Patents by Inventor Brian Weis

Brian Weis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7421578
    Abstract: A method performed by a first computer node for selecting a leader node to provide service to a plurality of other nodes in a multicast group, wherein each of the nodes communicates using multicast messages, comprises issuing a first election call message; receiving candidacy announcement messages from one or more leader candidate nodes in a specified time period; selecting a victor from among all leader candidate nodes from which candidacy announcement messages are received; receiving one or more victor announcement messages from one or more leader victor nodes for a second specified time period; resolving zero or more collisions among the victor announcement messages to result in selecting the leader node. One embodiment provides a dynamic secure protocol for electing a key server, such as a key server that is suited for use with a group key exchange protocol such as the Group Domain of Interpretation (GDOI).
    Type: Grant
    Filed: July 22, 2003
    Date of Patent: September 2, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Geoffrey Huang, Brian Weis
  • Patent number: 7392382
    Abstract: A method of verifying data timeliness with time-based derived cryptographic keys is disclosed. A master key is received. Based on both the master key and a current time, an interval key is derived. Data, which was encrypted with the interval key, is decrypted with the interval key.
    Type: Grant
    Filed: April 21, 2003
    Date of Patent: June 24, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Brian Weis, David McGrew
  • Publication number: 20070217611
    Abstract: The election of a key server is provided. The key server is a single device that broadcasts an encryption key to other devices in a network segment. Also, automatic reelection of a new key server is provided when a current key server becomes unavailable. Key receivers may separately detect that a new key server is needed and separately determine from state information which key receiver should be elected the new key server. The state information may have been received in previously sent messages. Thus, further messaging is not needed to elect a new key server.
    Type: Application
    Filed: March 17, 2006
    Publication date: September 20, 2007
    Applicant: Cisco Technology, Inc.
    Inventor: Brian Weis
  • Publication number: 20070209071
    Abstract: Techniques for distributing a new communication key within a group virtual private network (VPN) are provided. A key distribution service determines that a new communication key for a VPN is to be distributed to members of the VPN. The new communication key is sent individually in a unique and separate message to each of the members. The key distribution service also maintains records to determine which of the members have and have not successfully received the new communication key.
    Type: Application
    Filed: March 6, 2006
    Publication date: September 6, 2007
    Inventors: Brian Weis, Shashi Sastry, Sheela Rowles
  • Publication number: 20070206597
    Abstract: A system transmits, to a hub from a first spoke, first routing information associated with the first spoke. The system receives, at the first spoke, from the hub, second routing information associated with a plurality of spokes in communication with the hub. The plurality of spokes includes a second spoke. The system resolves, at the first spoke, a next hop determination for the packet based on the second routing information received from the hub. The system routes the packet from the first spoke to the second spoke using the next hop determination.
    Type: Application
    Filed: May 1, 2006
    Publication date: September 6, 2007
    Inventors: Rajiv Asati, Mohamed Khalid, Brian Weis, Pratima Sethi
  • Publication number: 20070186009
    Abstract: A system provides a request for a policy from a policy server, and receives the policy from the policy server. The policy indicates processing to be applied to a traffic partition passing through the device. The system configures the policy within a routing structure associated with the traffic partition for the policy in the device, and routes a stream of traffic for the routing structure in accordance with the policy for that routing structure.
    Type: Application
    Filed: February 9, 2006
    Publication date: August 9, 2007
    Inventors: James Guichard, W. Wainner, Brian Weis, Mohamed Khalid
  • Patent number: 7234063
    Abstract: Group key management techniques are applied to generating pair-wise keys for point-to-point secure communication applications. Nodes participating in a secure communication group each receive a group key and associated policy information. When a first node wishes to establish a secure point-to-point connection to a second node, the first node derives a pairwise key from the group key and policy information, for example, by hashing the group key and information identifying the two nodes. As a result, a pairwise key is generated without exchanging negotiation messages among the two nodes and without expensive asymmetric cryptographic computation approaches.
    Type: Grant
    Filed: August 27, 2002
    Date of Patent: June 19, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Baugher, David McGrew, Jan Vilhuber, Brian Weis
  • Patent number: 7234058
    Abstract: Group key management techniques are applied to generating pair-wise keys for point-to-point secure communication applications. Nodes participating in a secure communication group each receive a group key and associated policy information. When a first node wishes to establish a secure point-to-point connection to a second node, the first node derives a pairwise key from the group key and policy information, for example, by hashing the group key and information identifying the two nodes. As a result, a pairwise key is generated without exchanging negotiation messages among the two nodes and without expensive asymmetric cryptographic computation approaches.
    Type: Grant
    Filed: October 1, 2002
    Date of Patent: June 19, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Baugher, David McGrew, Jan Vilhuber, Brian Weis
  • Publication number: 20070127457
    Abstract: The present invention provides a method of determining whether database located on a first router is synchronized with the database located on a second router by performing a hash function on the values contained in a link state database to derive a SHA-1 digest value. In an embodiment, the digest value is based on LSA type. The digest value is exchanged initially during a database description packet swap between the first router and second router. If the digest values are the same, the databases are already synchronized. The routers thus skip the database description packet exchange of LSAs in the database and go directly to FULL state, indicating full synchronization between databases on the first and second router and announcing adjacency to each other. If the digest differs, normal database description packet exchange is performed as specified in OSPF.
