Patents by Inventor Scott Fluhrer
Scott Fluhrer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230370169Abstract: A method for routing in a quantum network is provided. The method may include receiving parameters including a fidelity with coherence decay time and an entanglement generation rate for each quantum node in a mesh quantum network by a controller, the controller being configured to communicate with each quantum node of a plurality of quantum nodes in the mesh quantum network. Each quantum node includes a quantum memory and a processor. The method may also include analyzing the fidelity with coherence decay time and the entanglement generation rate to yield a determination of a path fidelity with a path coherence decay time and a path entanglement generation rate between at least one pair of quantum nodes. The method may further include, based on the determination, selecting a quantum communication path from a source node to a destination node.Type: ApplicationFiled: July 12, 2023Publication date: November 16, 2023Inventors: Luca Della Chiesa, Louis Gwyn Samuel, Paul Polakos, Scott Fluhrer, Santanu Ganguly
-
Patent number: 11716151Abstract: A method for routing in a quantum network is provided. The method may include receiving parameters including a fidelity with coherence decay time and an entanglement generation rate for each quantum node in a mesh quantum network by a controller, the controller being configured to communicate with each quantum node of a plurality of quantum nodes in the mesh quantum network. Each quantum node includes a quantum memory and a processor. The method may also include analyzing the fidelity with coherence decay time and the entanglement generation rate to yield a determination of a path fidelity with a path coherence decay time and a path entanglement generation rate between at least one pair of quantum nodes. The method may further include, based on the determination, selecting a quantum communication path from a source node to a destination node.Type: GrantFiled: July 22, 2021Date of Patent: August 1, 2023Assignee: Cisco Technology, Inc.Inventors: Luca Della Chiesa, Louis Gwyn Samuel, Paul Polakos, Scott Fluhrer, Santanu Ganguly
-
Publication number: 20230028556Abstract: A method for routing in a quantum network is provided. The method may include receiving parameters including a fidelity with coherence decay time and an entanglement generation rate for each quantum node in a mesh quantum network by a controller, the controller being configured to communicate with each quantum node of a plurality of quantum nodes in the mesh quantum network. Each quantum node includes a quantum memory and a processor. The method may also include analyzing the fidelity with coherence decay time and the entanglement generation rate to yield a determination of a path fidelity with a path coherence decay time and a path entanglement generation rate between at least one pair of quantum nodes. The method may further include, based on the determination, selecting a quantum communication path from a source node to a destination node.Type: ApplicationFiled: July 22, 2021Publication date: January 26, 2023Inventors: Luca Della Chiesa, Louis Gwyn Samuel, Paul Polakos, Scott Fluhrer, Santanu Ganguly
-
Patent number: 11018866Abstract: A server sends information to a client that allows the client to establish a first key at the client. The server then receives a session ID that has been encrypted using the first key. The first key is then established at the server, which can then decrypt the session ID using the first key. After the server validates the session ID, it determines a second key that is different from the first key. The server then receives the session ID encrypted with the second key, and decrypts the session ID encrypted with the second key.Type: GrantFiled: October 18, 2018Date of Patent: May 25, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: James Anil Pramod Kotwal, Christopher Blayne Dreier, David Aaron Wyde, Kellen Mac Arb, David McGrew, Scott Fluhrer
-
Patent number: 10404588Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.Type: GrantFiled: September 7, 2016Date of Patent: September 3, 2019Assignee: Cisco Technology, Inc.Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
-
Publication number: 20190052462Abstract: A server sends information to a client that allows the client to establish a first key at the client. The server then receives a session ID that has been encrypted using the first key. The first key is then established at the server, which can then decrypt the session ID using the first key. After the server validates the session ID, it determines a second key that is different from the first key. The server then receives the session ID encrypted with the second key, and decrypts the session ID encrypted with the second key.Type: ApplicationFiled: October 18, 2018Publication date: February 14, 2019Inventors: James Anil Pramod Kotwal, Chritopher Blayne Dreier, David Aaron Wyde, Kellen Mac Arb, David McGrew, Scott Fluhrer
-
Patent number: 10158487Abstract: A server sends information to a client that allows the client to establish a first key at the client. The server then receives a session ID that has been encrypted using the first key. The first key is then established at the server, which can then decrypt the session ID using the first key. After the server validates the session ID, it determines a second key that is different from the first key. The server then receives the session ID encrypted with the second key, and decrypts the session ID encrypted with the second key.Type: GrantFiled: July 16, 2015Date of Patent: December 18, 2018Assignee: Cisco Technology, Inc.Inventors: James Anil Pramod Kotwal, Christopher Blayne Dreier, David Aaron Wyde, Kellen Mac Arb, David McGrew, Scott Fluhrer
