17984617. DETERMINISTIC ADDRESS ROTATION simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Revision as of 03:28, 30 May 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

DETERMINISTIC ADDRESS ROTATION

Organization Name

Cisco Technology, Inc.

Inventor(s)

Ugo Mario Campiglio of Morges (CH)

Jerome Henry of Pittsboro NC (US)

Stephen Michael Orr of Wallkill NY (US)

DETERMINISTIC ADDRESS ROTATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17984617 titled 'DETERMINISTIC ADDRESS ROTATION

Simplified Explanation

The patent application describes methods for deterministic random media access control (MAC) address rotation to allow sharing of an address identity with a trusted wireless network infrastructure. This is achieved by generating a next address based on a previously used address and a seed obtained from a previous association with the trusted network infrastructure.

  • The computing device performs access authentication for a secure connection of an endpoint device to a wireless network.
  • The secure connection is established based on successfully performing the access authentication, and cryptographic information for encrypting network messages is generated.
  • A subsequent device address is generated for a subsequent secure connection of the endpoint device to the wireless network, based on a current device address obtained from the request and the cryptographic information.

Potential Applications

This technology can be applied in secure wireless communication systems, IoT devices, and network infrastructure where address rotation is required for enhanced security.

Problems Solved

1. Address identity sharing with a trusted network infrastructure. 2. Secure connection establishment for endpoint devices in wireless networks.

Benefits

1. Enhanced security through deterministic random MAC address rotation. 2. Efficient and secure establishment of secure connections. 3. Protection against unauthorized access and network attacks.

Potential Commercial Applications

"Secure Wireless Communication Systems: Enhancing Network Security with Deterministic MAC Address Rotation"

Possible Prior Art

There are existing methods for MAC address rotation in wireless networks, but the specific approach of using a seed obtained from a previous association with a trusted network infrastructure to generate subsequent device addresses may be novel.

Unanswered Questions

How does this technology impact network performance and latency in wireless communication systems?

The patent application does not provide information on the potential impact of this technology on network performance and latency. Further research and testing may be needed to evaluate these aspects.

What are the potential challenges or limitations of implementing deterministic random MAC address rotation in practical network environments?

The patent application does not address the challenges or limitations that may arise when implementing deterministic random MAC address rotation in real-world network environments. Understanding these factors is crucial for successful deployment and adoption of the technology.


Original Abstract Submitted

Methods that support deterministic random media access control (MAC) address rotation that allows sharing of an address identity with a trusted wireless network infrastructure by generating a next address based on a previously used address and a seed obtained from a previous association with the trusted network infrastructure. In these methods, a computing device obtains a request for a secure connection of an endpoint device to a wireless network. The computing device performs an access authentication for the secure connection and establishes the secure connection of the endpoint device to the wireless network based on successfully performing the access authentication, in which cryptographic information for encrypting one or more network messages is generated. The computing device further generates a subsequent device address for a subsequent secure connection of the endpoint device to the wireless network, based on a current device address obtained from the request and the cryptographic information.