POLICY-BASED SECURE CONTAINERS FOR MULTIPLE ENTERPRISE APPLICATIONS

    公开(公告)号:US20220217181A1

    公开(公告)日:2022-07-07

    申请号:US17481215

    申请日:2021-09-21

    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.

    Policy-based secure containers for multiple enterprise applications

    公开(公告)号:US11252198B2

    公开(公告)日:2022-02-15

    申请号:US16567504

    申请日:2019-09-11

    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.

    TECHNOLOGIES FOR ACCELERATED ORCHESTRATION AND ATTESTATION WITH EDGE DEVICE TRUST CHAINS

    公开(公告)号:US20190230002A1

    公开(公告)日:2019-07-25

    申请号:US16368980

    申请日:2019-03-29

    Abstract: Technologies for accelerated orchestration and attestation include multiple edge devices. An edge appliance device performs an attestation process with each of its components to generate component certificates. The edge appliance device generates an appliance certificate that is indicative of the component certificates and a current utilization of the edge appliance device and provides the appliance certificate to a relying party. The relying party may be an edge orchestrator device. The edge orchestrator device receives a workload scheduling request with a service level agreement requirement. The edge orchestrator device verifies the appliance certificate and determines whether the service level agreement requirement is satisfied based on the appliance certificate. If satisfied, the workload is scheduled to the edge appliance device. Attestation and generation of the appliance certificate by the edge appliance device may be performed by an accelerator of the edge appliance device. Other embodiments are described and claimed.

    Allowing varied device access based on different levels of unlocking mechanisms
    25.
    发明授权
    Allowing varied device access based on different levels of unlocking mechanisms 有权
    根据不同级别的解锁机制允许不同的设备访问

    公开(公告)号:US09578037B2

    公开(公告)日:2017-02-21

    申请号:US14951654

    申请日:2015-11-25

    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.

    Abstract translation: 系统和方法可以提供用于从设备的一个或多个解锁接口接收运行时间输入,并且基于运行时间输入从多个访问级别中选择关于设备的访问级别。 所选择的访问级别可以具有相关联的安全策略,其中可以基于相关联的安全策略来执行运行时输入的认证。 在一个示例中,如果认证成功,则使用一个或多个加密密钥来将设备关于所选择的访问级别放置在解锁状态。 如果认证不成功,另一方面,相对于所选择的访问级别,设备可以保持在锁定状态。

    Policy-based secure containers for multiple enterprise applications

    公开(公告)号:US12184704B2

    公开(公告)日:2024-12-31

    申请号:US18542406

    申请日:2023-12-15

    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.

    POLICY-BASED SECURE CONTAINERS FOR MULTIPLE ENTERPRISE APPLICATIONS

    公开(公告)号:US20240275822A1

    公开(公告)日:2024-08-15

    申请号:US18542406

    申请日:2023-12-15

    CPC classification number: H04L63/205 H04L63/08 H04L63/105

    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.

Patent Agency Ranking