ENABLING ZERO-TOUCH BOOTSTRAP FOR DEVICES ACROSS NETWORK PERIMETER FIREWALLS

    公开(公告)号:US20190149538A1

    公开(公告)日:2019-05-16

    申请号:US15946003

    申请日:2018-04-05

    Abstract: A method includes establishing an application layer transport layer security (ATLS) connection between a network device and a cloud server by sending, from the network device, TLS records in transport protocol (e.g., HTTP) message bodies to the cloud server, the ATLS connection transiting at least one transport layer security (TLS) proxy device, receiving, from the cloud server via the ATLS connection, an identifier for a certificate authority, establishing a connection with the certificate authority associated with the identifier and, in turn, receiving from the certificate authority credentials to access an application service different from the cloud server and the certificate authority, and connecting to the application service using the credentials received from the certificate authority.

    Discovering security devices located on a call path and extending bindings at those discovered security devices
    2.
    发明授权
    Discovering security devices located on a call path and extending bindings at those discovered security devices 有权
    发现位于通话路径上的安全设备,并在发现的安全设备上扩展绑定

    公开(公告)号:US09054922B2

    公开(公告)日:2015-06-09

    申请号:US13754220

    申请日:2013-01-30

    Abstract: In one embodiment, an endpoint elicits a pattern of STUN responses to identify security devices located on a call path. The endpoint then uses address information from the identified security devices to establish an efficient media flow with a remote endpoint. The endpoint can optimize the number of network devices and network paths that process the endpoint's keepalive message. Additionally, the endpoint may request custom inactivity timeouts with each of the identified security devices for reducing bandwidth consumed by keepalive traffic.

    Abstract translation: 在一个实施例中,端点引出STUN响应的模式以识别位于呼叫路径上的安全设备。 然后,端点使用来自所识别的安全设备的地址信息来建立与远程端点的有效媒体流。 端点可以优化处理端点的keepalive消息的网络设备和网络路径的数量。 此外,端点可以请求自定义的不活动超时与每个已标识的安全设备,以减少由keepalive流量消耗的带宽。

    Enabling zero-touch bootstrap for devices across network perimeter firewalls

    公开(公告)号:US11025608B2

    公开(公告)日:2021-06-01

    申请号:US15946003

    申请日:2018-04-05

    Abstract: A method includes establishing an application layer transport layer security (ATLS) connection between a network device and a cloud server by sending, from the network device, TLS records in transport protocol (e.g., HTTP) message bodies to the cloud server, the ATLS connection transiting at least one transport layer security (TLS) proxy device, receiving, from the cloud server via the ATLS connection, an identifier for a certificate authority, establishing a connection with the certificate authority associated with the identifier and, in turn, receiving from the certificate authority credentials to access an application service different from the cloud server and the certificate authority, and connecting to the application service using the credentials received from the certificate authority.

    Discovering Security Devices Located on a Call Path and Extending Bindings at those Discovered Security Devices
    4.
    发明申请
    Discovering Security Devices Located on a Call Path and Extending Bindings at those Discovered Security Devices 审中-公开
    发现位于呼叫路径上的安全设备,并在发现的安全设备上扩展绑定

    公开(公告)号:US20130145044A1

    公开(公告)日:2013-06-06

    申请号:US13754220

    申请日:2013-01-30

    Abstract: In one embodiment, an endpoint elicits a pattern of STUN responses to identify security devices located on a call path. The endpoint then uses address information from the identified security devices to establish an efficient media flow with a remote endpoint. The endpoint can optimize the number of network devices and network paths that process the endpoint's keepalive message. Additionally, the endpoint may request custom inactivity timeouts with each of the identified security devices for reducing bandwidth consumed by keepalive traffic.

    Abstract translation: 在一个实施例中,端点引出STUN响应的模式以识别位于呼叫路径上的安全设备。 然后,端点使用来自所识别的安全设备的地址信息来建立与远程端点的有效媒体流。 端点可以优化处理端点的keepalive消息的网络设备和网络路径的数量。 此外,端点可以请求自定义的不活动超时与每个已标识的安全设备,以减少由keepalive流量消耗的带宽。

    Beacon spoofing prevention
    5.
    发明授权

    公开(公告)号:US10171496B2

    公开(公告)日:2019-01-01

    申请号:US15000507

    申请日:2016-01-19

    Abstract: In one embodiment, a beacon signal is received from a beacon device. Either a mobile device or a server identifies a beacon authentication value from the beacon signal. Either the mobile device or the server calculates a local verification value from a security algorithm. A comparison of the authentication value to the local verification value is performed, and a location service is provided based on the comparison.

Patent Agency Ranking