) a data length field that indicates a length of the encrypted authentication packet, the length including a sum of a length of the crypted code field, a length of the crypted payload field, and a length of the data length field. The method may also include transmitting, by the first server to a second server, the encrypted authentication packet to enable the first server and the second server to conduct an authentication process. Various other aspects are contemplated.

Patent Agency Ranking