Patents by Inventor Chennakesava Reddy Gaddam

Chennakesava Reddy Gaddam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11909872
    Abstract: Systems and methods are provided for quantum-resistant secure key distribution between a peer and an EAP authenticator by using an authentication server. The systems and methods include receiving requests for a COMMON-SEED and a quantum-safe public key from a peer and an EAP authenticator. The COMMON-SEED is encrypted using the quantum-safe public key of the peer and the quantum-safe public key of the EAP authenticator, and the encrypted COMMON-SEED is sent to the peer along with a request for a PPK_ID from the peer to complete authentication of the peer. The PPK_ID is received from the peer, and the encrypted COMMON-SEED and PPK_ID is sent to the EAP authenticator. A quantum-resistant secure channel is established between the peer and the EAP authenticator when the peer and the EAP authenticator share the same COMMON-SEED and the same PPK-ID.
    Type: Grant
    Filed: November 10, 2022
    Date of Patent: February 20, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Amjad Inamdar, Lionel Florit, Eric Voit, Sujal Sheth, Chennakesava Reddy Gaddam
  • Patent number: 11870762
    Abstract: The present disclosure is directed to systems and methods for transparent Provider Backbone Bridge forwarding of MACsec key exchanges over public Ethernet provider backbones. The method includes the steps of receiving, at a first PBB device, an Ethernet frame from a first edge router for transmission to a second edge router via a MACsec connection, the Ethernet frame comprising a plurality of fields; performing a lookup of one or more fields of the plurality of fields to determine a match with one or more pre-defined values; determining that the one or more fields of the Ethernet frame match the one or more pre-defined values; rewriting the one or more fields of the Ethernet frame to one or more open values operable to allow the Ethernet frame to be transmitted to a next hop device; and transmitting the Ethernet frame to the next hop device.
    Type: Grant
    Filed: July 7, 2021
    Date of Patent: January 9, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Craig Thomas Hill, Aaron Christopher Warner, Michael William Bessette, Chennakesava Reddy Gaddam
  • Patent number: 11757630
    Abstract: Systems and methods are provided for quantum-resistant secure key distribution between a peer and an EAP authenticator by using an authentication server. The systems and methods include receiving requests for a COMMON-SEED and a quantum-safe public key from a peer and an EAP authenticator. The COMMON-SEED is encrypted using the quantum-safe public key of the peer and the quantum-safe public key of the EAP authenticator, and the encrypted COMMON-SEED is sent to the peer along with a request for a PPK ID from the peer to complete authentication of the peer. The PPK ID is received from the peer, and the encrypted COMMON-SEED and PPK ID is sent to the EAP authenticator. A quantum-resistant secure channel is established between the peer and the EAP authenticator when the peer and the EAP authenticator share the same COMMON-SEED and the same PPK-ID.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: September 12, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Amjad Inamdar, Lionel Florit, Eric Voit, Sujal Sheth, Chennakesava Reddy Gaddam
  • Publication number: 20230071333
    Abstract: Systems and methods are provided for quantum-resistant secure key distribution between a peer and an EAP authenticator by using an authentication server. The systems and methods include receiving requests for a COMMON-SEED and a quantum-safe public key from a peer and an EAP authenticator. The COMMON-SEED is encrypted using the quantum-safe public key of the peer and the quantum-safe public key of the EAP authenticator, and the encrypted COMMON-SEED is sent to the peer along with a request for a PPK_ID from the peer to complete authentication of the peer. The PPK_ID is received from the peer, and the encrypted COMMON-SEED and PPK_ID is sent to the EAP authenticator. A quantum-resistant secure channel is established between the peer and the EAP authenticator when the peer and the EAP authenticator share the same COMMON-SEED and the same PPK-ID.
    Type: Application
    Filed: November 10, 2022
    Publication date: March 9, 2023
    Inventors: Amjad Inamdar, Lionel Florit, Eric Voit, Sujal Sheth, Chennakesava Reddy Gaddam
  • Publication number: 20230008699
    Abstract: The present disclosure is directed to systems and methods for transparent Provider Backbone Bridge forwarding of MACsec key exchanges over public Ethernet provider backbones. The method includes the steps of receiving, at a first PBB device, an Ethernet frame from a first edge router for transmission to a second edge router via a MACsec connection, the Ethernet frame comprising a plurality of fields; performing a lookup of one or more fields of the plurality of fields to determine a match with one or more pre-defined values; determining that the one or more fields of the Ethernet frame match the one or more pre-defined values; rewriting the one or more fields of the Ethernet frame to one or more open values operable to allow the Ethernet frame to be transmitted to a next hop device; and transmitting the Ethernet frame to the next hop device.
