Patents by Inventor Brian Weis

Brian Weis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8732324
    Abstract: In an embodiment, a method is performed by one or more processors and comprises obtaining a hiatus declaration that indicates that a network device will be incommunicable; suspending communication with the network device until expiration of a hiatus time period during which the network device is expected to be incommunicable; resuming communication with the network device in response to any of: determining that the hiatus time period has expired; obtaining a keep-alive message from the network device; or obtaining other indication that the network device can communicate.
    Type: Grant
    Filed: May 25, 2010
    Date of Patent: May 20, 2014
    Assignee: Cisco Technology, Inc.
    Inventor: Brian Weis
  • Patent number: 8719567
    Abstract: Embodiments associated with enabling Quality of Service (QoS) for MACsec protected frames are described. One example method includes identifying a security indicator in an encrypted network communication and selectively forwarding the encrypted network communication according to a QoS policy. The example method may also include selectively storing a control packet security indicator sniffed from a control packet network communication in response to determining that a match exists between a control packet identification field and a QoS database entry.
    Type: Grant
    Filed: October 14, 2009
    Date of Patent: May 6, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Brian Weis, Saurabh Mohan, Chandramouli Radhakrishnan
  • Patent number: 8515079
    Abstract: In one embodiment, a rekey distribution process transmits, from a key server, a multicast probe message intended to be received by at least one group member device. The rekey distribution process also receives, at the key server, an acknowledgement message from each group member device that received the multicast probe message. In turn, the rekey distribution process transmits, from the key server, a multicast rekey data message intended to be received by each group member device from which the key server received an acknowledgment message. Furthermore, the rekey distribution process transmits, from the key server, a unicast rekey data message to each group member device from which the key server did not receive an acknowledgment message.
    Type: Grant
    Filed: January 26, 2007
    Date of Patent: August 20, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Rajiv Asati, Mohamed Khalid, Aamer Akhter, Brian Weis, Shashi Sastry
  • Patent number: 8385552
    Abstract: The election of a key server is provided. The key server is a single device that broadcasts an encryption key to other devices in a network segment. Also, automatic reelection of a new key server is provided when a current key server becomes unavailable. Key receivers may separately detect that a new key server is needed and separately determine from state information which key receiver should be elected the new key server. The state information may have been received in previously sent messages. Thus, further messaging is not needed to elect a new key server.
    Type: Grant
    Filed: October 31, 2011
    Date of Patent: February 26, 2013
    Assignee: Cisco Technology, Inc.
    Inventor: Brian Weis
  • Patent number: 8204228
    Abstract: In an embodiment, a fast group key management re-registration is described. One computer-implemented method comprises, at a key server: receiving a registration request from a network element to join a group of network elements managed by the key server; generating and storing a group member registration state comprising information identifying the network element within the group of network elements; generating a token using information from the group member registration state, wherein the token identifies the network element within the group; deleting the group member registration state for the network element at the key server; generating an encrypted token by encrypting the token using a secret key that is local to the key server; sending the encrypted token to the network element; receiving the encrypted token along with a re-registration request from the network element to re-join the group of network elements; and re-registering the network element using the encrypted token.
    Type: Grant
    Filed: December 9, 2008
    Date of Patent: June 19, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Brian Weis, David McGrew
  • Publication number: 20120117248
    Abstract: In an embodiment, a method comprises establishing a first data communications session with a first router. In response to receiving a first request to establish a second data communications session, a probe message that is configured to test whether the first data communications session or the first router is responsive is sent to the first router. In response to determining that the first router has not acknowledged the probe message before a probe timer has expired, and receiving a second request to establish the second data communications session, the second data communications session with the first router is established and a state for the first data communications session is deleted.
