Patents by Inventor Eitan Ben-Nun

Eitan Ben-Nun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10178181
    Abstract: An interposer is provided that is configured to interpose into an application security protocol exchange by obtaining application session security state. The interposer does this without holding any private keying material of client or server. An out-of-band Security Assistant Key Escrow service (SAS/SAKE) is also provided. The SAKE resides in the secure physical network perimeter and holds the private keying material required to derive session keys for interposing into application security protocol. During a security protocol handshake, the interposer sends SAKE security protocol handshake messages and in return receives from the SAKE session security state that allows it to participate in application security protocol.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: January 8, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Eitan Ben-Nun, Michael Zayats, Daniel G. Wing, Kirtesh Patil, Jaideep Padhye, Manohar B. Hungund, Saravanan Agasaveeran
  • Patent number: 9998428
    Abstract: In one embodiment, a device in a network maintains first and second routing tables associated with a virtual private network (VPN) tunnel. The first and second routing tables comprise routing information used to route packets external to a particular routing domain. The device routes a first packet in the network via the VPN tunnel and a second tunnel that encapsulates the VPN tunnel, using the routing information in the first routing table. The device receives a second packet via the VPN tunnel that was routed to the device using the routing information in the second routing table and bypasses the second tunnel.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: June 12, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Michael L. Sullenberger, Manish Kumar, Eitan Ben-Nun
  • Patent number: 9729348
    Abstract: In one embodiment, a device in a network identifies a translated source network address for a tunnel source of a tunnel-in-tunnel packet. The device includes the translated source network address within a header of the packet. The header of the packet identifies an inner tunnel that is encapsulated within an outer tunnel during transmission of the packet within the network. The device sends the packet with the translated source network address within the header of the packet.
    Type: Grant
    Filed: June 4, 2015
    Date of Patent: August 8, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Michael L. Sullenberger, Manish Kumar, Eitan Ben-Nun, Anand Oswal
  • Publication number: 20160380973
    Abstract: In one embodiment, a device in a network maintains first and second routing tables associated with a virtual private network (VPN) tunnel. The first and second routing tables comprise routing information used to route packets external to a particular routing domain. The device routes a first packet in the network via the VPN tunnel and a second tunnel that encapsulates the VPN tunnel, using the routing information in the first routing table. The device receives a second packet via the VPN tunnel that was routed to the device using the routing information in the second routing table and bypasses the second tunnel.
    Type: Application
    Filed: June 29, 2015
    Publication date: December 29, 2016
    Inventors: Michael T. Sullenberger, Manish Kumar, Eitan Ben-Nun
  • Publication number: 20160359738
    Abstract: In one embodiment, a device in a network identifies a translated source network address for a tunnel source of a tunnel-in-tunnel packet. The device includes the translated source network address within a header of the packet. The header of the packet identifies an inner tunnel that is encapsulated within an outer tunnel during transmission of the packet within the network. The device sends the packet with the translated source network address within the header of the packet.
    Type: Application
    Filed: June 4, 2015
    Publication date: December 8, 2016
    Inventors: Michael L. Sullenberger, Manish Kumar, Eitan Ben-Nun, Anand Oswal
  • Publication number: 20150288679
    Abstract: An interposer is provided that is configured to interpose into an application security protocol exchange by obtaining application session security state. The interposer does this without holding any private keying material of client or server. An out-of-band Security Assistant Key Escrow service (SAS/SAKE) is also provided. The SAKE resides in the secure physical network perimeter and holds the private keying material required to derive session keys for interposing into application security protocol. During a security protocol handshake, the interposer sends SAKE security protocol handshake messages and in return receives from the SAKE session security state that allows it to participate in application security protocol.
    Type: Application
    Filed: July 10, 2014
    Publication date: October 8, 2015
    Inventors: Eitan Ben-Nun, Michael Zayats, Daniel G. Wing, Kirtesh Patil, Jaideep Padhye, Manohar B. Hungund, Saravanan Agasaveeran
  • Publication number: 20120124430
    Abstract: Consistent with embodiments of the present invention, a method may be provided comprising sending a first bind request with an association group ID of zero. A first association group with a first association group ID may then be created. The first association group ID may be switched to a second association group ID in an acknowledgement message. A second bind request may then be sent with the second association group ID. The second association group ID may be switched to the first association group ID in the second bind request after the bind request has been sent. After receiving the second bind request, it may be determined whether the association group ID in the second bind request is the same as the first association group ID. A failure message may be sent if the association group ID in the second bind request is not the same as the first association group ID.
    Type: Application
    Filed: November 17, 2010
    Publication date: May 17, 2012
    Applicant: Cisco Technology, Inc.
    Inventors: Srinivas Dharmasanam, Eitan Ben-Nun, Saravanan Agasaveeran