-
公开(公告)号:US11140177B2
公开(公告)日:2021-10-05
申请号:US16118699
申请日:2018-08-31
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Luca Muscariello , Alberto Compagno , Giovanna Carofiglio
Abstract: An electronic device of a content producer generates a chunk of data, associates a location-independent name with the chunk of data, generates a signature for the chunk of data, attaches the signature to the chunk of data, and transmits the chunk of data, with the signature attached, to one or more user devices in response to respective requests. The signature is generated based on the data in the chunk, using a private key of the electronic device. The electronic device also stores information, including a specification of a public key associated with the private key, in a first ledger entry of a blockchain, to provide the one or more user devices with access to the public key. A user device may obtain the public key and use it to verify the chunk of data.
-
12.
公开(公告)号:US11095702B2
公开(公告)日:2021-08-17
申请号:US16405154
申请日:2019-05-07
Applicant: Cisco Technology, Inc.
Inventor: Michele Papalini , Giovanna Carofiglio , Luca Muscariello , Alberto Compagno
Abstract: A consumer sends to a producer Interests to request data packets of a data stream that are generated at a production rate. Each data packet includes a name of the data stream, a segment of data, and a current segment number that identifies the data packet in the data stream and that increments as the data packets are generated. The Interests include the name and segment numbers of segments requested by the Interests. The consumer synchronizes the segment numbers with the current segment numbers and a rate for sending the Interests to the production rate. The consumer sends to the producer the Interests at the rate and with the segment numbers as synchronized, in order to minimize a delay time between when the data packets are generated and when the data packets are received at the consumer. The consumer receives from the producer data packets satisfying the Interests.
-
13.
公开(公告)号:US20180241669A1
公开(公告)日:2018-08-23
申请号:US15658603
申请日:2017-07-25
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Luca Muscariello , Giovanna Carofiglio , Jordan Augé , Alberto Compagno
IPC: H04L12/741 , H04L29/06
CPC classification number: H04L45/74 , H04L9/3239 , H04L45/04 , H04L45/741 , H04L61/1511 , H04L61/1582 , H04L61/2503 , H04L63/0807 , H04L63/10 , H04L67/1097 , H04L67/2814 , H04L67/327 , H04L2209/38 , H04W12/06
Abstract: A method is provided in one example embodiment and may include generating a first interest message for a consumer application of a first node, wherein the first interest message comprises a content name within an Internet Protocol identifying content to be received by the first node; opening an Information-Centric Networking (ICN) socket for the first node, wherein the ICN socket is associated with the content name and the consumer application; and transmitting the first interest message to an IP network, wherein the IP network comprises at least one hybrid ICN-enabled routing node that is capable of performing packet forwarding using both IP networking constructs and ICN constructs.
-
公开(公告)号:US11818142B2
公开(公告)日:2023-11-14
申请号:US17410286
申请日:2021-08-24
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Luca Muscariello , Alberto Compagno , Giovanna Carofiglio
IPC: H04L9/40 , H04L9/30 , H04L9/32 , H04L61/4511 , H04L61/5007 , H04L9/00
CPC classification number: H04L63/126 , H04L9/30 , H04L9/3247 , H04L61/4511 , H04L61/5007 , H04L9/50
Abstract: An electronic device of a content producer generates a chunk of data, associates a location-independent name with the chunk of data, generates a signature for the chunk of data, attaches the signature to the chunk of data, and transmits the chunk of data, with the signature attached, to one or more user devices in response to respective requests. The signature is generated based on the data in the chunk, using a private key of the electronic device. The electronic device also stores information, including a specification of a public key associated with the private key, in a first ledger entry of a blockchain, to provide the one or more user devices with access to the public key. A user device may obtain the public key and use it to verify the chunk of data.
-
公开(公告)号:US20210120038A1
公开(公告)日:2021-04-22
申请号:US16656621
申请日:2019-10-18
Applicant: Cisco Technology, Inc.
Inventor: Alberto Compagno , Luca Muscariello
Abstract: Presented herein is a solution in which a Producer that provides Transport Layer Security (TLS) over a hybrid Information Centric Network (hICN) announces two different hICN prefixes or namespaces. One hICN prefix is for performing a TLS handshake (also called a handshake prefix or handshake namespace) and another hICN prefix (also called a secure prefix or secure namespace) is to publish content in a secure, and confidential manner with a Consumer that correctly performs a TLS handshake. While the handshake prefix is public and shared by multiple Consumers, a secure prefix is uniquely assigned to a Consumer after the TLS handshake successfully terminates. Content published under the secure prefix is encrypted with the encryption key established during the TLS handshake. Names used in the secure namespace are private, meaning only the Consumer and Producer that perform the handshake can infer any information about a content by looking on the name.
-
公开(公告)号:US10911207B1
公开(公告)日:2021-02-02
申请号:US16721717
申请日:2019-12-19
Applicant: Cisco Technology, Inc.
Inventor: Alberto Compagno , Michele Papalini , Luca Muscariello , Giovanna Carofiglio
IPC: G06F15/173 , H04L5/00 , H04L1/18 , H04L1/16 , H04L12/807 , H04L29/06
Abstract: This disclosure describes techniques for employing a reusable acknowledgment in communications among network devices. The techniques include generating a reusable negative acknowledgment (NACK) in response to a request for data that are unavailable. The reusable NACK may be sent as a response for at least some additional requests for unavailable data, rather than generating a new NACK for each request. As such, the reusable NACK may help decrease the computational load for a network device. In some cases, the use of a reusable NACK may help lessen the impacts of denial-of-service type attacks across a network.
-
公开(公告)号:US20190306233A1
公开(公告)日:2019-10-03
申请号:US15943775
申请日:2018-04-03
Applicant: Cisco Technology, Inc.
Inventor: Alberto Compagno , Luca Muscariello , Giovanna Carofiglio , Marcel Paul Enguehard
Abstract: In one embodiment, a device in a network receives an interest request for one or more pieces of content data available in the network. The interest request specifies the one or more pieces of content data via one or more bits sets in a content request bitmap of the interest request, each bit of the content request bitmap being associated with a different piece of content data. The device compares the content request bitmap to a content availability bitmap in a forwarding information base (FIB) of the device that is associated with a particular interface of the device and each bit of the content availability bitmap indicates whether a particular piece of content data is available via the particular interface. The device forwards the interest request via the particular interface, based on the comparison between the content request bitmap and the content availability bitmap in the FIB of the device.
-
公开(公告)号:US20190297063A1
公开(公告)日:2019-09-26
申请号:US15928265
申请日:2018-03-22
Applicant: Cisco Technology, Inc.
Inventor: Fabio De Gaspari , Alberto Compagno , Luca Muscariello , Giovanna Carofiglio
Abstract: A producer communicates over a network with a user application in an infrastructure-as-a-service (IaaS) and an IaaS node. The producer encrypts content with first encryption using a first key and second encryption using a second key, to produce twice encrypted content. The producer encrypts the second key with attribute-based encryption and symmetric encryption using an IaaS key, to produce a twice encrypted second key. The producer provides to the user application the twice encrypted content, the twice encrypted second key, and key information configured to remove the first encryption from the twice encrypted content. The producer provides to the IaaS node the IaaS key to enable the IaaS node to remove the symmetric encryption from the twice encrypted second key, such that the user application and the IaaS node are constrained to exchange with each other key-related information and intermediate decryption results in order to recover the content.
-
-
-
-
-
-
-