INLINE SECURITY KEY EXCHANGE
    1.
    发明申请

    公开(公告)号:US20230131877A1

    公开(公告)日:2023-04-27

    申请号:US17651599

    申请日:2022-02-18

    Abstract: Techniques are disclosed for inline security key exchanges between network devices. An example network device includes one or more processors and memory coupled to the one or more processors. The memory stores instructions that, upon execution, cause one or more processors to obtain a first payload key and obtain a path key. The instructions cause the one or more processors to encrypt a first payload of a first packet using the first payload key and insert the first payload key into first metadata of the first packet. The instructions cause the one or more processors to encrypt the first metadata using the path key and send the first packet to another network device.

    INLINE SECURITY KEY EXCHANGE
    2.
    发明公开

    公开(公告)号:US20240340163A1

    公开(公告)日:2024-10-10

    申请号:US18745443

    申请日:2024-06-17

    CPC classification number: H04L9/0825 H04L9/0827 H04L9/0891 H04L45/42 H04L45/74

    Abstract: Techniques are disclosed for inline security key exchanges between network devices. An example network device includes one or more processors and memory coupled to the one or more processors. The memory stores instructions that, upon execution, cause one or more processors to obtain a first payload key and obtain a path key. The instructions cause the one or more processors to encrypt a first payload of a first packet using the first payload key and insert the first payload key into first metadata of the first packet. The instructions cause the one or more processors to encrypt the first metadata using the path key and send the first packet to another network device.

    Inline security key exchange
    3.
    发明授权

    公开(公告)号:US12041162B2

    公开(公告)日:2024-07-16

    申请号:US17651599

    申请日:2022-02-18

    CPC classification number: H04L9/0825 H04L9/0827 H04L9/0891 H04L45/42 H04L45/74

    Abstract: Techniques are disclosed for inline security key exchanges between network devices. An example network device includes one or more processors and memory coupled to the one or more processors. The memory stores instructions that, upon execution, cause one or more processors to obtain a first payload key and obtain a path key. The instructions cause the one or more processors to encrypt a first payload of a first packet using the first payload key and insert the first payload key into first metadata of the first packet. The instructions cause the one or more processors to encrypt the first metadata using the path key and send the first packet to another network device.

Patent Agency Ranking