Patents by Inventor Eric Voit
Eric Voit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12363175Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for secure network routing. A method includes: receiving, at a network node, an advertisement message for a network route including an IP address prefix; receiving, at the network node, a route origin authorization associated with the IP address prefix, the route origin authorization including a digital signature and a security requirement of a route to a destination that corresponds to the IP address prefix; determining, by the network node, one or more network nodes satisfies the security requirement to yield a determination; and determining, by the network node, to route network traffic to the IP address prefix based on the determination. In one example, the method can include, when the one or more network nodes satisfies the security requirement, advertising the route to the one or more network nodes that satisfies the security requirement.Type: GrantFiled: August 19, 2021Date of Patent: July 15, 2025Assignee: Cisco Technology, Inc.Inventors: Swadesh Agrawal, Dhananjaya Kasargod Rao, Jakob Heitz, Eric Voit
-
Patent number: 12363191Abstract: A verifier peer system transmits a request to an application of another peer system to obtain integrity data of the application. In response to the request, the verifier peer system obtains a response that includes kernel secure boot metrics of the other peer system and integrity data of the application and of any application dependencies. If the verifier peer system determines that the response is valid, the verifier peer system evaluates the integrity data and the kernel secure boot metrics against a set of Known Good Values to determine whether the integrity data and the kernel secure boot metrics are valid. If the integrity data and the kernel secure boot metrics are valid, the verifier peer system determines that the other peer system is trustworthy.Type: GrantFiled: January 19, 2024Date of Patent: July 15, 2025Assignee: Cisco Technology, Inc.Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners
-
Publication number: 20250220051Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for providing security postures for a service provided by a heterogenous system. A method for verifying trust by a service node includes receiving a request for a security information of the service node from a client device, wherein the request includes information identifying a service to receive from the service node, identifying a related node to communicate with the service node based on the service, after identifying the related node, requesting a security information of the related node, generating a composite security information from the security information of the service node and the security information of the related node, and sending the composite security information to the client device. The composite security information provides security claims for a service implemented by a heterogenous devices that have different trusted execution environments.Type: ApplicationFiled: March 18, 2025Publication date: July 3, 2025Inventors: Eric Voit, Pradeep Kumar Kathail, Avinash Kalyanaraman
-
Patent number: 12294614Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for providing security postures for a service provided by a heterogenous system. A method for verifying trust by a service node includes receiving a request for a security information of the service node from a client device, wherein the request includes information identifying a service to receive from the service node, identifying a related node to communicate with the service node based on the service, after identifying the related node, requesting a security information of the related node, generating a composite security information from the security information of the service node and the security information of the related node, and sending the composite security information to the client device. The composite security information provides security claims for a service implemented by a heterogenous devices that have different trusted execution environments.Type: GrantFiled: January 25, 2022Date of Patent: May 6, 2025Assignee: Cisco Technology, Inc.Inventors: Eric Voit, Pradeep Kumar Kathail, Avinash Kalyanaraman
-
Publication number: 20250141855Abstract: The disclosed technology addresses the need in the art for systems and methods of dynamic but stateless NAT encryption and decryption. The disclosed technology provides a robust encryption/decryption algorithm for concurrently obfuscating source and destination IPv6 addresses for SNAP deployments with 100% reversal and zero collisions, thereby providing protection to both the source and destination IPv6 simultaneously.Type: ApplicationFiled: October 31, 2023Publication date: May 1, 2025Inventors: Rajamathangi Subramanian, David Maluf, Eric Voit
-
Publication number: 20250071089Abstract: Techniques for varying locations of virtual networks associated with endpoints using Network Address Translation (NAT), Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS). Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a virtual IP (VIP) address that is mapped to the client device and the endpoint device. The VIP address may be selected based on a number of factors (e.g., power usage, privacy requirements, virtual distances, etc.). In this way, IP addresses of servers are obfuscated by a virtual network of VIP addresses that can be periodically rotated and/or load balanced. The client device may then communicate data packets to the server using the VIP address as the destination address, and a virtual network service that works in conjunction with DNS can convert the VIP address to the actual IP address of the server using NAT and forward the data packet onto the server.Type: ApplicationFiled: September 13, 2024Publication date: February 27, 2025Inventors: Pascal Thubert, Eric Voit, Eric Levy-Abegnoli, Patrick Wetterwald, Jonas Zaddach
-
Publication number: 20250031133Abstract: Techniques for establishing connections between user devices and access points to connect to networks. Access points may indicate privacy-support capabilities, enabling a user device to discover privacy-capable access networks, and use this capability for network selection. Furthermore, the techniques enable the user device to request to enable and/or disable privacy support on an on-demand basis. The techniques described herein include the use of an access point that indicates the network's privacy capability to an endpoint device (e.g., source device, user device, etc.) over one or more link-layer messages, IP address configuration mechanisms, and over authentication protocols.Type: ApplicationFiled: July 18, 2023Publication date: January 23, 2025Inventors: Srinath Gundavelli, Pradeep Kumar Kathail, Eric Voit, David A. Maluf, Ali Sajassi
