SYSTEMS AND METHODS FOR AUTHENTICATING PLATFORM TRUST IN A NETWORK FUNCTION VIRTUALIZATION ENVIRONMENT

    公开(公告)号:US20230036553A1

    公开(公告)日:2023-02-02

    申请号:US17965204

    申请日:2022-10-13

    Abstract: A remote attestation system for a computer network includes an attestation operations subsystem configured to manage attestation procedures for the remote attestation system, and an attestation server pool including a plurality of attestation servers. The plurality of attestation servers is configured to perform attestation of at least one host in a data center. The system further includes an attestation state database configured to store a state of attestation of the at least one host, an attestation policy database configured to store at least one operator policy of the computer network, and an end-user service portal configured to provide access to the remote attestation system by users of the computer network.

    Systems and methods for internet of things security environment

    公开(公告)号:US11516252B2

    公开(公告)日:2022-11-29

    申请号:US16176865

    申请日:2018-10-31

    Abstract: A system for monitoring the security of a connected Internet of Things (IoT) device is provided. The system includes a network doppelgänger (ND) computer device. The ND computer device is in communication with the IoT device and a service provider computer device associated with the IoT device. The ND computer device is programmed to store a plurality of policies associated with the service provider computer device. The ND computer device is also programmed to receive a communication from the IoT device addressed to the service provider computer device. The ND computer device is further programmed to analyze the communication in view of the plurality of policies to determine whether the communication is approved. If the communication is approved, the ND computer device is programmed to route the communication to the service provider computer device.

    SYSTEMS AND METHODS FOR ESTABLISHING SCALABLE CREDENTIAL CREATION AND ACCESS

    公开(公告)号:US20190042302A1

    公开(公告)日:2019-02-07

    申请号:US16052392

    申请日:2018-08-01

    Abstract: A client access network includes a cluster of servers. The cluster of servers includes a boot node, an administrator node, a computing node, and a storage node. The client access network further includes a plurality of segregated subnetworks. The plurality of segregated subnetworks includes a boot subnetwork, an administration subnetwork, a public subnetwork, and a private subnetwork. The client access network further includes at least one hardware security module, a dedicated subnet in operable communication with the at least one hardware security module and each of the plurality of segregated subnetworks, and a router in operable communication with the at least one hardware security module and each of the cluster of servers. The router is further configured to route traffic among the plurality of segregated subnetworks and the dedicated subnet.

    Method and apparatus for enabling public key infrastructure in the generic cloud environment and the network function

    公开(公告)号:US11556364B2

    公开(公告)日:2023-01-17

    申请号:US16576630

    申请日:2019-09-19

    Abstract: Methods, systems, and devices for enabling public key infrastructure (PKI) in the generic could environment and the network function virtualization (NFV) environment. A host device may receive, from an orchestrator of a computer network environment, an indication of a workload to be executed by a virtual machine (VM) hosted on the host device, where the indication includes an identifier of the workload. The VM may transmit a request for a certificate to a hardware security module associated with the host device including the identifier of the workload. After transmitting the request for the certificate, the VM may receive the requested certificate from the HSM. In some cases, the VM may determine a private key associated with the workload and include the private key within the request for the certificate. Additionally or alternatively, the HSM may determine the private key. Here, the HSM may include the private key within the certificate.

Patent Agency Ranking