DATA ENCRYPTION OVER A PLURALITY OF MPLS NETWORKS
First Claim
Patent Images
1. A method comprising:
- negotiating an encryption protocol with a network device;
receiving data from a trusted client device;
encrypting the received data with the negotiated encryption protocol; and
applying a label switched path (LSP) label to the encrypted data for transmission to the network device through a Multiprotocol Label Switching (MPLS) network.
2 Assignments
0 Petitions
Accused Products
Abstract
A network device negotiates an encryption protocol with another network device, receives data from a trusted client device, encrypts the received data with the negotiated encryption protocol, and applies a label switched path (LSP) label to the encrypted data for transmission to the network device through an untrusted Multiprotocol Label Switching (MPLS) network.
-
Citations
20 Claims
-
1. A method comprising:
-
negotiating an encryption protocol with a network device; receiving data from a trusted client device; encrypting the received data with the negotiated encryption protocol; and applying a label switched path (LSP) label to the encrypted data for transmission to the network device through a Multiprotocol Label Switching (MPLS) network. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A network device comprising:
-
a memory for storing a plurality encryption protocols; and logic configured to; transmit a request to a second network device to negotiate an encryption protocol, select one of the encryption protocols from the memory based on a response from the second network device, receive data from a trusted client device, encrypt the received data with the selected encryption protocol, and apply a label switched path (LSP) label to the encrypted data for transmission to the second network device through an untrusted Multiprotocol Label Switching (MPLS) network. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system comprising:
-
a first network device; a second network device; and a third network device, wherein the first network device is configured to; negotiate a first encryption protocol and a first label switched path (LSP) label with a second network device, receive data from a trusted network, and encrypt the received data with the first negotiated encryption protocol and apply the first LSP label for transmission of the encrypted data to the second network device, and wherein the second network device is configured to; receive the encrypted data from the first network device, decrypt the received data with the first negotiated encryption protocol, negotiate a second encryption protocol and a second LSP label with the third network device, re-encrypt the decrypted data with the second encryption protocol, and apply the second LSP label for transmission of the re-encrypted data to the third network device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A network device comprising:
-
a memory for storing a plurality of encryption protocols; and logic configured to; negotiate a first encryption protocol with a first network device, negotiate a second encryption protocol with a second network device, receive encrypted data from the first network device, decrypt the received data with the first encryption protocol and re-encrypt the data with the second encryption protocol, and apply a label switched path (LSP) label for transmission of the re-encrypted data to the second network device. - View Dependent Claims (17, 18, 19, 20)
-
Specification