    Type: Application
    Filed: November 9, 2010
    Publication date: May 10, 2012
    Inventors: Brian Weis, Mahesh Jethanandani, Keyur Patel, Anantha Ramaiah
  • Patent number: 8155130
    Abstract: Techniques for secure communication in a tunnel-less VPN are provided. A key server generates and provides, to each VPN gateway, different, yet mathematically-related keying material. A VPN gateway receives distinct keying material for each designated address block (e.g., subnet) behind the VPN gateway. In response to receiving a packet from one a source host whose address falls within one of the designated address blocks, the VPN gateway identifies the appropriate keying material. The VPN gateway determines an identifier for the address block that includes the destination address. The identifier and the identified keying material are used to generate a key. The VPN gateway encrypts the packet with the key and forwards the encrypted packet to the destination host.
    Type: Grant
    Filed: August 5, 2008
    Date of Patent: April 10, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: David McGrew, Brian Weis, W. Scott Wainner
  • Publication number: 20120045063
    Abstract: The election of a key server is provided. The key server is a single device that broadcasts an encryption key to other devices in a network segment. Also, automatic reelection of a new key server is provided when a current key server becomes unavailable. Key receivers may separately detect that a new key server is needed and separately determine from state information which key receiver should be elected the new key server. The state information may have been received in previously sent messages. Thus, further messaging is not needed to elect a new key server.
    Type: Application
    Filed: October 31, 2011
    Publication date: February 23, 2012
    Applicant: CISCO TECHNOLOGY, INC.
    Inventor: Brian Weis
  • Publication number: 20110296044
    Abstract: In an embodiment, a method is performed by one or more processors and comprises obtaining a hiatus declaration that indicates that a network device will be incommunicable; suspending communication with the network device until expiration of a hiatus time period during which the network device is expected to be incommunicable; resuming communication with the network device in response to any of: determining that the hiatus time period has expired; obtaining a keep-alive message from the network device; or obtaining other indication that the network device can communicate.
    Type: Application
    Filed: May 25, 2010
    Publication date: December 1, 2011
    Inventor: Brian WEIS
  • Patent number: 8050408
    Abstract: The election of a key server is provided. The key server is a single device that broadcasts an encryption key to other devices in a network segment. Also, automatic reelection of a new key server is provided when a current key server becomes unavailable. Key receivers may separately detect that a new key server is needed and separately determine from state information which key receiver should be elected the new key server. The state information may have been received in previously sent messages. Thus, further messaging is not needed to elect a new key server.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: November 1, 2011
    Assignee: Cisco Technology, Inc.
    Inventor: Brian Weis
  • Patent number: 7991836
    Abstract: An approach for managing state information by a group of servers that services a group of clients is disclosed. One server is designated as the primary server and is responsible for generating state information to be used by both the servers and the clients. The remaining servers are designated as secondary servers that help to manage the group, but which do not generate the state information. When the primary server fails or is not available due to a network partition event, one of the secondary servers changes role to become the primary server. With a network partition event, each partition can have a primary server, and when the network partition heals, one of the primary servers changes role back to being a secondary server. As a result, the group of servers maintains a consistent set of state information without being vulnerable to the single failure of a server.
    Type: Grant
    Filed: August 25, 2010
    Date of Patent: August 2, 2011
    Assignee: Cisco Technology, Inc.
    Inventor: Brian Weis
  • Publication number: 20110087878
    Abstract: Embodiments associated with enabling Quality of Service (QoS) for MACsec protected frames are described. One example method includes identifying a security indicator in an encrypted network communication and selectively forwarding the encrypted network communication according to a QoS policy. The example method may also include selectively storing a control packet security indicator sniffed from a control packet network communication in response to determining that a match exists between a control packet identification field and a QoS database entry.
    Type: Application
    Filed: October 14, 2009
    Publication date: April 14, 2011
    Inventors: Brian Weis, Saurabh Mohan, Chandramouli Radhakrishnan
  • Publication number: 20100318605
    Abstract: An approach for managing state information by a group of servers that services a group of clients is disclosed. One server is designated as the primary server and is responsible for generating state information to be used by both the servers and the clients. The remaining servers are designated as secondary servers that help to manage the group, but which do not generate the state information. When the primary server fails or is not available due to a network partition event, one of the secondary servers changes role to become the primary server. With a network partition event, each partition can have a primary server, and when the network partition heals, one of the primary servers changes role back to being a secondary server. As a result, the group of servers maintains a consistent set of state information without being vulnerable to the single failure of a server.