-
Patent number: 12199969Abstract: An enclave manager of a network enclave obtains a request to retrieve configuration information and state information corresponding to compute devices and network devices comprising a network enclave. The request specifies a set of parameters of the configuration information and the state information usable to generate a response to the request. The enclave manager evaluates the compute devices, the network devices, and network connections among these devices within the network enclave to obtain the configuration information and the state information. Based on the configuration information and the state information, the enclave manager determines whether the network enclave is trustworthy. Based on the parameters of the request, the enclave manager generates a response indicating a summary that is used to identify the trustworthiness of the network enclave.Type: GrantFiled: October 5, 2023Date of Patent: January 14, 2025Assignee: Cisco Technology, Inc.Inventors: David Delano Ward, Robert Stephen Rodgers, Andrew Phillips Thurber, Eric Voit, Thomas John Giuli
-
Publication number: 20240372735Abstract: Techniques performed by offload computing devices that establish and advertise confidential computing environments for use by other computing devices. The offload computing devices may each be executing an attestable bootloader that creates the confidential computing environments, advertises the available resources to the other computing devices, establish secure encrypted channels with the other devices, and run processes in the confidential computing environments on behalf of the other computing devices. In addition to advertising the availability of computing resources in the confidential environments, the offload computing devices may additionally advertise performance metrics associated with the confidential computing environments. Computing devices may receive the advertisements, and send requests to the offload computing devices to run processes on their behalf in the confidential computing environments.Type: ApplicationFiled: May 4, 2023Publication date: November 7, 2024Inventors: Eric Voit, Pascal Thubert, Frank Brockners
-
Publication number: 20240297868Abstract: Techniques for using Network Address Translation (NAT), Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS) to anonymize server-side addresses in data communications. Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a random IP address that is mapped to the client device and the endpoint device. In this way, IP addresses of servers are obfuscated by a random IP address that cannot be used to identify the endpoint device or service. The client device may then communicate data packets to the server using the random IP address as the destination address, and a gateway that works in conjunction with DNS can convert the random IP address to the actual IP address of the server using NAT and forward the data packet onto the server.Type: ApplicationFiled: May 9, 2024Publication date: September 5, 2024Inventors: David A. Maluf, Srinath Gundavelli, Pascal Thubert, Pradeep Kumar Kathail, Eric Levy-Abegnoli, Eric Voit, Ali Sajassi
-
Publication number: 20240265126Abstract: Techniques for maintaining geographic-based data privacy rules in networked environments. An example method includes receiving, from a first subsystem, a query for data; receiving, from the first subsystem, an aggregate passport indicating at least one geographic region in which the first subsystem and at least one second subsystem connected to the first subsystem operates; and determining that the at least one geographic region complies with at least one data privacy rule that applies to the entity. Based on determining that the at least one geographic region complies with the at least one data privacy rule that applies to the entity, the example method further includes transmitting, to the first subsystem, at least a portion of the data; and storing an indication that the at least the portion of the data has been shared.Type: ApplicationFiled: March 28, 2024Publication date: August 8, 2024Inventors: Nancy Patricia Cam-Winget, Eric Voit
-
Publication number: 20240248992Abstract: This disclosure describes techniques for selectively placing and maintaining sensitive workloads in subsystems that achieve a minimum level of trustworthiness. An example method includes identifying at least one trustworthiness requirement associated with an application and transmitting, to a first subsystem, a request for at least one trustworthiness characteristic of the first subsystem and at least one second subsystem connected to the first subsystem. A response indicating the at least one trustworthiness characteristic is received from the first subsystem. The example method further includes determining that the at least one trustworthiness characteristic satisfies the at least one trustworthiness requirement; and causing the application to operate on a mesh comprising the first subsystem and the at least one second subsystem.Type: ApplicationFiled: March 11, 2024Publication date: July 25, 2024Inventors: Eric Voit, Einar Nilsen-Nygaard, Frank Brockners, Pradeep Kumar Kathail
-
Patent number: 12034707Abstract: Techniques for using Network Address Translation (NAT), Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS) to anonymize server-side addresses in data communications. Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a random IP address that is mapped to the client device and the endpoint device. In this way, IP addresses of servers are obfuscated by a random IP address that cannot be used to identify the endpoint device or service. The client device may then communicate data packets to the server using the random IP address as the destination address, and a gateway that works in conjunction with DNS can convert the random IP address to the actual IP address of the server using NAT and forward the data packet onto the server.Type: GrantFiled: February 1, 2023Date of Patent: July 9, 2024Assignee: Cisco Technology, Inc.Inventors: David A. Maluf, Srinath Gundavelli, Pascal Thubert, Pradeep Kumar Kathail, Eric Levy-Abegnoli, Eric Voit, Ali Sajassi