-
Patent number: 9912480Abstract: A network service packet (NSP) header security method includes receiving an NSP on a communication interface, analyzing, by a processor, the NSP in order to identify a plurality of service functions and an associated service function path for the plurality of service functions, identifying, by the processor, which security function or functions may be performed by each of the plurality of service functions on an NSP header to be generated for the NSP, requesting, by the processor, at least one key for securing at least part of the NSP header, receiving the at least one key on the communication interface, generating, by the processor, the NSP header for the NSP, securing, by the processor, the NSP header based on the at least one key, and sending, on the communication interface, the NSP with the NSP header to one of the plurality of service functions.Type: GrantFiled: February 27, 2017Date of Patent: March 6, 2018Assignee: Cisco Technology, Inc.Inventors: Paul Quinn, Scott Fluhrer, Jim Guichard, Tirumaleswar Reddy, Prashanth Patil, David Ward
-
Patent number: 9832175Abstract: Techniques are presented for optimizing secure communications in a network. As disclosed herein, a key server is configured to provision a plurality of routers that are part of a virtual private network. The key server selects a counter value that is part of a security association and calculates a key value. The key server sends the key value, together with the security association, to the plurality of routers that are part of the virtual private network to enable them to exchange encrypted packets with each other in the virtual private network using the key value and the security association. The key server then increments the counter value to a value within a range of counter values capable of being predicted by the plurality of routers that received the key value.Type: GrantFiled: August 8, 2016Date of Patent: November 28, 2017Assignee: Cisco Technology, Inc.Inventors: Lewis Chen, Scott Fluhrer, Warren Scott Wainner, Brian Weis
-
Publication number: 20170237562Abstract: A network service packet (NSP) header security method includes receiving an NSP on a communication interface, analyzing, by a processor, the NSP in order to identify a plurality of service functions and an associated service function path for the plurality of service functions, identifying, by the processor, which security function or functions may be performed by each of the plurality of service functions on an NSP header to be generated for the NSP, requesting, by the processor, at least one key for securing at least part of the NSP header, receiving the at least one key on the communication interface, generating, by the processor, the NSP header for the NSP, securing, by the processor, the NSP header based on the at least one key, and sending, on the communication interface, the NSP with the NSP header to one of the plurality of service functions.Type: ApplicationFiled: February 27, 2017Publication date: August 17, 2017Inventors: Paul QUINN, Scott FLUHRER, Jim GUICHARD, Tirumaleswar REDDY, Prashanth PATIL, David WARD
-
Patent number: 9621520Abstract: A network service packet (NSP) header security method includes receiving an NSP on a communication interface, analyzing, by a processor, the NSP in order to identify a plurality of service functions and an associated service function path for the plurality of service functions, identifying, by the processor, which security function or functions may be performed by each of the plurality of service functions on an NSP header to he generated for the NSP, requesting, by the processor, at least one key for securing at least part of the NSP header, receiving the at least one key on the communication interface, generating, by the processor, the NSP header for the NSP, securing, by the processor, the NSP header based on the at least one key, and sending, on the communication interface, the NSP with the NSP header to one of the plurality of service functions.Type: GrantFiled: May 31, 2015Date of Patent: April 11, 2017Assignee: Cisco Technology, Inc.Inventors: Paul Quinn, Scott Fluhrer, Jim Guichard, Tirumaleswar Reddy, Prashanth Patil, David Ward
-
Publication number: 20170019423Abstract: A server sends information to a client that allows the client to establish a first key at the client. The server then receives a session ID that has been encrypted using the first key. The first key is then established at the server, which can then decrypt the session ID using the first key. After the server validates the session ID, it determines a second key that is different from the first key. The server then receives the session ID encrypted with the second key, and decrypts the session ID encrypted with the second key.Type: ApplicationFiled: July 16, 2015Publication date: January 19, 2017Inventors: James Anil Pramod Kotwal, Christopher Blayne Dreier, David Aaron Wyde, Kellen Mac Arb, David McGrew, Scott Fluhrer
-
Publication number: 20160380894Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.Type: ApplicationFiled: September 7, 2016Publication date: December 29, 2016Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
