SECURE COMPLIANCE PROTOCOLS
    3.
    发明申请

    公开(公告)号:US20190312855A1

    公开(公告)日:2019-10-10

    申请号:US15947052

    申请日:2018-04-06

    Abstract: In some examples, a secure compliance protocol may include a virtual computing instance (VCI) deployed on a hypervisor and may be provisioned with hardware computing resources. In some examples the VCI may also include a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes, and a plurality of agents to generate a plurality of compliance proofs; the VCI may communicate with a server corresponding to a node of the plurality of nodes; and receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device.

    VERIFYING THAT USAGE OF VIRTUAL NETWORK FUNCTION (VNF) BY A PLURALITY OF COMPUTE NODES COMPLY WITH ALLOWED USAGE RIGHTS

    公开(公告)号:US20180288101A1

    公开(公告)日:2018-10-04

    申请号:US15472939

    申请日:2017-03-29

    Abstract: In some examples, a method includes establishing, by a network device acting as an orchestrator host for a virtual network function (VNF), a trust relationship with a VNF vendor that dynamically specify a set of usage right policies; determining, by the network device, allowed usage rights associated with the VNF based on the set of usage right policies; installing, by the network device, the VNF on a plurality of compute nodes based on the allowed usage rights; and auditing VNF usage right compliance by: issuing a proof quote request to the plurality of compute nodes; receiving a proof quote response comprising a plurality of resource states on the plurality of compute nodes; and verifying whether usage of the VNF on the plurality of compute nodes complies with the allowed usage rights based on the proof quote response.

Patent Agency Ranking