Patents by Inventor Melinda L. Shore

Melinda L. Shore has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8122482
    Abstract: A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came. A response is received. A verification value is generated based on the cryptographic key and the challenge. It is determined whether the response matches the verification value. If the response matches the verification value, then it is determined whether the request is allowed by an authorization set that is mapped to the group identifier. If the request is allowed, then a policy of the intermediary network device is configured based on the request.
    Type: Grant
    Filed: January 24, 2008
    Date of Patent: February 21, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: David A. McGrew, Melinda L. Shore
  • Patent number: 7680104
    Abstract: Disclosed are methods and apparatus for generating, as well as processing data that is traversing (or will be traversing) a translation device, such as a Network Address Translation (NAT) device. In one embodiment, a method of sending data from a first node to a second node is disclosed. The method includes sending a data packet having a header and a payload whereby the header includes (i) one or more fields which identify an application type that uses addresses and indicates that there is a tag present in the payload that serves as a substitute for an address and (ii) an address and whereby the payload includes a tag that is positioned so that it serves as a substitution for an address that is used the identified application. The one or more fields are associated with the address of the header.
    Type: Grant
    Filed: November 9, 2004
    Date of Patent: March 16, 2010
    Assignee: Cisco Technology, Inc.
    Inventor: Melinda L. Shore
  • Publication number: 20090193506
    Abstract: A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came. A response is received. A verification value is generated based on the cryptographic key and the challenge. It is determined whether the response matches the verification value. If the response matches the verification value, then it is determined whether the request is allowed by an authorization set that is mapped to the group identifier. If the request is allowed, then a policy of the intermediary network device is configured based on the request.
    Type: Application
    Filed: January 24, 2008
    Publication date: July 30, 2009
    Inventors: David A. McGrew, Melinda L. Shore
  • Patent number: 7443849
    Abstract: Disclosed are methods and apparatus for facilitating translation of packet addresses (or ports) by one or more translation devices (e.g., Network Address Translation or NAT devices) using a specialized protocol to handle an address (or port) that is used to form part of a payload. In one implementation, this specialized protocol is referred to as Network Layer Signaling (NLS). As a packet traverses along a path containing one or more translation devices, each translation device is configured to translate an address (or port) of such packet's IP header if the packet is traversing between different domains (e.g., traversing between a private and public domain or between two different private domains). One or more of these translation devices may also be configured to implement the specialized protocol which includes translation device traversal mechanisms for detecting whether the traversal path contains a translation device that fails to implement such specialized protocol.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: October 28, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Kaushik P. Biswas, Senthil M. Sivakumar, Melinda L. Shore
  • Patent number: 7350227
    Abstract: A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came. A response is received. A verification value is generated based on the cryptographic key and the challenge. It is determined whether the response matches the verification value. If the response matches the verification value, then it is determined whether the request is allowed by an authorization set that is mapped to the group identifier. If the request is allowed, then a policy of the intermediary network device is configured based on the request.
    Type: Grant
    Filed: April 26, 2005
    Date of Patent: March 25, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: David A. McGrew, Melinda L. Shore