Patents by Inventor Scott Roy Fluhrer
Scott Roy Fluhrer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230097734Abstract: A system and computer-implemented method for routing an encrypted packet through a cloud enforcement network based on a metadata tag. The cloud enforcement network applies policy and routing attributions or tags outside of the encrypted packet payload in such a way as to not require an inner packet to first be decrypted. Traffic prioritization, data protection, and per application policies are achieved by using such metadata tags for internode routing without the need for DPI or decryption. Furthermore, the metadata itself can also be signed or encrypted depending on the provenance of the data. As such, applying meta-tagging external to an encrypted packet, the payload would not be needed to be decrypted during transit of the packet to express end-to-end policy and routing decisions.Type: ApplicationFiled: September 30, 2021Publication date: March 30, 2023Inventors: Vincent Parla, Kyle Andrew Donald Mestery, Rahim Lalani, Scott Roy Fluhrer
-
Patent number: 11394536Abstract: Presented herein are methodologies for establishing secure communications in a post-quantum computer context. The methodology includes receiving, from a first communications device, at a second communications device, a secret seed value, or otherwise obtaining the secret seed value; initializing a session key service with the secret seed value; receiving, from the first communications device, at the second communications device, a pre-shared key identifier; querying the session key service for a pre-shared key corresponding the pre-shared key identifier; receiving, from the session key service, the pre-shared key; deriving a session key based, at least in part, on the pre-shared key; receiving from the first communications device, at the second communications device, data encrypted with the session key; and decrypting the data at the second communications device using the session key.Type: GrantFiled: January 22, 2020Date of Patent: July 19, 2022Assignee: CISCO TECHNOLOGY, INCInventors: Lionel Florit, Scott Roy Fluhrer, Amjad Inamdar, David Arthur McGrew
-
Publication number: 20210226782Abstract: Presented herein are methodologies for establishing secure communications in a post-quantum computer context. The methodology includes receiving, from a first communications device, at a second communications device, a secret seed value, or otherwise obtaining the secret seed value; initializing a session key service with the secret seed value; receiving, from the first communications device, at the second communications device, a pre-shared key identifier; querying the session key service for a pre-shared key corresponding the pre-shared key identifier; receiving, from the session key service, the pre-shared key; deriving a session key based, at least in part, on the pre-shared key; receiving from the first communications device, at the second communications device, data encrypted with the session key; and decrypting the data at the second communications device using the session key.Type: ApplicationFiled: January 22, 2020Publication date: July 22, 2021Inventors: Lionel Florit, Scott Roy Fluhrer, Amjad Inamdar, David Arthur McGrew
-
Patent number: 10985847Abstract: A method divides data traffic into multiple optical transport units formatted according to an optical transport network (OTN) standard. The multiple optical transport units include a master optical network unit and one or more slave optical network units. Each optical network unit includes overhead and a payload. The overhead includes used overhead specifically defined in the OTN standard and unused overhead not specifically defined in the OTN standard. The method encrypts each optical network unit with a respective one of multiple encryption keys, defines security control parameters identifying the multiple encryption keys, and inserts the security control parameters into the unused overhead of a first slave optical network unit among the one or more slave optical network units. The method transmits the optical network units in encrypted form.Type: GrantFiled: December 21, 2017Date of Patent: April 20, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Gilberto Loprieno, Scott Roy Fluhrer, Emanuele Umberto Giacometti
-
Publication number: 20190199449Abstract: A method divides data traffic into multiple optical transport units formatted according to an optical transport network (OTN) standard. The multiple optical transport units include a master optical network unit and one or more slave optical network units. Each optical network unit includes overhead and a payload. The overhead includes used overhead specifically defined in the OTN standard and unused overhead not specifically defined in the OTN standard. The method encrypts each optical network unit with a respective one of multiple encryption keys, defines security control parameters identifying the multiple encryption keys, and inserts the security control parameters into the unused overhead of a first slave optical network unit among the one or more slave optical network units. The method transmits the optical network units in encrypted form.Type: ApplicationFiled: December 21, 2017Publication date: June 27, 2019Inventors: Gilberto Loprieno, Scott Roy Fluhrer, Emanuele Umberto Giacometti
-
Patent number: 10104050Abstract: A method is provided in one example embodiment and includes receiving at a node of a transitive IP network a data packet including a Network Services Header (“NSH”); accessing by the transitive IP network node context contained in the NSH, wherein the context may be used by the transitive IP network node to perform an enhanced network service in connection with the received data packet; performing by the transitive IP network node the enhanced network service in connection with the received data packet using the accessed context; and, subsequent to the performing, forwarding the received packet to a next node.Type: GrantFiled: May 4, 2016Date of Patent: October 16, 2018Assignee: Cisco Technology, Inc.Inventors: Warren Scott Wainner, Brian E. Weis, Paul Quinn, Scott Roy Fluhrer
