-
公开(公告)号:US11379213B1
公开(公告)日:2022-07-05
申请号:US17112588
申请日:2020-12-04
Applicant: Equinix, Inc.
Inventor: Rafael Lean de Vera Ansay , James Kempf , Oleg Berzin , Chen Xi , Imam Sheikh
Abstract: Techniques for a secure device registration and software update using Decentralized Identifiers (DIDs). For example, a method includes sending, by a device and to a data store, a request for a software update published by a software publisher, wherein the request includes a verifiable credential for the device including a DID of the device; receiving, by the device and from the data store, a verifiable credential for the software update, wherein the verifiable credential includes a DID of the software publisher; determining, by the device, whether the software update is newer than software on the device; obtaining, by the device, the software update from the software publisher from a location specified by the verifiable credential; verifying, by the device, the software update based on the verifiable credential; and in response to verifying the software update based on the verifiable credential, installing, by the device, the software update.
-
公开(公告)号:US11588731B1
公开(公告)日:2023-02-21
申请号:US17139606
申请日:2020-12-31
Applicant: Equinix, Inc.
Inventor: Juxiang Teng , Imam Sheikh , Muhammad Durrani
IPC: H04L45/586 , H04L45/00 , H04L61/2521 , H04L45/302 , H04L45/24
Abstract: In general, this disclosure describes a cloud exchange (or “cloud exchange”) that offers a cloud-to-cloud interface (CCI) for interconnecting cloud services to tenants within public clouds. As described herein, the cloud exchange may be configured with a cloud-to-cloud interface that enables tenant applications of a public cloud to subscribe to and communicate with cloud services, using an end-to-end layer 3 path, in some cases without requiring a separate routing protocol session with a public edge device for the public cloud. In some examples, the public cloud provides a virtual layer 2 connection from a tenant within a public cloud to a routing instance of the cloud exchange, and the cloud exchange uses the routing instance to route service traffic between the tenant and the cloud services.
-
公开(公告)号:US11238448B1
公开(公告)日:2022-02-01
申请号:US16361091
申请日:2019-03-21
Applicant: Equinix, Inc.
Inventor: Sreekanth Narayanan , Danjue Li , Imam Sheikh , Chen Xi
Abstract: This disclosure describes techniques that include use of a distributed ledger to arrange for and/or initiate provisioning of network services, and also to validate payment for such network services. In one example, this disclosure describes a method that includes modifying, by a computing system, a distributed ledger maintained by a consensus network to implement a smart contract that is configured to generate, in response to receiving a request for network services, a provisioning request; receiving the provisioning request, by the computing system and from a computing device on the consensus network that is executing the smart contract, wherein the provisioning request includes information describing requested network services; and provisioning, by the computing system and based on the information describing the requested network services, network services.
-
公开(公告)号:US11343247B1
公开(公告)日:2022-05-24
申请号:US16556482
申请日:2019-08-30
Applicant: Equinix, Inc.
Inventor: Anand Ozarkar , Naresh Kumar , Imam Sheikh
Abstract: In general, techniques are described for proxying, with a locally-deployed computing device, service requests from one or more with customer devices to a remote data encryption and key management service and assuming, by the local computing device, the service functions of the remote service in the event of a remote service failure. For example, customer devices at a location may be configured to communicate service requests to the local computing device rather than to a remote service. The local computing device obtains one or more encryption keys or other security objects and stores the security objects to local storage. In response to determining a disruption in the remote service due to, e.g., network connectivity failure, the local computing device may assume the functionality of the remote service for a limited time by performing data encryption operations, responsive to requests received at the local computing device from the customer devices.
-
公开(公告)号:US10893022B1
公开(公告)日:2021-01-12
申请号:US16228540
申请日:2018-12-20
Applicant: Equinix, Inc.
Inventor: Danjue Li , Muhammad Durrani , Chen Xi , Imam Sheikh
IPC: H04L29/06 , H04L12/745 , H04L29/08
Abstract: In one example, a method includes receiving, by a first network device via a routing protocol peering session with a peer router in a first autonomous system, a plurality of routing protocol routes to destination addresses, each routing protocol route specifying a network address prefix and an identifier of the autonomous system that originated the routing protocol route; receiving network address prefix ownership information from a distributed ledger storing a plurality of associations between respective network address prefixes and respective autonomous system identifiers of autonomous systems confirmed to own the respective network address prefixes; determining, based at least on the prefix ownership information, whether any of the plurality of routing protocol routes specifies an autonomous system identifier different than specified by the associations; and in response to determining that one of the routes specifies an autonomous system identifier different than specified by the plurality of associations, performing an action.
-
公开(公告)号:US11586752B1
公开(公告)日:2023-02-21
申请号:US16726748
申请日:2019-12-24
Applicant: Equinix, Inc.
Inventor: Anand Ozarkar , Imam Sheikh
Abstract: In general, techniques are described for an encryption key namespace of a kernel, executed by a host computing device, the encryption key namespace having a configuration file that stores an association of a key identifier and a container identifier by which the host computing device can obtain a data encryption key to use for decrypting/encrypting data for the container identified by the container identifier. In this way, a user may associate a container (or container image) with a unique key identifier. By configuring this association in the encryption key namespace for the container, the container may be identified and automatically associated with a key identifier for the appropriate key for decrypting/encrypting data for the container. The host computing device may then obtain, from a key management service, the key using the key identifier.
-
公开(公告)号:US11368307B1
公开(公告)日:2022-06-21
申请号:US16696340
申请日:2019-11-26
Applicant: Equinix, Inc.
Inventor: Anand Ozarkar , Srinivasan Raghavan , Imam Sheikh , Ankur Sharma
Abstract: In general, techniques are described for using zero-knowledge proofs and digital signatures to verify the authenticity of log records generated by multiple parties, at least in some cases without exposing personally identifiable information for the parties.
-
公开(公告)号:US10771252B1
公开(公告)日:2020-09-08
申请号:US16006458
申请日:2018-06-12
Applicant: Equinix, Inc.
Inventor: Juxiang Teng , Muhammad Durrani , Imam Sheikh , Lance Weaver , Brian J. Lillie
Abstract: This disclosure describes techniques for securely, efficiently, and/or effectively providing cryptographic operations and key management services. Systems in accordance with one or more aspects of the present disclosure may provide secure management of cryptographic keys as service to a plurality of data center users or customers that contract for services provided by a data center. In one example, this disclosure describes a data center comprising a plurality of cloud service provider ports, a plurality of customer ports, network infrastructure coupling the plurality of cloud service provider ports to the plurality of customer ports, and a computing system including at least one hardware security module.
-
-
-
-
-
-
-