The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 18, 2016

Filed:

Jan. 08, 2015
Applicant:

Blue Cedar Networks, Inc., San Francisco, CA (US);

Inventor:

Kenneth J. Wante, Bellingham, MA (US);

Assignee:

Blue Cedar Networks, Inc., San Francisco, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 29/12 (2006.01); H04L 29/06 (2006.01); H04W 76/02 (2009.01); H04W 12/02 (2009.01); G06F 21/62 (2013.01);
U.S. Cl.
CPC ...
H04L 9/0819 (2013.01); G06F 21/6245 (2013.01); H04L 9/14 (2013.01); H04L 61/2517 (2013.01); H04L 61/2528 (2013.01); H04L 61/2592 (2013.01); H04L 63/0272 (2013.01); H04W 12/02 (2013.01); H04W 76/022 (2013.01); G06F 2221/2111 (2013.01); H04L 61/2007 (2013.01); H04L 61/2061 (2013.01); H04L 63/164 (2013.01); H04L 2209/24 (2013.01);
Abstract

Computational complexity, specifically, cryptographic operations, is removed from the IKE(Internet Key Exchange) process in a VPN gateway appliance, thereby enabling scaling of the number of datapaths that can be managed by a single IKE process. A two-tier cache configuration enables necessary cryptographic operations on packets in the gateway but does so without placing additional computational burdens on the IKE process. One cache containing security association data is local to the IPSec component of the datapath instance. The second cache is higher level and is populated by IKE with security association data upon completion of IKE Phase 2 negotiations. The local cache is searched first for security policy data and if found is used to encrypt/decrypt the data packet. If not found locally, the IKE centralized cache is searched and if found, the local cache is updated with the security association data.


Find Patent Forward Citations

Loading…