The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 22, 2020

Filed:

Dec. 26, 2017
Applicant:

Cisco Technology, Inc., San Jose, CA (US);

Inventors:

Gangadharan Byju Pularikkal, San Jose, CA (US);

Santosh Ramrao Patil, Santa Clara, CA (US);

Mark Grayson, Berkshirem, GB;

Madhusudan Nanjanagud, San Jose, CA (US);

Assignee:

CISCO TECHNOLOGY, INC., San Jose, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04W 12/04 (2009.01); H04W 12/08 (2009.01); H04W 12/00 (2009.01); H04W 12/02 (2009.01); H04W 84/12 (2009.01);
U.S. Cl.
CPC ...
H04L 63/0428 (2013.01); H04L 63/0236 (2013.01); H04L 63/0435 (2013.01); H04L 63/0876 (2013.01); H04L 63/1425 (2013.01); H04W 12/001 (2019.01); H04W 12/04 (2013.01); H04W 12/08 (2013.01); H04L 63/10 (2013.01); H04L 63/101 (2013.01); H04W 12/00512 (2019.01); H04W 12/02 (2013.01); H04W 84/12 (2013.01);
Abstract

In various implementations, a method includes receiving a request to establish an end-to-end encrypted session between a device in an enterprise network and an external entity that is outside the enterprise network. In some implementations, the end-to-end encrypted session allows encrypted packets to be transmitted between the device and the external entity. In various implementations, the method includes determining whether the request satisfies an enterprise security criterion for establishing the end-to-end encryption session. In various implementations, the method includes in response to determining that the request satisfies the enterprise security criterion, triggering the establishment of the end-to-end encrypted session between the device in the enterprise network and the external entity that is outside the enterprise entity.


Find Patent Forward Citations

Loading…