PROVIDING SECURE NETWORKS
First Claim
Patent Images
1. A computer-implemented method comprising:
- determining one or more nodes in a network system with at least one port that is enabled for security enabled services;
provisioning a connectivity association for each node, wherein each connectivity association is provisioned with a connectivity association key;
associating each connectivity association with a virtual service network (VSN); and
mutually authenticating nodes on each VSN based on each respective connectivity association key.
8 Assignments
0 Petitions
Accused Products
Abstract
Implementations generally relate to providing secure networks. In some implementations, a method includes determining one or more nodes in a network system with at least one port that is enabled for security enabled services. The method also includes provisioning a connectivity association for each node, wherein each connectivity association is provisioned with a connectivity association key. The method also includes associating each connectivity association with a virtual service network (VSN). The method also includes mutually authenticating nodes on each VSN based on each respective connectivity association key.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
determining one or more nodes in a network system with at least one port that is enabled for security enabled services; provisioning a connectivity association for each node, wherein each connectivity association is provisioned with a connectivity association key; associating each connectivity association with a virtual service network (VSN); and mutually authenticating nodes on each VSN based on each respective connectivity association key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium carrying program instructions thereon, the instructions when executed by one or more processors cause the one or more processors to perform operations comprising:
-
determining one or more nodes in a network system with at least one port that is enabled for security enabled services; provisioning a connectivity association for each node, wherein each connectivity association is provisioned with a connectivity association key; associating each connectivity association with a virtual service network (VSN); and mutually authenticating nodes on each VSN based on each respective connectivity association key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
one or more processors; and logic encoded in one or more tangible media for execution by the one or more processors and when executed operable to perform operations comprising; determining one or more nodes in a network system with at least one port that is enabled for security enabled services; provisioning a connectivity association for each node, wherein each connectivity association is provisioned with a connectivity association key; associating each connectivity association with a virtual service network (VSN); and mutually authenticating nodes on each VSN based on each respective connectivity association key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification