×

Network security using encrypted subfields

  • US 9,288,186 B2
  • Filed: 06/04/2013
  • Issued: 03/15/2016
  • Est. Priority Date: 06/04/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving from a secure device at a first network device, an encrypted rule encrypted with a key at the secure device;

    storing the encrypted rule at the first network device, wherein content of the rule is hidden from the first network device;

    receiving at the first network device, a packet containing at least one encrypted subfield from a second network device, said subfield encrypted based on the key received at the second network device from the secure device; and

    processing the packet, wherein processing comprises using the encrypted rule to inspect the packet and determine if said encrypted subfield in the packet matches said encrypted rule received from the secure device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×