    Type: Application
    Filed: August 25, 2010
    Publication date: December 16, 2010
    Inventor: BRIAN WEIS
  • Patent number: 7827262
    Abstract: An approach for managing state information by a group of servers that services a group of clients is disclosed. One server is designated as the primary server and is responsible for generating state information to be used by both the servers and the clients. The remaining servers are designated as secondary servers that help to manage the group, but which do not generate the state information. When the primary server fails or is not available due to a network partition event, one of the secondary servers changes role to become the primary server. With a network partition event, each partition can have a primary server, and when the network partition heals, one of the primary servers changes role back to being a secondary server. As a result, the group of servers maintains a consistent set of state information without being vulnerable to the single failure of a server.
    Type: Grant
    Filed: July 14, 2005
    Date of Patent: November 2, 2010
    Assignee: Cisco Technology, Inc.
    Inventor: Brian Weis
  • Publication number: 20100220856
    Abstract: In an example embodiment, a key generation system (KGS) is used to generate private pairwise keys between peers belonging to a group. Each member of the group is provisioned with a set of parameters which allows each member to generate a key with any other member of the group; however, no group member can derive a key for pairings involving other group members. The private pairwise keys may be used to derive session keys between peers belonging to the group. Optionally, an epoch value may be employed to derive the private pairwise keys.
    Type: Application
    Filed: April 28, 2009
    Publication date: September 2, 2010
    Inventors: Johannes Petrus KRUYS, David McGrew, Max Pritikin, Joseph Salowey, Brian Weis
  • Patent number: 7782858
    Abstract: In one embodiment, a method includes receiving authenticated site data that includes site ID data and address data. The site ID data indicates a unique site ID for each site among multiple sites for a first network that uses an internal routing protocol. Multiple edge sites of those sites are separate from each other and connected to a second network that is under separate administrative control of at least one different party. The address data indicates network addresses associated with each site of the plurality of sites. An external routing protocol message is discounted based on the authenticated site data.
    Type: Grant
    Filed: April 4, 2007
    Date of Patent: August 24, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Russell White, James Ng, Alvaro Retana, Brian Weis
  • Publication number: 20100142711
    Abstract: In an embodiment, a fast group key management re-registration is described. One computer-implemented method comprises, at a key server: receiving a registration request from a network element to join a group of network elements managed by the key server; generating and storing a group member registration state comprising information identifying the network element within the group of network elements; generating a token using information from the group member registration state, wherein the token identifies the network element within the group; deleting the group member registration state for the network element at the key server; generating an encrypted token by encrypting the token using a secret key that is local to the key server; sending the encrypted token to the network element; receiving the encrypted token along with a re-registration request from the network element to re-join the group of network elements; and re-registering the network element using the encrypted token.
    Type: Application
    Filed: December 9, 2008
    Publication date: June 10, 2010
    Inventors: Brian Weis, David McGrew
  • Publication number: 20100034207
    Abstract: Techniques for secure communication in a tunnel-less VPN are provided. A key server generates and provides, to each VPN gateway, different, yet mathematically-related keying material. A VPN gateway receives distinct keying material for each designated address block (e.g., subnet) behind the VPN gateway. In response to receiving a packet from one a source host whose address falls within one of the designated address blocks, the VPN gateway identifies the appropriate keying material. The VPN gateway determines an identifier for the address block that includes the destination address. The identifier and the identified keying material are used to generate a key. The VPN gateway encrypts the packet with the key and forwards the encrypted packet to the destination host.
    Type: Application
    Filed: August 5, 2008
    Publication date: February 11, 2010
    Inventors: David Mcgrew, Brian Weis, W. Scott Wainner
  • Patent number: D603995
    Type: Grant
    Filed: February 19, 2009
    Date of Patent: November 10, 2009
    Inventors: Brian Wei, Jonathan Zhang
  • Patent number: D612964
    Type: Grant
    Filed: June 6, 2009
    Date of Patent: March 30, 2010
    Inventors: Jonathan Zhang, Brian Wei