Patents by Inventor Scott Roy Fluhrer

Scott Roy Fluhrer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230097734
    Abstract: A system and computer-implemented method for routing an encrypted packet through a cloud enforcement network based on a metadata tag. The cloud enforcement network applies policy and routing attributions or tags outside of the encrypted packet payload in such a way as to not require an inner packet to first be decrypted. Traffic prioritization, data protection, and per application policies are achieved by using such metadata tags for internode routing without the need for DPI or decryption. Furthermore, the metadata itself can also be signed or encrypted depending on the provenance of the data. As such, applying meta-tagging external to an encrypted packet, the payload would not be needed to be decrypted during transit of the packet to express end-to-end policy and routing decisions.
    Type: Application
    Filed: September 30, 2021
    Publication date: March 30, 2023
    Inventors: Vincent Parla, Kyle Andrew Donald Mestery, Rahim Lalani, Scott Roy Fluhrer
  • Patent number: 11394536
    Abstract: Presented herein are methodologies for establishing secure communications in a post-quantum computer context. The methodology includes receiving, from a first communications device, at a second communications device, a secret seed value, or otherwise obtaining the secret seed value; initializing a session key service with the secret seed value; receiving, from the first communications device, at the second communications device, a pre-shared key identifier; querying the session key service for a pre-shared key corresponding the pre-shared key identifier; receiving, from the session key service, the pre-shared key; deriving a session key based, at least in part, on the pre-shared key; receiving from the first communications device, at the second communications device, data encrypted with the session key; and decrypting the data at the second communications device using the session key.
    Type: Grant
    Filed: January 22, 2020
    Date of Patent: July 19, 2022
    Assignee: CISCO TECHNOLOGY, INC
    Inventors: Lionel Florit, Scott Roy Fluhrer, Amjad Inamdar, David Arthur McGrew
  • Publication number: 20210226782
    Abstract: Presented herein are methodologies for establishing secure communications in a post-quantum computer context. The methodology includes receiving, from a first communications device, at a second communications device, a secret seed value, or otherwise obtaining the secret seed value; initializing a session key service with the secret seed value; receiving, from the first communications device, at the second communications device, a pre-shared key identifier; querying the session key service for a pre-shared key corresponding the pre-shared key identifier; receiving, from the session key service, the pre-shared key; deriving a session key based, at least in part, on the pre-shared key; receiving from the first communications device, at the second communications device, data encrypted with the session key; and decrypting the data at the second communications device using the session key.
    Type: Application
    Filed: January 22, 2020
    Publication date: July 22, 2021
    Inventors: Lionel Florit, Scott Roy Fluhrer, Amjad Inamdar, David Arthur McGrew
  • Patent number: 10985847
    Abstract: A method divides data traffic into multiple optical transport units formatted according to an optical transport network (OTN) standard. The multiple optical transport units include a master optical network unit and one or more slave optical network units. Each optical network unit includes overhead and a payload. The overhead includes used overhead specifically defined in the OTN standard and unused overhead not specifically defined in the OTN standard. The method encrypts each optical network unit with a respective one of multiple encryption keys, defines security control parameters identifying the multiple encryption keys, and inserts the security control parameters into the unused overhead of a first slave optical network unit among the one or more slave optical network units. The method transmits the optical network units in encrypted form.
    Type: Grant
    Filed: December 21, 2017
    Date of Patent: April 20, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Gilberto Loprieno, Scott Roy Fluhrer, Emanuele Umberto Giacometti
  • Publication number: 20190199449
    Abstract: A method divides data traffic into multiple optical transport units formatted according to an optical transport network (OTN) standard. The multiple optical transport units include a master optical network unit and one or more slave optical network units. Each optical network unit includes overhead and a payload. The overhead includes used overhead specifically defined in the OTN standard and unused overhead not specifically defined in the OTN standard. The method encrypts each optical network unit with a respective one of multiple encryption keys, defines security control parameters identifying the multiple encryption keys, and inserts the security control parameters into the unused overhead of a first slave optical network unit among the one or more slave optical network units. The method transmits the optical network units in encrypted form.
    Type: Application
    Filed: December 21, 2017
    Publication date: June 27, 2019
    Inventors: Gilberto Loprieno, Scott Roy Fluhrer, Emanuele Umberto Giacometti
  • Patent number: 10104050
    Abstract: A method is provided in one example embodiment and includes receiving at a node of a transitive IP network a data packet including a Network Services Header (“NSH”); accessing by the transitive IP network node context contained in the NSH, wherein the context may be used by the transitive IP network node to perform an enhanced network service in connection with the received data packet; performing by the transitive IP network node the enhanced network service in connection with the received data packet using the accessed context; and, subsequent to the performing, forwarding the received packet to a next node.