-
Publication number: 20170324714Abstract: A method is provided in one example embodiment and includes receiving at a node of a transitive IP network a data packet including a Network Services Header (“NSH”); accessing by the transitive IP network node context contained in the NSH, wherein the context may be used by the transitive IP network node to perform an enhanced network service in connection with the received data packet; performing by the transitive IP network node the enhanced network service in connection with the received data packet using the accessed context; and, subsequent to the performing, forwarding the received packet to a next node.Type: ApplicationFiled: May 4, 2016Publication date: November 9, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Warren Scott Wainner, Brian E. Weis, Paul Quinn, Scott Roy Fluhrer
-
Patent number: 8705348Abstract: A system and method for facilitating anti-replay protection with multi-sender traffic is disclosed. The system employs time-based anti-replay protection wherein a sender transmits a data packet with a pseudo-timestamp encapsulated in a metadata payload. At the receiving end, the receiver compares the pseudo-timestamp information received with its own pseudo-time, determines if a packet is valid, and rejects a replay packet. The pseudo-time information is transmitted through the metadata payload and new fields need not be added to the IPSec (IP Security) Protocol, thus the existing hardware can be employed without any changes or modifications.Type: GrantFiled: April 18, 2007Date of Patent: April 22, 2014Assignee: Cisco Technology, Inc.Inventors: Scott Roy Fluhrer, Lingyan Huang, Brian E. Weis, Sheela Dixit Rowles
-
Publication number: 20100318784Abstract: Systems, methods, and other embodiments associated with client identification for transportation layer security sessions are described. One example method includes monitoring a first transportation layer security (TLS) communication between a server and a client. The example method may also include interrupting the first TLS communication and causing the first TLS communication to be interrupted. The example method may also include initiating a second TLS communication with a client side device. The second TLS communication may request a certificate from the client side device. The certificate may include secure information that identifies the client. The example method may also include receiving the certificate from the client side device. The example method may also include authenticating the client, the client side device, and so on, based, at least in part, on the certificate.Type: ApplicationFiled: June 10, 2009Publication date: December 16, 2010Applicant: CISCO TECHNOLOGY, INC.Inventors: Sandeep RAO, Daniel G. WING, Scott Roy FLUHRER
-
Patent number: 7748034Abstract: A mechanism for providing strong anti-replay protection at a security gateway in a network for protection against an attacker duplicating encrypted packets. The mechanism assigns a unique sequence number to each encrypted packet and a time stamp. A receiving security gateway rejects packets that have a duplicative sequence number or that is too old to protect itself against replay attacks. Each security gateway checks off the sequence numbers as they are received knowing that the sending security gateway assigns sequence numbers in an increasing order. The receiving security gateway remembers the value of the highest sequence number that it has already seen as well as up to N additional sequence numbers. Any packet with a duplicative sequence number is discarded. In addition to the sequence number, each packet also has an associated time stamp that corresponds to an epoch during which it should be received. If the packet is received after the epoch has expired, the packet is rejected.Type: GrantFiled: October 12, 2005Date of Patent: June 29, 2010Assignee: Cisco Technology, Inc.Inventors: Scott Roy Fluhrer, Brian E. Weis
-
Patent number: 7664789Abstract: The present invention provides a method of determining whether database located on a first router is synchronized with the database located on a second router by performing a hash function on the values contained in a link state database to derive a SHA-1 digest value. In an embodiment, the digest value is based on LSA type. The digest value is exchanged initially during a database description packet swap between the first router and second router. If the digest values are the same, the databases are already synchronized. The routers thus skip the database description packet exchange of LSAs in the database and go directly to FULL state, indicating full synchronization between databases on the first and second router and announcing adjacency to each other. If the digest differs, normal database description packet exchange is performed as specified in OSPF.Type: GrantFiled: December 2, 2005Date of Patent: February 16, 2010Assignee: Cisco Technology, Inc.Inventors: Sina Mirtorabi, Abhay Roy, Brian E. Weis, Scott Roy Fluhrer
-
Publication number: 20080260151Abstract: A system and method for facilitating anti-replay protection with multi-sender traffic is disclosed. The system employs time-based anti-replay protection wherein a sender transmits a data packet with a pseudo-timestamp encapsulated in a metadata payload. At the receiving end, the receiver compares the pseudo-timestamp information received with its own pseudo-time, determines if a packet is valid, and rejects a replay packet. The pseudo-time information is transmitted through the metadata payload and new fields need not be added to the IPSec (IP Security) Protocol, thus the existing hardware can be employed without any changes or modifications.Type: ApplicationFiled: April 18, 2007Publication date: October 23, 2008Applicant: Cisco Technology, Inc.Inventors: Scott Roy Fluhrer, Lingyan Huang, Brian E. Weis, Sheela Dixit Rowles