ENFORCING LOCATION-BASED DATA PRIVACY RULES ACROSS NETWORKED WORKLOADS

    公开(公告)号:US20240265126A1

    公开(公告)日:2024-08-08

    申请号:US18621076

    申请日:2024-03-28

    摘要: Techniques for maintaining geographic-based data privacy rules in networked environments. An example method includes receiving, from a first subsystem, a query for data; receiving, from the first subsystem, an aggregate passport indicating at least one geographic region in which the first subsystem and at least one second subsystem connected to the first subsystem operates; and determining that the at least one geographic region complies with at least one data privacy rule that applies to the entity. Based on determining that the at least one geographic region complies with the at least one data privacy rule that applies to the entity, the example method further includes transmitting, to the first subsystem, at least a portion of the data; and storing an indication that the at least the portion of the data has been shared.

    ACHIEVING MINIMUM TRUSTWORTHINESS IN DISTRIBUTED WORKLOADS

    公开(公告)号:US20240248992A1

    公开(公告)日:2024-07-25

    申请号:US18601777

    申请日:2024-03-11

    IPC分类号: G06F21/57

    CPC分类号: G06F21/57 G06F2221/033

    摘要: This disclosure describes techniques for selectively placing and maintaining sensitive workloads in subsystems that achieve a minimum level of trustworthiness. An example method includes identifying at least one trustworthiness requirement associated with an application and transmitting, to a first subsystem, a request for at least one trustworthiness characteristic of the first subsystem and at least one second subsystem connected to the first subsystem. A response indicating the at least one trustworthiness characteristic is received from the first subsystem. The example method further includes determining that the at least one trustworthiness characteristic satisfies the at least one trustworthiness requirement; and causing the application to operate on a mesh comprising the first subsystem and the at least one second subsystem.

    Network enclave attestation for network and compute devices

    公开(公告)号:US11838283B2

    公开(公告)日:2023-12-05

    申请号:US17937935

    申请日:2022-10-04

    IPC分类号: H04L9/40

    CPC分类号: H04L63/08 H04L63/126

    摘要: An enclave manager of a network enclave obtains a request to retrieve configuration information and state information corresponding to compute devices and network devices comprising a network enclave. The request specifies a set of parameters of the configuration information and the state information usable to generate a response to the request. The enclave manager evaluates the compute devices, the network devices, and network connections among these devices within the network enclave to obtain the configuration information and the state information. Based on the configuration information and the state information, the enclave manager determines whether the network enclave is trustworthy. Based on the parameters of the request, the enclave manager generates a response indicating a summary that is used to identify the trustworthiness of the network enclave.

    RANDOMIZING SERVER-SIDE ADDRESSES
    5.
    发明公开

    公开(公告)号:US20230179579A1

    公开(公告)日:2023-06-08

    申请号:US18104603

    申请日:2023-02-01

    摘要: Techniques for using Network Address Translation (NAT), Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS) to anonymize server-side addresses in data communications. Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a random IP address that is mapped to the client device and the endpoint device. In this way, IP addresses of servers are obfuscated by a random IP address that cannot be used to identify the endpoint device or service. The client device may then communicate data packets to the server using the random IP address as the destination address, and a gateway that works in conjunction with DNS can convert the random IP address to the actual IP address of the server using NAT and forward the data packet onto the server.

    Network enclave attestation for network and compute devices

    公开(公告)号:US11489823B2

    公开(公告)日:2022-11-01

    申请号:US16808966

    申请日:2020-03-04

    IPC分类号: H04L9/40

    摘要: An enclave manager of a network enclave obtains a request to retrieve configuration information and state information corresponding to compute devices and network devices comprising a network enclave. The request specifies a set of parameters of the configuration information and the state information usable to generate a response to the request. The enclave manager evaluates the compute devices, the network devices, and network connections among these devices within the network enclave to obtain the configuration information and the state information. Based on the configuration information and the state information, the enclave manager determines whether the network enclave is trustworthy. Based on the parameters of the request, the enclave manager generates a response indicating a summary that is used to identify the trustworthiness of the network enclave.

    TECHNOLOGIES FOR PROVING PACKET TRANSIT THROUGH UNCOMPROMISED NODES

    公开(公告)号:US20220247757A1

    公开(公告)日:2022-08-04

    申请号:US17728333

    申请日:2022-04-25

    IPC分类号: H04L9/40 H04L69/22

    摘要: Technologies for proving packet transit through uncompromised nodes are provided. An example method can include receiving a packet including one or more metadata elements generated based on security measurements from a plurality of nodes along a path of the packet; determining a validity of the one or more metadata elements based on a comparison of one or more values in the one or more metadata elements with one or more expected values calculated for the one or more metadata elements, one or more signatures in the one or more metadata elements, and/or timing information associated with the one or more metadata elements; and based on the one or more metadata elements, determining whether the packet traversed any compromised nodes along the path of the packet.

    AUTHENTICATION OF NETWORK DEVICES USING ACCESS CONTROL PROTOCOLS

    公开(公告)号:US20220239476A1

    公开(公告)日:2022-07-28

    申请号:US17659530

    申请日:2022-04-18

    IPC分类号: H04L9/08 H04L9/32 H04L9/40

    摘要: Systems, methods, and computer-readable media for authenticating access control messages include receiving, at a first node, access control messages from a second node. The first node and the second node including network devices and the access control messages can be based on RADIUS or TACACS+ protocols among others. The first node can obtain attestation information from one or more fields of the access control messages determine whether the second node is authentic and trustworthy based on the attestation information. The first node can also determine reliability or freshness of the access control messages based on the attestation information. The first node can be a server and the second node can be a client, or the first node can be a client and the second node can be a server. The attestation information can include Proof of Integrity based on a hardware fingerprint, device identifier, or Canary Stamp.

    Network security by integrating mutual attestation

    公开(公告)号:US11321465B2

    公开(公告)日:2022-05-03

    申请号:US16752488

    申请日:2020-01-24

    IPC分类号: G06F21/57 H04L9/32 H04L9/08

    摘要: Technologies for attestation techniques, systems, and methods to confirm the integrity of a device for establishing and/or maintaining a trustworthy encrypted network session. An example method can include sending, via a server and using a cryptographic security protocol, a message associated with establishing an encrypted network session; receiving a response from a client device; identifying a level of trust of the client device based on the response; determining whether to perform a next step in the cryptographic security protocol based on the level of trust, wherein the cryptographic security protocol comprises at least one of a Secure Shell (SSH) protocol, a Transport Layer Security (TLS) protocol, a Secure Sockets Layer (SSL) protocol, and an Internet Protocol Security (IPsec) protocol.