17971285. MULTI-LAYERED SECURE EQUIPMENT ACCESS simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

MULTI-LAYERED SECURE EQUIPMENT ACCESS

Organization Name

Cisco Technology, Inc.

Inventor(s)

Robert E. Barton of Richmond (CA)

Flemming Stig Andreasen of Marlboro NJ (US)

Jerome Henry of Pittsboro NC (US)

Elango Ganesan of Palo Alto CA (US)

MULTI-LAYERED SECURE EQUIPMENT ACCESS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17971285 titled 'MULTI-LAYERED SECURE EQUIPMENT ACCESS

Simplified Explanation

The patent application describes a system where a device in a network uses discovery data to create a hierarchy of network layers. It then sets up a chain of proxy agents to allow external clients to remotely access specific endpoints in the network.

  • The device receives discovery data from multiple networking devices in the network.
  • It analyzes the data to establish a hierarchy of network layers.
  • When a client outside the network requests remote access to a particular endpoint, the device configures a chain of proxy agents.
  • These proxy agents, executed by a subset of networking devices, enable the client to access the endpoint remotely.
  • Each networking device in the chain proxies traffic between different layers of the network.

Key Features and Innovation

  • Utilization of discovery data to determine network hierarchy.
  • Configuration of a proxy chain to facilitate remote access to network endpoints.
  • Proxy agents executed by networking devices to enable remote client access.
  • Proxying of traffic between different network layers.

Potential Applications

The technology can be applied in various industries such as telecommunications, cybersecurity, and remote access solutions for businesses.

Problems Solved

  • Facilitates secure remote access to specific endpoints in a network.
  • Simplifies the process of setting up proxy chains for external clients.
  • Enhances network security by controlling access to different layers.

Benefits

  • Improved remote access capabilities.
  • Enhanced network security measures.
  • Streamlined network configuration processes.

Commercial Applications

The technology can be utilized in industries requiring secure remote access solutions, such as financial institutions, healthcare organizations, and government agencies.

Prior Art

Readers interested in prior art related to this technology can explore patents and research papers on network security, remote access solutions, and proxy technologies.

Frequently Updated Research

Stay updated on advancements in network security, remote access technologies, and proxy server configurations to enhance the effectiveness of this innovation.

Questions about the Technology

How does this technology improve network security?

This technology enhances network security by controlling and monitoring remote access to specific endpoints, reducing the risk of unauthorized access.

What are the potential drawbacks of using a proxy chain for remote access?

One potential drawback could be increased latency due to the additional routing through multiple proxy agents. However, this can be mitigated by optimizing the configuration of the proxy chain.


Original Abstract Submitted

In one embodiment, a device receives discovery data generated by a plurality of networking devices in a network. The device determines, based on the discovery data, a hierarchy of layers of the network. The device receives a request by a client that is external to the network to access remotely a particular endpoint in the network. The device configures, and in response to the request, a proxy chain of remote access agents executed by a subset of networking devices from the plurality of networking devices to allow the client to access remotely the particular endpoint, each of those networking devices proxying traffic between different layers of the network.