Tracing timestamps through immutable records

    公开(公告)号:US11698916B1

    公开(公告)日:2023-07-11

    申请号:US17133903

    申请日:2020-12-24

    Applicant: Equinix, Inc.

    Abstract: Systems and methods include techniques for recording information for tracing a timestamp to its source. The techniques can facilitate auditing of a time service by external auditors. The timestamps can be collected from all the sources and intermediate touch points like timing and network switches and can be stored in a distributed time ledger. In one example, a method includes receiving, at a collection time by a time collector, a timestamp from each of a plurality of timing devices at a collection time; aggregating the timestamp of each of the plurality of timing devices into a timestamp record, the timestamp record including the collection time and a timestamp entry for each of the timing devices, wherein the timestamp entry for a timing device includes a timing device identifier and the timestamp corresponding to the timing device providing the timestamp; and inserting the timestamp record into an immutable time ledger.

    Local delegation of remote key management service

    公开(公告)号:US11343247B1

    公开(公告)日:2022-05-24

    申请号:US16556482

    申请日:2019-08-30

    Applicant: Equinix, Inc.

    Abstract: In general, techniques are described for proxying, with a locally-deployed computing device, service requests from one or more with customer devices to a remote data encryption and key management service and assuming, by the local computing device, the service functions of the remote service in the event of a remote service failure. For example, customer devices at a location may be configured to communicate service requests to the local computing device rather than to a remote service. The local computing device obtains one or more encryption keys or other security objects and stores the security objects to local storage. In response to determining a disruption in the remote service due to, e.g., network connectivity failure, the local computing device may assume the functionality of the remote service for a limited time by performing data encryption operations, responsive to requests received at the local computing device from the customer devices.

    Timing synchronization service and distribution system

    公开(公告)号:US11115142B1

    公开(公告)日:2021-09-07

    申请号:US16438310

    申请日:2019-06-11

    Applicant: Equinix, Inc.

    Abstract: This disclosure describes techniques for delivering high-accuracy and high-precision clock synchronization in heterogeneous distributed computer clusters. For example, the disclosure describes a synchronization engine that sets efficient clock synchronization processes based on a cluster node's characteristics, pricing, precision, geolocation, and/or cluster topology, while in some cases using a combination of master clock data with internal atomic clocks of computers. The techniques described herein integrate the synchronization engine into a time synchronization process that may provide stability, versatility, precision and cost balance using technical improvements for characterizing timing system delivery channels.

    Encryption key namespace for containerized workloads

    公开(公告)号:US11586752B1

    公开(公告)日:2023-02-21

    申请号:US16726748

    申请日:2019-12-24

    Applicant: Equinix, Inc.

    Abstract: In general, techniques are described for an encryption key namespace of a kernel, executed by a host computing device, the encryption key namespace having a configuration file that stores an association of a key identifier and a container identifier by which the host computing device can obtain a data encryption key to use for decrypting/encrypting data for the container identified by the container identifier. In this way, a user may associate a container (or container image) with a unique key identifier. By configuring this association in the encryption key namespace for the container, the container may be identified and automatically associated with a key identifier for the appropriate key for decrypting/encrypting data for the container. The host computing device may then obtain, from a key management service, the key using the key identifier.

Patent Agency Ranking