US 12,069,164 B2
Hash-based key distribution
Syed Khalid Raza, Fremont, CA (US); Praveen Raju Kariyanahalli, San Ramon, CA (US); and Venugopal Hemige, San Ramon, CA (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Sep. 13, 2019, as Appl. No. 16/570,791.
Application 16/570,791 is a continuation of application No. 14/953,431, filed on Nov. 30, 2015, granted, now 10,419,211.
Prior Publication US 2020/0169390 A1, May 28, 2020
Int. Cl. H04L 29/06 (2006.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/083 (2013.01) [H04L 9/0861 (2013.01); H04L 63/0428 (2013.01); H04L 63/0435 (2013.01); H04L 63/062 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
generating, by a first edge device, a first set of encryption keys;
transmitting, by the first edge device over a network, the first set of encryption keys, an encryption key type for the first edge device, and a hash algorithm to a controller,
wherein the controller applies the hash algorithm to the first set of encryption keys to identify a first encryption key corresponding to a second edge device and transmits the first encryption key to the second edge device;
receiving, by the first edge device, a second encryption key from the second edge device that is unique to the first edge device, the second encryption key being generated based at least in part on the encryption key type for the first edge device;
encrypting, by the first edge device, a first message addressed to the second edge device with the second encryption key; and
decrypting, by the first edge device, a second message received from the second edge device with the second encryption key,
wherein the first edge device, the second edge device and the controller are different.