    Type: Application
    Filed: December 2, 2005
    Publication date: June 7, 2007
    Inventors: Sina Mirtorabi, Abhay Roy, Brian Weis, Scott Fluhrer
  • Publication number: 20070083923
    Abstract: A mechanism for providing strong anti-replay protection at a security gateway in a network for protection against an attacker duplicating encrypted packets. The mechanism assigns a unique sequence number to each encrypted packet and a time stamp. A receiving security gateway rejects packets that have a duplicative sequence number or that is too old to protect itself against replay attacks. Each security gateway checks off the sequence numbers as they are received knowing that the sending security gateway assigns sequence numbers in an increasing order. The receiving security gateway remembers the value of the highest sequence number that it has already seen as well as up to N additional sequence numbers. Any packet with a duplicative sequence number is discarded. In addition to the sequence number, each packet also has an associated time stamp that corresponds to an epoch during which it should be received. If the packet is received after the epoch has expired, the packet is rejected.
    Type: Application
    Filed: October 12, 2005
    Publication date: April 12, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Scott Fluhrer, Brian Weis
  • Publication number: 20070016663
    Abstract: An approach for managing state information by a group of servers that services a group of clients is disclosed. One server is designated as the primary server and is responsible for generating state information to be used by both the servers and the clients. The remaining servers are designated as secondary servers that help to manage the group, but which do not generate the state information. When the primary server fails or is not available due to a network partition event, one of the secondary servers changes role to become the primary server. With a network partition event, each partition can have a primary server, and when the network partition heals, one of the primary servers changes role back to being a secondary server. As a result, the group of servers maintains a consistent set of state information without being vulnerable to the single failure of a server.
    Type: Application
    Filed: July 14, 2005
    Publication date: January 18, 2007
    Inventor: Brian Weis
  • Publication number: 20060239218
    Abstract: Nodes in a network include a pseudo-timestamp in messages or packets, derived from local pseudo-time clocks. When a packet is received, a first time is determined representing when the packet was sent and a second time is determined representing when the packet was received. If the difference between the second time and the first time is greater than a predetermined amount, the packet is considered to be stale and is rejected, thereby deterring replay. Because each node maintains its own clock and time, to keep the clocks relatively synchronized, if a time associated with a timestamp of a received packet is later than a certain amount with respect to the time at the receiver, the receiver's clock is set ahead by an amount that expected to synchronize the receiver's and the sender's clocks. However, a receiver never sets its clock back, to deter attacks.
    Type: Application
    Filed: February 15, 2005
    Publication date: October 26, 2006
    Inventors: Brian Weis, David McGrew
  • Publication number: 20060198368
    Abstract: A method, apparatus and computer program product for providing secure multipoint Internet Protocol Virtual Private Networks (IPVPNs) is presented. A packet lookup is performed in order to determine a next hop. A VPN label is pushed on the packet, as is an IP tunnel header. Group encryption through the use of DGVPN is further utilized. In such a manner secure connectivity and network partitioning are provided in a single solution.
    Type: Application
    Filed: March 4, 2005
    Publication date: September 7, 2006
    Inventors: James Guichard, W. Wainner, John Mullooly, Brian Weis
  • Publication number: 20060184797
    Abstract: Nodes in a network include a pseudo-timestamp in messages or packets, derived from local pseudo-time clocks. When a packet is received, a first time is determined representing when the packet was sent and a second time is determined representing when the packet was received. If the difference between the second time and the first time is greater than a predetermined amount, the packet is considered to be stale and is rejected, thereby deterring replay. Because each node maintains its own clock and time, to keep the clocks relatively synchronized, if a time associated with a timestamp of a received packet is later than a certain amount with respect to the time at the receiver, the receiver's clock is set ahead by an amount that expected to synchronize the receiver's and the sender's clocks. However, a receiver never sets its clock back, to deter attacks.
    Type: Application
    Filed: February 15, 2005
    Publication date: August 17, 2006
    Inventors: Brian Weis, David McGrew
  • Publication number: 20060184999
    Abstract: A method and apparatus for providing routing protocol support for distributing encryption information is presented. Subnet prefixes reachable on a first customer site in an encrypted manner are identified, as are security groups the subnet prefixes belong to. An advertisement is received at a first Customer Edge (CE) device in the first customer site, the advertisement originating from a Customer (C) device in the first customer site. The advertisement indicates links, subnets to be encrypted, and security group identifiers. The prefixes and the security group identifiers are then propagated across a service provider network to a second CE device located in a second customer site. In such a manner, encryption and authentication is expanded further into a customer site, as customer devices are able to indicate to a service provider network infrastructure and other customer devices in other customer sites which local destinations require encryption/authentication.
    Type: Application
    Filed: February 17, 2005
    Publication date: August 17, 2006
    Inventors: James Guichard, W. Wainner, Brian Weis, David McGrew