Secure overlay multicast
    3.
    发明授权

    公开(公告)号:US12081592B2

    公开(公告)日:2024-09-03

    申请号:US18305930

    申请日:2023-04-24

    发明人: Thomas R. Halford

    IPC分类号: H04L29/06 H04L9/08 H04L9/40

    摘要: A system and method for cryptographically securing data communications between a group of networked devices establishes and maintains an overlay network at the Application Layer, on top of a unicast routing service provided at the Internetworking Layer. The overlay network provides first, the routes that are used to deliver multicast datagrams and second, the cryptographic keys used to secure multicast datagrams. A common cryptographic key is established between all members of each group, and end-to-end encryption ensures that multicast datagrams can be accessed only by authorized group members. In other embodiments, keys are established between pairs of adjacent devices in the overlay network, and hop-by-hop encryption ensures that multicast datagrams can be accessed only by overlay network members.

    Infrastructure level LAN security

    公开(公告)号:US11743292B2

    公开(公告)日:2023-08-29

    申请号:US17883383

    申请日:2022-08-08

    申请人: Nicira, Inc.

    IPC分类号: H04L9/08 H04L9/40

    摘要: Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an encryption module of a virtual machine (VM) host intercepts layer 2 (L2) frames sent via a virtual NIC (vNIC). The encryption module determines whether the vNIC is connected to a “secure wire,” and invokes an API exposed by a key management module to encrypt the frames using a group key associated with the secure wire, if any. Encryption may be performed for all frames from the vNIC, or according to a policy. In one embodiment, the encryption module may be located at a layer farthest from the vNIC, and encryption may be transparent to both the VM and a virtual switch. Unauthorized network entities which lack the group key cannot decipher the data of encrypted frames, even if they gain access to such frames.

    Continuing a media access control security (MACsec) key agreement (MKA) session upon a network device becoming temporarily unavailable

    公开(公告)号:US11711367B2

    公开(公告)日:2023-07-25

    申请号:US16824028

    申请日:2020-03-19

    IPC分类号: H04L9/40

    CPC分类号: H04L63/10 H04L63/065

    摘要: A network device may communicate with another network device via a media access control security (MACsec) key agreement (MKA) communication link, wherein an MKA session has been established between the network device and the other network device. The network device may determine that the other network device is unavailable. The network device may cause, based on determining that the other network device is unavailable, an MKA state of the network device to be placed in a paused state. The network device may receive, after causing the MKA state of the network device to be placed in the paused state, a packet from the other network device via the MKA communication link. The network device may determine, based on the packet, that the MKA session has not ended. The network device may continue, based on the MKA session having not ended, the MKA session by reactivating the MKA state.

    Secure device management
    10.
    发明授权

    公开(公告)号:US11677630B2

    公开(公告)日:2023-06-13

    申请号:US17246301

    申请日:2021-04-30

    IPC分类号: H04L41/12 H04L9/40

    摘要: Techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VPAN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VPAN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.