    Type: Grant
    Filed: May 4, 2016
    Date of Patent: October 16, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Warren Scott Wainner, Brian E. Weis, Paul Quinn, Scott Roy Fluhrer
  • Publication number: 20170324714
    Abstract: A method is provided in one example embodiment and includes receiving at a node of a transitive IP network a data packet including a Network Services Header (“NSH”); accessing by the transitive IP network node context contained in the NSH, wherein the context may be used by the transitive IP network node to perform an enhanced network service in connection with the received data packet; performing by the transitive IP network node the enhanced network service in connection with the received data packet using the accessed context; and, subsequent to the performing, forwarding the received packet to a next node.
    Type: Application
    Filed: May 4, 2016
    Publication date: November 9, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Warren Scott Wainner, Brian E. Weis, Paul Quinn, Scott Roy Fluhrer
  • Patent number: 8705348
    Abstract: A system and method for facilitating anti-replay protection with multi-sender traffic is disclosed. The system employs time-based anti-replay protection wherein a sender transmits a data packet with a pseudo-timestamp encapsulated in a metadata payload. At the receiving end, the receiver compares the pseudo-timestamp information received with its own pseudo-time, determines if a packet is valid, and rejects a replay packet. The pseudo-time information is transmitted through the metadata payload and new fields need not be added to the IPSec (IP Security) Protocol, thus the existing hardware can be employed without any changes or modifications.
    Type: Grant
    Filed: April 18, 2007
    Date of Patent: April 22, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Scott Roy Fluhrer, Lingyan Huang, Brian E. Weis, Sheela Dixit Rowles
  • Publication number: 20100318784
    Abstract: Systems, methods, and other embodiments associated with client identification for transportation layer security sessions are described. One example method includes monitoring a first transportation layer security (TLS) communication between a server and a client. The example method may also include interrupting the first TLS communication and causing the first TLS communication to be interrupted. The example method may also include initiating a second TLS communication with a client side device. The second TLS communication may request a certificate from the client side device. The certificate may include secure information that identifies the client. The example method may also include receiving the certificate from the client side device. The example method may also include authenticating the client, the client side device, and so on, based, at least in part, on the certificate.
    Type: Application
    Filed: June 10, 2009
    Publication date: December 16, 2010
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Sandeep RAO, Daniel G. WING, Scott Roy FLUHRER
  • Patent number: 7748034
    Abstract: A mechanism for providing strong anti-replay protection at a security gateway in a network for protection against an attacker duplicating encrypted packets. The mechanism assigns a unique sequence number to each encrypted packet and a time stamp. A receiving security gateway rejects packets that have a duplicative sequence number or that is too old to protect itself against replay attacks. Each security gateway checks off the sequence numbers as they are received knowing that the sending security gateway assigns sequence numbers in an increasing order. The receiving security gateway remembers the value of the highest sequence number that it has already seen as well as up to N additional sequence numbers. Any packet with a duplicative sequence number is discarded. In addition to the sequence number, each packet also has an associated time stamp that corresponds to an epoch during which it should be received. If the packet is received after the epoch has expired, the packet is rejected.
    Type: Grant
    Filed: October 12, 2005
    Date of Patent: June 29, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Scott Roy Fluhrer, Brian E. Weis
  • Patent number: 7664789
    Abstract: The present invention provides a method of determining whether database located on a first router is synchronized with the database located on a second router by performing a hash function on the values contained in a link state database to derive a SHA-1 digest value. In an embodiment, the digest value is based on LSA type. The digest value is exchanged initially during a database description packet swap between the first router and second router. If the digest values are the same, the databases are already synchronized. The routers thus skip the database description packet exchange of LSAs in the database and go directly to FULL state, indicating full synchronization between databases on the first and second router and announcing adjacency to each other. If the digest differs, normal database description packet exchange is performed as specified in OSPF.
    Type: Grant
    Filed: December 2, 2005
    Date of Patent: February 16, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Sina Mirtorabi, Abhay Roy, Brian E. Weis, Scott Roy Fluhrer
  • Publication number: 20080260151
    Abstract: A system and method for facilitating anti-replay protection with multi-sender traffic is disclosed. The system employs time-based anti-replay protection wherein a sender transmits a data packet with a pseudo-timestamp encapsulated in a metadata payload. At the receiving end, the receiver compares the pseudo-timestamp information received with its own pseudo-time, determines if a packet is valid, and rejects a replay packet. The pseudo-time information is transmitted through the metadata payload and new fields need not be added to the IPSec (IP Security) Protocol, thus the existing hardware can be employed without any changes or modifications.
    Type: Application
    Filed: April 18, 2007
    Publication date: October 23, 2008
    Applicant: Cisco Technology, Inc.
    Inventors: Scott Roy Fluhrer, Lingyan Huang, Brian E. Weis, Sheela Dixit Rowles