Technologies for scalable security architecture of virtualized networks
    22.
    发明授权
    Technologies for scalable security architecture of virtualized networks 有权
    虚拟化网络可扩展安全架构技术

    公开(公告)号:US09560078B2

    公开(公告)日:2017-01-31

    申请号:US14709168

    申请日:2015-05-11

    Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.

    Abstract translation: 用于执行包括NVF安全服务控制器和一个或多个NFV安全服务代理的网络功能虚拟化(NFV)安全体系结构的安全监控服务的技术。 NFV安全服务控制器配置为向NFV安全服务代理传输安全监控策略,并在NFV安全服务代理处执行安全监控策略。 NFV安全服务代理被配置为监视遥测数据并封装至少一部分遥测以传输到用于安全威胁分析的NFV安全架构的NFV安全监控分析系统。 描述和要求保护其他实施例。

    NETWORK INTERFACE DEVICES WITH REMOTE STORAGE CONTROL
    23.
    发明申请
    NETWORK INTERFACE DEVICES WITH REMOTE STORAGE CONTROL 有权
    具有远程存储控制的网络接口设备

    公开(公告)号:US20160277425A1

    公开(公告)日:2016-09-22

    申请号:US14661311

    申请日:2015-03-18

    Abstract: Network interface devices with remote storage control. In some embodiments, a network interface device may include receiver circuitry and remote storage device control circuitry. The remote storage device control circuitry may be coupled to the receiver circuitry and may share a physical support with the receiver circuitry. The remote storage device control circuitry may be configured to control writing of data from the receiver circuitry to a remote storage device that does not share a physical support with the remote storage device control circuitry.

    Abstract translation: 具有远程存储控制的网络接口设备。 在一些实施例中,网络接口设备可以包括接收器电路和远程存储设备控制电路。 远程存储设备控制电路可以耦合到接收器电路,并且可以与接收器电路共享物理支持。 远程存储设备控制电路可以被配置为控制从接收器电路向与远程存储设备控制电路不共享物理支持的远程存储设备的数据写入。

    LICENSING IN THE CLOUD
    24.
    发明申请
    LICENSING IN THE CLOUD 审中-公开
    云中的许可

    公开(公告)号:US20160180063A1

    公开(公告)日:2016-06-23

    申请号:US14581742

    申请日:2014-12-23

    Abstract: At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique identifier to a license server, establish a secure channel based on the unique identifier, request a license for activating an appliance from a license server over the secure channel, receive license data from the license server over the secure channel; determine whether the license is valid, and activate the appliance in response to a determination that the license data is valid.

    Abstract translation: 包括响应于系统执行的多个指令的至少一个机器可读介质导致系统向许可证服务器发送唯一标识符,基于唯一标识符建立安全通道,请求激活设备的许可证 通过安全通道从许可证服务器通过安全通道从许可证服务器接收许可证数据; 确定许可证是否有效,并且响应于许可证数据有效的确定而激活设备。

    Method, apparatus, and system for isolating a temporary partition on a host
    25.
    发明授权
    Method, apparatus, and system for isolating a temporary partition on a host 有权
    用于隔离主机上的临时分区的方法,装置和系统

    公开(公告)号:US09098705B2

    公开(公告)日:2015-08-04

    申请号:US13770167

    申请日:2013-02-19

    Abstract: A method, apparatus and system enable a temporary partition on a host to be isolated. More specifically, a temporary partition may be initialized in a partitioned host, assigned its own security policy and given the necessary resources to complete a task. Thereafter, the temporary partition may be dismantled. Since the temporary partition is isolated from the remaining partitions on the host, the temporary partition may be allowed to run a “weaker” security policy than the rest of the partitions because the isolation of the temporary partition ensures that the security of the remaining partitions may remain uncompromised.

    Abstract translation: 方法,装置和系统使主机上的临时分区能够被隔离。 更具体地说,可以在分配的主机中初始化临时分区,分配其自己的安全策略并给出必要的资源来完成任务。 此后,可以拆除临时隔离物。 由于临时分区与主机上的剩余分区隔离,因此临时分区可能会比其他分区运行“较弱”的安全策略,因为临时分区的隔离可确保其余分区的安全性 保持不妥协

    SECURE KEY MANAGEMENT FOR SERVICE MESH DEPLOYMENTS

    公开(公告)号:US20240205198A1

    公开(公告)日:2024-06-20

    申请号:US18288955

    申请日:2022-03-25

    CPC classification number: H04L63/0428 H04L63/0823

    Abstract: Various methods, systems, and use cases for securely managing, generating, and controlling access to keys in a service mesh are discussed herein. In various examples, key protection operations include service mesh signing key protection and service mesh communication key protection, for a secure transport session between services such as conducted with mutual transport layer security (mTLS). For instance, such key protection operations may be used to establish communications between the service host and another entity within the service mesh, in a secure transport session, based on use of a private key (secured using a confidential computing technology) in a secure enclave or other secure compute environment to sign one or more keys for the secure transport session.

    Cloudlet computing device with secure boot operations

    公开(公告)号:US11604882B2

    公开(公告)日:2023-03-14

    申请号:US16433709

    申请日:2019-06-06

    Abstract: Disclosed herein are embodiments related to security in cloudlet environments. In some embodiments, for example, a computing device (e.g., a cloudlet) may include: a trusted execution environment; a Basic Input/Output System (BIOS) to request a Key Encryption Key (KEK) from the trusted execution environment; and a Self-Encrypting Storage (SES) associated with the KEK; wherein the trusted execution environment is to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, and the BIOS is to provide the KEK to the SES to unlock the SES for access by the trusted execution environment.

Patent Agency Ranking