-
Publication number: 20240195868Abstract: A verifier peer system transmits a request to an application of another peer system to obtain integrity data of the application. In response to the request, the verifier peer system obtains a response that includes kernel secure boot metrics of the other peer system and integrity data of the application and of any application dependencies. If the verifier peer system determines that the response is valid, the verifier peer system evaluates the integrity data and the kernel secure boot metrics against a set of Known Good Values to determine whether the integrity data and the kernel secure boot metrics are valid. If the integrity data and the kernel secure boot metrics are valid, the verifier peer system determines that the other peer system is trustworthy.Type: ApplicationFiled: January 19, 2024Publication date: June 13, 2024Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners
-
Patent number: 11972007Abstract: Techniques for maintaining geographic-based data privacy rules in networked environments. An example method includes receiving a request from a user device; generating, based on the request, a query for data associated with fulfilling the request; transmitting, to a data controller, the query; transmitting, to the data controller, an indication of a geographic region in which at least one device implementing the entity is located; and receiving, from the data controller, a portion of the data associated with fulfilling the request.Type: GrantFiled: December 9, 2021Date of Patent: April 30, 2024Assignee: Cisco Technology, Inc.Inventors: Nancy Patricia Cam-Winget, Eric Voit
-
Patent number: 11960607Abstract: This disclosure describes techniques for selectively placing and maintaining sensitive workloads in subsystems that achieve a minimum level of trustworthiness. An example method includes identifying at least one trustworthiness requirement associated with an application and transmitting, to a first subsystem, a request for at least one trustworthiness characteristic of the first subsystem and at least one second subsystem connected to the first subsystem. A response indicating the at least one trustworthiness characteristic is received from the first subsystem. The example method further includes determining that the at least one trustworthiness characteristic satisfies the at least one trustworthiness requirement; and causing the application to operate on a mesh comprising the first subsystem and the at least one second subsystem.Type: GrantFiled: December 9, 2021Date of Patent: April 16, 2024Assignee: Cisco Technology, Inc.Inventors: Eric Voit, Einar Nilsen-Nygaard, Frank Brockners, Pradeep Kumar Kathail
-
Patent number: 11956273Abstract: Systems, methods, and computer-readable media for discovering trustworthy devices through attestation and authenticating devices through mutual attestation. A relying node in a network environment can receive attestation information from an attester node in the network environment as part of a unidirectional push of information from the attester node according to a unidirectional link layer communication scheme. A trustworthiness of the attester node can be verified by identifying a level of trust of the attester node from the attestation information. Further, network service access of the attester node through the relying node in the network environment can be controlled based on the level of trust of the attester node identified from the attestation information.Type: GrantFiled: August 8, 2022Date of Patent: April 9, 2024Assignee: Cisco Technology, Inc.Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners
-
Patent number: 11949593Abstract: Stateless address translation at an Autonomous System (AS) boundary for host privacy may be provided. An address associated with a host device in the AS may be received. The address may comprise a network prefix and an interface identifier (ID). Then a cypher value may be assigned to a cypher bit range in the network prefix. The cypher value may be associated with a first cypher algorithm of a plurality of cypher algorithms. Next, the address may be encoded wherein encoding the address comprises applying the first cypher algorithm to encode a coding bit range in the address that is less significant than the cypher bit range. The encoded address may then be used for flows from the host that egress the AS.Type: GrantFiled: May 10, 2022Date of Patent: April 2, 2024Assignee: Cisco Technology, Inc.Inventors: Pradeep Kumar Kathail, Eric Voit, David A. Maluf
-
Publication number: 20240106745Abstract: Personal network Software Defined-Wide Area Networks (SD-WANs) with attested permissions may be provided. A first one of a plurality Personal Area Network (PAN) devices in a PAN may seed a routing table entry for at least one application that the first one of the plurality PAN devices supports. The routing table entry may include at least one characteristic associated with an egress link between the first one of the plurality PAN devices and a device outside of the PAN. The routing table entry may be exchanged among the plurality of PAN devices in the PAN. Then data may be routed, based on the exchanged routing table entry, in the PAN through the first one of the plurality PAN devices through the egress link to the device outside of the PAN.Type: ApplicationFiled: September 26, 2022Publication date: March 28, 2024Applicant: Cisco Technology, Inc.Inventors: Eric Voit, Pascal Thubert, Pradeep Kumar Kathail
-
Patent number: 11934525Abstract: Technologies for attestation techniques, systems, and methods to confirm the integrity of a device for establishing and/or maintaining a trustworthy encrypted network session. An example method can include sending, via a server and using a cryptographic security protocol, a message associated with establishing an encrypted network session; receiving a response from a client device; identifying a level of trust of the client device based on the response; determining whether to perform a next step in the cryptographic security protocol based on the level of trust, wherein the cryptographic security protocol comprises at least one of a Secure Shell (SSH) protocol, a Transport Layer Security (TLS) protocol, a Secure Sockets Layer (SSL) protocol, and an Internet Protocol Security (IPsec) protocol.Type: GrantFiled: April 4, 2022Date of Patent: March 19, 2024Assignee: Cisco Technology, Inc.Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners