18537260. SCALABLE IPSEC SERVICES simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Revision as of 04:31, 16 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SCALABLE IPSEC SERVICES

Organization Name

Cisco Technology, Inc.

Inventor(s)

Andree Toonk of Vancouver (CA)

Grzegorz Boguslaw Duraj of Vancouver (CA)

Alvin Sai Weng Wong of Delta (CA)

Kyle Mestery of Woodbury MN (US)

SCALABLE IPSEC SERVICES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18537260 titled 'SCALABLE IPSEC SERVICES

Simplified Explanation

The abstract describes a patent application for a system that establishes an Internet Protocol Security traffic flow between two devices using an Internet Key Exchange protocol message and an encryption key.

  • The first device receives an Internet Key Exchange protocol message indicating the establishment of an IPSec traffic flow.
  • The message is forwarded to a second device, which triggers the population of a key value store with an encryption key.
  • The first device obtains a data packet to be transmitted via the IPSec traffic flow.
  • The first device encrypts the data packet with the encryption key before transmission.

Potential Applications

This technology can be applied in secure communication systems, VPNs, and network security solutions.

Problems Solved

This technology solves the problem of securely transmitting data over a network by establishing encrypted traffic flows.

Benefits

The benefits of this technology include enhanced data security, protection against unauthorized access, and secure communication channels.

Potential Commercial Applications

The potential commercial applications of this technology include secure messaging platforms, data encryption services, and network security solutions.

Possible Prior Art

One possible prior art for this technology could be existing Internet Key Exchange protocols and encryption key management systems.

Unanswered Questions

1. How does this technology handle key rotation and key management over time? 2. What are the potential performance impacts of encrypting data packets before transmission?


Original Abstract Submitted

An Internet Key Exchange protocol message indicating a first Internet Protocol Security traffic flow is to be established via a first device is obtained at the first device. The Internet Key Exchange protocol message is forwarded from the first device to a second device. An encryption key used to transmit traffic via the first Internet Protocol Security Traffic flow is received at the first device from a key value store. The key value store is populated with the encryption key in response to the second device obtaining the Internet Key Exchange protocol message. A first data packet to be transmitted via the first Internet Protocol Security traffic flow is obtained at the first device. The first device provides the first data packet encrypted with the encryption key of the first Internet Protocol Security traffic flow.