18537260. SCALABLE IPSEC SERVICES simplified abstract (Cisco Technology, Inc.)
Contents
- 1 SCALABLE IPSEC SERVICES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SCALABLE IPSEC SERVICES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
SCALABLE IPSEC SERVICES
Organization Name
Inventor(s)
Andree Toonk of Vancouver (CA)
Grzegorz Boguslaw Duraj of Vancouver (CA)
Alvin Sai Weng Wong of Delta (CA)
Kyle Mestery of Woodbury MN (US)
SCALABLE IPSEC SERVICES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18537260 titled 'SCALABLE IPSEC SERVICES
Simplified Explanation
The abstract describes a patent application for a system that establishes an Internet Protocol Security traffic flow between two devices using an Internet Key Exchange protocol message and an encryption key.
- The first device receives an Internet Key Exchange protocol message indicating the establishment of an IPSec traffic flow.
- The message is forwarded to a second device, which triggers the population of a key value store with an encryption key.
- The first device obtains a data packet to be transmitted via the IPSec traffic flow.
- The first device encrypts the data packet with the encryption key before transmission.
Potential Applications
This technology can be applied in secure communication systems, VPNs, and network security solutions.
Problems Solved
This technology solves the problem of securely transmitting data over a network by establishing encrypted traffic flows.
Benefits
The benefits of this technology include enhanced data security, protection against unauthorized access, and secure communication channels.
Potential Commercial Applications
The potential commercial applications of this technology include secure messaging platforms, data encryption services, and network security solutions.
Possible Prior Art
One possible prior art for this technology could be existing Internet Key Exchange protocols and encryption key management systems.
Unanswered Questions
1. How does this technology handle key rotation and key management over time? 2. What are the potential performance impacts of encrypting data packets before transmission?
Original Abstract Submitted
An Internet Key Exchange protocol message indicating a first Internet Protocol Security traffic flow is to be established via a first device is obtained at the first device. The Internet Key Exchange protocol message is forwarded from the first device to a second device. An encryption key used to transmit traffic via the first Internet Protocol Security Traffic flow is received at the first device from a key value store. The key value store is populated with the encryption key in response to the second device obtaining the Internet Key Exchange protocol message. A first data packet to be transmitted via the first Internet Protocol Security traffic flow is obtained at the first device. The first device provides the first data packet encrypted with the encryption key of the first Internet Protocol Security traffic flow.