-
Publication number: 20160344713Abstract: Techniques are presented for optimizing secure communications in a network. As disclosed herein, a key server is configured to provision a plurality of routers that are part of a virtual private network. The key server selects a counter value that is part of a security association and calculates a key value. The key server sends the key value, together with the security association, to the plurality of routers that are part of the virtual private network to enable them to exchange encrypted packets with each other in the virtual private network using the key value and the security association. The key server then increments the counter value to a value within a range of counter values capable of being predicted by the plurality of routers that received the key value.Type: ApplicationFiled: August 8, 2016Publication date: November 24, 2016Inventors: Lewis Chen, Scott Fluhrer, Warren Scott Wainner, Brian Weis
-
Patent number: 9461914Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.Type: GrantFiled: April 7, 2014Date of Patent: October 4, 2016Assignee: Cisco Technology, Inc.Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
-
Publication number: 20160277188Abstract: In one embodiment, a network service packet header security method includes receiving a network service packet, analyzing the network service packet in order to identify a plurality of service functions and an associated service function path for the service functions, identifying which security function or functions may be performed by each of the service functions on a network service packet header to be generated for the network service packet, requesting at least one key for securing at least part of the network service packet header, receiving the at least one key, securing the network service packet header based on the at least one key, and sending the network service packet with the network service packet header to one of the service functions. Related apparatus and methods are also described.Type: ApplicationFiled: May 31, 2015Publication date: September 22, 2016Inventors: Paul QUINN, Scott FLUHRER, Jim GUICHARD, Tirumaleswar REDDY, Prashanth PATIL, David WARD
-
Patent number: 9444796Abstract: Techniques are presented for optimizing secure communications in a network. A first router receives from a second router an encrypted packet with an unknown security association. The first router examines the packet to determine whether the counter value is in a range of predicted counter values. Additionally, a key server is configured to provision routers that are part of a virtual private network. The key server selects a counter value that is part of a security association and calculates a key value. The key server sends the key value together with the security association to enable routers to exchange encrypted packets with each other in the virtual private network using the key value and the security association. The key server increments the counter value to a value within a range of counter values capable of being predicted by the routers.Type: GrantFiled: April 9, 2014Date of Patent: September 13, 2016Assignee: Cisco Technology, Inc.Inventors: Lewis Chen, Scott Fluhrer, Warren Scott Wainner, Brian Weis
-
Publication number: 20150295899Abstract: Techniques are presented for optimizing secure communications in a network. A first router receives from a second router an encrypted packet with an unknown security association. The first router examines the packet to determine whether the counter value is in a range of predicted counter values. Additionally, a key server is configured to provision routers that are part of a virtual private network. The key server selects a counter value that is part of a security association and calculates a key value. The key server sends the key value together with the security association to enable routers to exchange encrypted packets with each other in the virtual private network using the key value and the security association. The key server increments the counter value to a value within a range of counter values capable of being predicted by the routers.Type: ApplicationFiled: April 9, 2014Publication date: October 15, 2015Applicant: Cisco Technology, Inc.Inventors: Lewis Chen, Scott Fluhrer, Warren Scott Wainner, Brian Weis
-
Publication number: 20150288603Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.Type: ApplicationFiled: April 7, 2014Publication date: October 8, 2015Applicant: Cisco Technology, Inc.Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
-
Publication number: 20140044262Abstract: Data to be transmitted across an Optical Transport Network (OTN) is encrypted with a non-malleable encryption algorithm. An authentication code configured to allow authentication of the data with a low latency encryption algorithm is generated. A packet is generated which is configured to be transferred across the OTN and contains the encrypted data and the authentication code. The packet is transmitted across the OTN. Non-malleable encryption, origin authentication, data integrity and anti-replay protection are provided for OTNs over Dense Wavelength Division Multiplexed (DWDM) links. In one example, XTS-AES encryption and GMAC authentication techniques are combined to secure OTN frames.Type: ApplicationFiled: August 9, 2012Publication date: February 13, 2014Applicant: Cisco Technology, Inc.Inventors: Gilberto Loprieno, David McGrew, Fabio Maino, Scott Fluhrer