    Type: Application
    Filed: July 7, 2021
    Publication date: January 12, 2023
    Inventors: Craig Thomas Hill, Aaron Christopher Warner, Michael William Bessette, Chennakesava Reddy Gaddam
  • Publication number: 20220345300
    Abstract: A method is provided for quantum-resistant secure key distribution between a peer and an extendible authentication protocol (EAP) authenticator by using an authentication server. The method may include receiving requests for a COMMON-SEED and a McEliece public key from a peer and an EAP authenticator by an authentication server using an EAP method, encrypting the COMMON-SEED using the McEliece public key of the peer and the McEliece public key of the EAP authenticator by the authentication server, and sending the encrypted COMMON-SEED from the authentication server to the peer along with a request for a PPK_ID from the peer using the EAP method to complete authentication of the peer. The method may also include receiving the PPK_ID from the peer using the EAP method, where the PPK_ID is from a key pair consisting of PPK_ID and PPK obtained from a first SKS server in electrical communication with the peer based upon the encrypted COMMON-SEED.
    Type: Application
    Filed: July 15, 2021
    Publication date: October 27, 2022
    Inventors: Amjad Inamdar, Lionel Florit, Eric Voit, Sujal Sheth, Chennakesava Reddy Gaddam
  • Patent number: 11381391
    Abstract: A first computing node configures for communication with a second computing node according to a secure Media Access Layer (MAC) layer communication protocol. The first computing node transmits a first message, to the second computing node. The first message includes at least a first indication that the first computing node is capable of communicating according to the secure MAC layer communication protocol based on a pre-shared secret key. The first computing nodes determines to communicate with the second computing node according to the secure MAC layer communication protocol based on one of a pre-shared secret key or a distributed shared key. The first computing node, at least in part based on the determining, transmits a second message to the second computing node according to the secure MAC layer communication protocol based on the one of the pre-shared secret key or the distributed shared key.
    Type: Grant
    Filed: June 15, 2020
    Date of Patent: July 5, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Lionel Florit, Chennakesava Reddy Gaddam, Annu Singh, Gaurav Kumar, Shwetha Subray Bhandari
  • Patent number: 11316869
    Abstract: Disclosed is a method of establishing secure communications. The method includes receiving an attestation parameter associated with a first peer in a potential peer-to-peer communication, adding the attestation parameter to an MACsec Key Agreement (MKA) protocol key exchange, transmitting the key exchange from the first peer to a second peer in the potential peer-to-peer communication and upon a validation of the attestation parameter by the second peer, enabling secure communication between the first peer and the second peer.
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: April 26, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Craig Thomas Hill, Frank Brockners, Shwetha Subray Bhandari, Chennakesava Reddy Gaddam
  • Patent number: 11212265
    Abstract: A non-transitory computer readable medium including instructions stored thereon, when executed, the instructions being effective to cause at least one processor of a first network device to: derive a private key encryption key based on a public key, a first private key of the first network device, a second private key of a live peer device, and a Connectivity Association Key (CAK); transmit a secret key encrypted by the private key encryption key to the live peer device; and receive a communication from the live peer device, the communication being encrypted by the secret key.
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: December 28, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Craig Thomas Hill, Chennakesava Reddy Gaddam, Annu Singh, Gaurav Kumar
  • Publication number: 20210391984
    Abstract: A first computing node configures for communication with a second computing node according to a secure Media Access Layer (MAC) layer communication protocol. The first computing node transmits a first message, to the second computing node. The first message includes at least a first indication that the first computing node is capable of communicating according to the secure MAC layer communication protocol based on a pre-shared secret key. The first computing nodes determines to communicate with the second computing node according to the secure MAC layer communication protocol based on one of a pre-shared secret key or a distributed shared key. The first computing node, at least in part based on the determining, transmits a second message to the second computing node according to the secure MAC layer communication protocol based on the one of the pre-shared secret key or the distributed shared key.
    Type: Application
    Filed: June 15, 2020
    Publication date: December 16, 2021
    Inventors: Lionel Florit, Chennakesava Reddy Gaddam, Annu Singh, Gaurav Kumar, Shwetha Subray Bhandari
  • Publication number: 20210218717
    Abstract: A non-transitory computer readable medium including instructions stored thereon, when executed, the instructions being effective to cause at least one processor of a first network device to: derive a private key encryption key based on a public key, a first private key of the first network device, a second private key of a live peer device, and a Connectivity Association Key (CAK); transmit a secret key encrypted by the private key encryption key to the live peer device; and receive a communication from the live peer device, the communication being encrypted by the secret key.
    Type: Application
    Filed: January 9, 2020
    Publication date: July 15, 2021
    Inventors: Craig Thomas Hill, Chennakesava Reddy Gaddam, Annu Singh, Gaurav Kumar
  • Publication number: 20210176255
    Abstract: Disclosed is a method of establishing secure communications. The method includes receiving an attestation parameter associated with a first peer in a potential peer-to-peer communication, adding the attestation parameter to an MACsec Key Agreement (MKA) protocol key exchange, transmitting the key exchange from the first peer to a second peer in the potential peer-to-peer communication and upon a validation of the attestation parameter by the second peer, enabling secure communication between the first peer and the second peer.
    Type: Application
    Filed: December 10, 2019
    Publication date: June 10, 2021
    Inventors: Craig Thomas Hill, Frank Brockners, Shwetha Subray Bhandari, Chennakesava Reddy Gaddam