Unlock instant, AI-driven research and patent intelligence for your innovation.

Providing-replay protection in systems using group security associations

a security association and group technology, applied in the field of secure communications, can solve the problems of gsa architecture that cannot easily support the use of sequence numbers for anti-replay handling, network architectures that generally cannot benefit from its application, and multiple users that cannot easily synchroniz

Inactive Publication Date: 2014-06-26
RPX CLEARINGHOUSE
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent describes a method and device for detecting undesired packets in a network. The method involves assigning a unique transform identifier to each member of a group of devices in the network, and using the transform identifier to extract a sequence number from a packet received from a member of the group. The sequence number is then compared with an expected sequence number for the member to determine if the packet is valid. The device includes a storage medium and logic for implementing the method. The technical effect of this invention is to enable network devices to identify and discard undesired packets, thereby improving network security.

Problems solved by technology

While the IPSec anti-replay mechanism is effective in many peer to peer environments, there are network architectures that generally cannot benefit from its application.
However, the GSA architecture cannot easily support the use of sequence number for anti-replay handling, because multiple users share the same Security Association (SA), and the multiple users cannot easily synchronize the sequence number of the SA.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Providing-replay protection in systems using group security associations
  • Providing-replay protection in systems using group security associations
  • Providing-replay protection in systems using group security associations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021]Exemplary methods and apparatus by which the present invention uses unidirectional Security Associations to enable anti-replay mechanisms to be used in networks that use Group Security Associations to secure data between endpoints will now be described with reference to the attached figures.

[0022]Referring now to FIG. 1, an IP VPN network 20 is shown to include a number of Customer Edge (CE) devices 22, 24, 26 and 28, coupled to one or more Provider Edge (PE) routers 25 and 27. In the IP VPN network, routing information for each CE is maintained in Virtual Routing and Forwarding Tables 22 and 23. Each PE includes routing information for only the CEs which are members of VPNs that traverse the PE. By limiting the routing information to those VPNs that traverse the PE, it can be assured that the CE devices that are not members of the respective VPN cannot gain access to the network.

[0023]Group key management protocols help to ensure that only members of a secure group can gain a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus is disclosed which enables detection of undesired packets received at a device in a network, where the device is a member of a group of devices in the network. A registration table stores transform identifiers for each member of a group and controls the forwarding of the transform identifiers to the members of the group as members are added and deleted. A transform identifier indicates a format or transformation of a packet transmitted by an associated member. The transform identifier can therefore be used at a receiving device to distinguish between transmissions by different members of the group, thereby enabling the receiving device to extract sequence information associated with the member from the packet. The sequence information can be compared against an expected sequence number for the member to determine whether the packet is an undesirable or rogue packet.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation of U.S. patent application Ser. No. 10 / 864,146, titled Method and Apparatus for Providing Replay Protection in Systems Using Group Security Associations, filed Jun. 9, 2004, which claims priority to provisionally filed U.S. application Ser. No. 60 / 502,537 filed Sep. 12, 2003.FIELD OF THE INVENTION[0002]This invention relates generally to the field of secure communications and more particularly to a method and apparatus for detecting undesired packets in a networked environment.BACKGROUND OF THE INVENTION[0003]As it is known in the art, Internet Protocol Security (IPsec) is a security protocol that provides security services at the IP layer by enabling a system to select required security protocols, determine the algorithm(s) to use for services, and put in place any cryptographic keys required to provide the requested services. IPsec can be used to protect one or more paths between a pair of hosts, betwe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/0272H04L63/08H04L63/104H04L63/166
Inventor DONDETI, LAKSHMINATHFEDYK, DONALDHE, HAIXIANG
Owner RPX CLEARINGHOUSE