会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • System and method for secure cloud service delivery with prioritized services in a network environment
    • 用于在网络环境中优先化服务的安全云服务传送的系统和方法
    • US09444789B2
    • 2016-09-13
    • US14470497
    • 2014-08-27
    • CISCO TECHNOLOGY, INC.
    • Sunil CherukuriMohamed KhalidBrian Cinque
    • H04L9/32H04L29/06H04L29/08H04L12/24H04L9/08
    • H04L63/0272H04L9/0838H04L41/0803H04L67/1002
    • An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more cryptographic modules that can support the cloud capability set, and offloading the VPN tunnel to the one or more cryptographic modules. The request can be an Internet Security Association and Key Management Protocol (ISAKMP) packet listing the one or more cloud capabilities in a private payload. The method may further include splitting the VPN tunnel between the cryptographic modules if no single cryptographic module can support substantially all the cloud capabilities in the cloud capability set. In some embodiments, the request is compared with a service catalog comprising authorized cloud capabilities.
    • 示例性方法包括在与订户和云之间的虚拟专用网(VPN)隧道相关联的因特网密钥交换协商期间接收对云能力集的请求,其中所述云能力集合包括一个或多个云能力,映射请求 到一个或多个可以支持云能力集合的加密模块,以及将VPN隧道卸载到一个或多个加密模块。 该请求可以是列出私有有效载荷中的一个或多个云能力的因特网安全关联和密钥管理协议(ISAKMP)分组。 该方法还可以包括在加密模块之间分割VPN隧道,如果没有单个密码模块可以支持云能力集中的实质上所有的云能力。 在一些实施例中,该请求与包括授权云能力的服务目录进行比较。
    • 7. 发明申请
    • PATH SELECTION IN A MULTI-SERVICE AND MULTI-TENANT SECURE CLOUD ENVIRONMENT
    • 多服务和多重安全云环境中的路径选择
    • US20150143501A1
    • 2015-05-21
    • US14084378
    • 2013-11-19
    • Cisco Technology, Inc.
    • Sunil CherukuriXiao Hu GaoGoran Saradzic
    • H04L29/06
    • H04L63/02H04L45/00H04L45/50H04L63/0227H04L63/0272
    • A device and method are provided to provide multi-exit firewall capabilities for cloud server or cloud service deployments without prior knowledge of reachability information of a client device where the client device may belong to one of several networks accessing the cloud server or cloud service. The reachability information may be derived based on flow of data to and from the client device in response to a data transfer initiation request. A firewall connection table may be updated to record routability to the client device comprising the derived reachability information. The recorded reachability information in the connection table may be used for the data transfer with the client device instead of a default route in a routing table.
    • 提供了一种设备和方法,用于为云服务器或云服务部署提供多出口防火墙功能,而无需事先了解客户端设备的可达性信息,客户端设备可能属于接入云服务器或云服务的多个网络之一。 可访问性信息可以基于响应于数据传送发起请求的客户端设备的数据流而导出。 可以更新防火墙连接表以记录包括导出的可达性信息的客户端设备的可路由性。 连接表中记录的可达性信息可以用于与客户端设备的数据传输而不是路由表中的默认路由。
    • 8. 发明申请
    • SYSTEM AND METHOD FOR SECURE CLOUD SERVICE DELIVERY WITH PRIORITIZED SERVICES IN A NETWORK ENVIRONMENT
    • 系统和方法,用于在网络环境中安全优先服务提供的云服务
    • US20140372761A1
    • 2014-12-18
    • US14470497
    • 2014-08-27
    • CISCO TECHNOLOGY, INC.
    • Sunil CherukuriMohamed KhalidBrian Cinque
    • H04L29/06H04L12/24
    • H04L63/0272H04L9/0838H04L41/0803H04L67/1002
    • An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more cryptographic modules that can support the cloud capability set, and offloading the VPN tunnel to the one or more cryptographic modules. The request can be an Internet Security Association and Key Management Protocol (ISAKMP) packet listing the one or more cloud capabilities in a private payload. The method may further include splitting the VPN tunnel between the cryptographic modules if no single cryptographic module can support substantially all the cloud capabilities in the cloud capability set. In some embodiments, the request is compared with a service catalog comprising authorized cloud capabilities.
    • 示例性方法包括在与订户和云之间的虚拟专用网(VPN)隧道相关联的因特网密钥交换协商期间接收对云能力集的请求,其中所述云能力集合包括一个或多个云能力,映射请求 到一个或多个可以支持云能力集合的加密模块,以及将VPN隧道卸载到一个或多个加密模块。 该请求可以是列出私有有效载荷中的一个或多个云能力的因特网安全关联和密钥管理协议(ISAKMP)分组。 该方法还可以包括在加密模块之间分割VPN隧道,如果没有单个密码模块可以支持云能力集中的实质上所有的云能力。 在一些实施例中,该请求与包括授权云能力的服务目录进行比较。