DISCOVERING TRUSTWORTHY DEVICES USING ATTESTATION AND MUTUAL ATTESTATION

    公开(公告)号:US20220394054A1

    公开(公告)日:2022-12-08

    申请号:US17818147

    申请日:2022-08-08

    IPC分类号: H04L9/40

    摘要: Systems, methods, and computer-readable media for discovering trustworthy devices through attestation and authenticating devices through mutual attestation. A relying node in a network environment can receive attestation information from an attester node in the network environment as part of a unidirectional push of information from the attester node according to a unidirectional link layer communication scheme. A trustworthiness of the attester node can be verified by identifying a level of trust of the attester node from the attestation information. Further, network service access of the attester node through the relying node in the network environment can be controlled based on the level of trust of the attester node identified from the attestation information.

    Enriching local cryptoprocessor queries with sdn augmented information

    公开(公告)号:US11438151B2

    公开(公告)日:2022-09-06

    申请号:US16750786

    申请日:2020-01-23

    IPC分类号: H04L9/08 H04L9/32 G06F9/455

    摘要: The present technology discloses a method for enriching local crypto-processor queries with software-defined networking augmented information, comprising sending, from a virtual machine installed on a physical host, a request for trust verification data; augmenting, by an identity verification system on the physical host, the request for trust verification data with encrypted information from an external entity; receiving, at a trusted processor module on the physical host, the request for trust verification data; receiving, at the virtual machine, the trust verification data; and assessing, at the virtual machine, a state of the physical host based on the trust verification data.

    AUTHENTICATION OF NETWORK DEVICES USING ACCESS CONTROL PROTOCOLS

    公开(公告)号:US20200322145A1

    公开(公告)日:2020-10-08

    申请号:US16784025

    申请日:2020-02-06

    IPC分类号: H04L9/08 H04L29/06 H04L9/32

    摘要: Systems, methods, and computer-readable media for authenticating access control messages include receiving, at a first node, access control messages from a second node. The first node and the second node including network devices and the access control messages can be based on RADIUS or TACACS+ protocols among others. The first node can obtain attestation information from one or more fields of the access control messages determine whether the second node is authentic and trustworthy based on the attestation information. The first node can also determine reliability or freshness of the access control messages based on the attestation information. The first node can be a server and the second node can be a client, or the first node can be a client and the second node can be a server. The attestation information can include Proof of Integrity based on a hardware fingerprint, device identifier, or Canary Stamp.

    Enriching local cryptoprocessor queries with sdn augmented information

    公开(公告)号:US20200322143A1

    公开(公告)日:2020-10-08

    申请号:US16750786

    申请日:2020-01-23

    IPC分类号: H04L9/08 H04L9/32 G06F9/455

    摘要: The present technology discloses a method for enriching local crypto-processor queries with software-defined networking augmented information, comprising sending, from a virtual machine installed on a physical host, a request for trust verification data; augmenting, by an identity verification system on the physical host, the request for trust verification data with encrypted information from an external entity; receiving, at a trusted processor module on the physical host, the request for trust verification data; receiving, at the virtual machine, the trust verification data; and assessing, at the virtual machine, a state of the physical host based on the trust verification data.

    Achieving minimum trustworthiness in distributed workloads

    公开(公告)号:US11960607B2

    公开(公告)日:2024-04-16

    申请号:US17547084

    申请日:2021-12-09

    IPC分类号: G06F21/57

    CPC分类号: G06F21/57 G06F2221/033

    摘要: This disclosure describes techniques for selectively placing and maintaining sensitive workloads in subsystems that achieve a minimum level of trustworthiness. An example method includes identifying at least one trustworthiness requirement associated with an application and transmitting, to a first subsystem, a request for at least one trustworthiness characteristic of the first subsystem and at least one second subsystem connected to the first subsystem. A response indicating the at least one trustworthiness characteristic is received from the first subsystem. The example method further includes determining that the at least one trustworthiness characteristic satisfies the at least one trustworthiness requirement; and causing the application to operate on a mesh comprising the first subsystem and the at least one second subsystem.