METHODS, SYSTEMS, AND PROCEDURES FOR QUANTUM SECURE ECOSYSTEMS

    公开(公告)号:US20240113869A1

    公开(公告)日:2024-04-04

    申请号:US17959016

    申请日:2022-10-03

    CPC classification number: H04L9/0852 H04L9/321

    Abstract: Aspects of the subject disclosure may include, for example, receiving a first request from a first communication orchestrator of a first protected environment to provide a secure and authenticated connection between a first resource of the first protected environment and a second resource of a second protected environment, accessing first encryption information from the first communication orchestrator and second encryption information from a second communication orchestrator of the second protected environment, verifying a capability for secure quantum communications of an encryption technique of the first communication orchestrator and the second communication orchestrator according to the first encryption information and the second encryption information, and enabling the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications. Other embodiments are disclosed.

    Quantum security enhancement for IPsec protocol

    公开(公告)号:US11689570B2

    公开(公告)日:2023-06-27

    申请号:US17107846

    申请日:2020-11-30

    CPC classification number: H04L63/164 H04B10/25

    Abstract: The concepts and technologies disclosed herein are directed to quantum security enhancement for IPsec protocol. According to one aspect disclosed herein, a quantum resource manager (“Q-RM”) can find a recommended quantum routing path for routing data from a first data center to a second data center via a pair of entangled quantum particles. The Q-RM can instruct a first quantum node (“QN”) associated with the first data center and a second QN associated with the second data center to establish a quantum channel that facilitates the recommended quantum routing path. The Q-RM can prepare an IPsec encrypted tunnel to carry a qubit associated with the pair of entangled quantum particles from the first data center to the second data center. The Q-RM can find the recommended quantum routing path responsive to an issue detected with the IPsec encrypted tunnel previously established between the first data center and the second data center.

    Quantum Security Enhancement for IPsec Protocol

    公开(公告)号:US20220174095A1

    公开(公告)日:2022-06-02

    申请号:US17107846

    申请日:2020-11-30

    Abstract: The concepts and technologies disclosed herein are directed to quantum security enhancement for IPsec protocol. According to one aspect disclosed herein, a quantum resource manager (“Q-RM”) can find a recommended quantum routing path for routing data from a first data center to a second data center via a pair of entangled quantum particles. The Q-RM can instruct a first quantum node (“QN”) associated with the first data center and a second QN associated with the second data center to establish a quantum channel that facilitates the recommended quantum routing path. The Q-RM can prepare an IPsec encrypted tunnel to carry a qubit associated with the pair of entangled quantum particles from the first data center to the second data center. The Q-RM can find the recommended quantum routing path responsive to an issue detected with the IPsec encrypted tunnel previously established between the first data center and the second data center.

    Tag-based security policy creation in a distributed computing environment

    公开(公告)号:US11171994B2

    公开(公告)日:2021-11-09

    申请号:US16817786

    申请日:2020-03-13

    Abstract: Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.

    Single Packet Authorization in a Cloud Computing Environment

    公开(公告)号:US20190297054A1

    公开(公告)日:2019-09-26

    申请号:US16435713

    申请日:2019-06-10

    Abstract: Concepts and technologies disclosed herein are directed to single packet authorization (“SPA”) in a cloud computing environment. A compute node can include a virtual switch operating on at least a portion of a plurality of hardware resources of a cloud computing environment, a virtual firewall, a cloud workload executing a cloud service, and a SPA service. The virtual switch can receive a SPA request from a SPA client executing on a computing device. The virtual switch can forward the SPA request to the virtual firewall and to the SPA service. The virtual firewall can deny the SPA request in accordance with a firewall policy. The SPA service can utilize a SPA validation scheme to validate the SPA request. The virtual firewall can implement a temporary firewall policy to allow incoming packets from the SPA client and directed to the cloud service.

    Single packet authorization in a cloud computing environment

    公开(公告)号:US10320748B2

    公开(公告)日:2019-06-11

    申请号:US15441004

    申请日:2017-02-23

    Abstract: Concepts and technologies disclosed herein are directed to single packet authorization (“SPA”) in a cloud computing environment. A compute node can include a virtual switch operating on at least a portion of a plurality of hardware resources of a cloud computing environment, a virtual firewall, a cloud workload executing a cloud service, and a SPA service. The virtual switch can receive a SPA request from a SPA client executing on a computing device. The virtual switch can forward the SPA request to the virtual firewall and to the SPA service. The virtual firewall can deny the SPA request in accordance with a firewall policy. The SPA service can utilize a SPA validation scheme to validate the SPA request. The virtual firewall can implement a temporary firewall policy to allow incoming packets from the SPA client and directed to the cloud service.

    Methods and Systems For Providing Comprehensive Cyber-Security Protection Using An Open Application Programming Interface Based Platform Solution
    18.
    发明申请
    Methods and Systems For Providing Comprehensive Cyber-Security Protection Using An Open Application Programming Interface Based Platform Solution 有权
    使用基于开放应用编程接口的平台解决方案提供综合网络安全保护的方法和系统

    公开(公告)号:US20160149931A1

    公开(公告)日:2016-05-26

    申请号:US14551346

    申请日:2014-11-24

    CPC classification number: H04L63/1408 H04L63/1441 H04L63/168

    Abstract: Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run on a processor to implement a user interface that is accessible by customers. The software program includes an application programming interface that is configured to allow a platform operator and third party providers to offer computer implemented cyber-security services to the customers through the user interface. Integration standards for the application programming interface are provided to the third party providers, the integration standards specifying how the computer implemented cyber-security services can be integrated into the platform. First and second computer implemented cyber-security service that are provided by respective first and second of the third party providers are accepted into the platform, each of which is self-certified by the third party provider as being operable through the platform. The first and second computer implemented cyber-security services are then delivered to respective first and second of the customers through the platform.

    Abstract translation: 向多个客户提供网络安全服务的方法包括提供包括被配置为在处理器上运行以实现客户可访问的用户界面的软件程序的平台。 该软件程序包括一个应用程序编程界面,该界面被配置为允许平台运营商和第三方提供商通过用户界面向客户提供计算机实施的网络安全服务。 将应用程序编程接口的集成标准提供给第三方提供商,该集成标准规定了如何将计算机实现的网络安全服务集成到平台中。 由第一方和第二方提供的第一和第二计算机实施的网络安全服务被接收到平台中,其中的每一个都由第三方提供商通过该平台可操作地进行自我认证。 第一台和第二台计算机实现的网络安全服务随后通过平台交付给相应的第一和第二个客户。

    Quantum Key Distribution Network Security Survivability

    公开(公告)号:US20230056683A1

    公开(公告)日:2023-02-23

    申请号:US17940083

    申请日:2022-09-08

    Abstract: Quantum key distribution network security survivability can be provided by receiving, at a software defined networking controller operating in a control layer of a network, a recommendation from a global analytics service operating in an application layer of the network, the recommendation for replacing a failed communication link in a quantum key distribution layer of the network, the failed communication link being detected by a quantum edge computing device operating in the quantum key distribution layer. The software defined networking controller can generate a command to cause a quantum key distribution resource to perform an action to mitigate impact from the failed communication link. The command can be sent to the quantum key distribution resource and the quantum key distribution resource can perform the action to mitigate the impact from the failed communication link.

Patent Agency Ranking