CROWD-SOURCED CLOUD COMPUTING RESOURCE VALIDATION

    公开(公告)号:US20230208782A1

    公开(公告)日:2023-06-29

    申请号:US18115957

    申请日:2023-03-01

    CPC classification number: H04L47/822 G06F9/5072 H04L43/022 H04L43/062

    Abstract: Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each IP address included in the received specification is determined. An agent is deployed that is operable to determine the value of each of a set of metrics in the environment of the host at which the agent is deployed. The agent determines the value of each metric of the set of metrics in the environment of the relevant host, and communicates the determined values to one or more computing devices that validate whether the resources characterized by the communicated values are sufficient to provide the performance characterized by the received specification and that each ISP router complies with a predetermined policy. For each computing resource provider validated and determined to comprise an ISP router compliant with policy, the specified computing resources are added to a pool of resources for cloud computing.

    Vulnerability analysis and segmentation of bring-your-own IoT devices

    公开(公告)号:US10742678B2

    公开(公告)日:2020-08-11

    申请号:US15891749

    申请日:2018-02-08

    Abstract: In one embodiment, a security device maintains a plurality of security enclaves for a computer network, each associated with a given level of security policies. After detecting a given device joining the computer network, the security device places the given device in a strictest security enclave of the plurality of security enclaves in response to joining the computer network. The security device then subjects the given device to joint adversarial training, where a control agent representing behavior of the given device is trained against an inciting agent, and where the inciting agent attempts to force the control agent to misbehave by applying destabilizing policies. Accordingly, the security device may determine control agent behavior during the joint adversarial training, and promotes the given device to a less strict security enclave of the plurality of enclaves in response to the control agent being robust against the attempts by the inciting agent.

    Calculating latency in computer networks

    公开(公告)号:US10250474B2

    公开(公告)日:2019-04-02

    申请号:US14230224

    申请日:2014-03-31

    Abstract: In one implementation, data is communicated along a communications route in a network. A mediatrace request is generated for the communications route. Responses to the mediatrace request are received from along the communications route. The hop-by-hop latency is passively measured, from the responses, with one-way delay along the communications route in the network.

    Secure over-the-air provisioning solution for handheld and desktop devices and services
    6.
    发明授权
    Secure over-the-air provisioning solution for handheld and desktop devices and services 有权
    为手持设备和桌面设备和服务提供安全的空中配置解决方案

    公开(公告)号:US09450951B2

    公开(公告)日:2016-09-20

    申请号:US14982693

    申请日:2015-12-29

    Abstract: In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to obtain a unique identification (ID) of the device at the provisioning system. The device and provisioning system then participate in device and user authentication in response to a confirmed unique ID by a backend access control system, where the device generates a secure key pair after successful user authentication. In response to the device being approved for services (e.g., checked by the provisioning system via a registration system), the provisioning system provides a root certificate to the device, and the device sends a certificate enrollment request back to the provisioning system. In response to a certificate authority signing the certificate request, the provisioning system returns a valid certificate to the device, and the valid certificate is installed on the device.

    Abstract translation: 在一个实施例中,设备和服务提供系统彼此建立空中连接,并执行设备状态验证,以在配置系统获得设备的唯一标识(ID)。 设备和配置系统然后响应于后端接入控制系统的确认的唯一ID参与设备和用户认证,其中设备在成功的用户认证之后生成安全密钥对。 响应于设备被批准用于服务(例如,经由注册系统由供应系统检查),供应系统向设备提供根证书,并且设备将证书注册请求发回给供应系统。 响应证书颁发机构对证书请求的签名,配置系统将向设备返回有效的证书,并在设备上安装有效的证书。

    CROWD-SOURCED CLOUD COMPUTING
    7.
    发明申请
    CROWD-SOURCED CLOUD COMPUTING 有权
    CROWD-SOVERCED云计算

    公开(公告)号:US20160080477A1

    公开(公告)日:2016-03-17

    申请号:US14851437

    申请日:2015-09-11

    Abstract: A first party, such as a residential subscriber to an Internet Service Provider (ISP), logically partitions its computing resources into an end user partition and a crowd sourced cloud partition. The first party installs a crowd sourced cloud application in each cloud partition. Together, a cloud provider computing system and each cloud application orchestrate cloud services over a communications network, such as the Internet. For each crowd sourced cloud application, orchestration involves registering cloud services with the cloud provider, provisioning each registered cloud service that is requested by the cloud provider, and operating each provisioned service. For the cloud provider, orchestration involves publishing each registered service as available to crowd sourced cloud users, receiving requests for cloud services from a crowd sourced cloud user, and requesting, from a crowd sourced cloud application, a registered service responsive to the request for cloud services.

    Abstract translation: 诸如互联网服务提供商(ISP)的住宅用户的第一方在逻辑上将其计算资源分割成最终用户分区和群众来源的云分区。 第一方在每个云分区中安装了大量采购云应用程序。 云提供商计算系统和每个云应用程序一起通过通信网络(如Internet)来协调云服务。 对于每个群众云应用,业务流程涉及向云提供商注册云服务,为云提供商请求的每个已注册的云服务进行配置,并运行每个配置的服务。 对于云提供商,业务流程涉及发布每个已注册的服务,以供大众来源的云端用户使用,从群众云端的用户接收云服务请求,并根据云端云端应用程序向云端应用提出注册服务 服务。

    Secure Network Deployment
    8.
    发明申请
    Secure Network Deployment 审中-公开
    安全网络部署

    公开(公告)号:US20140223530A1

    公开(公告)日:2014-08-07

    申请号:US14248065

    申请日:2014-04-08

    CPC classification number: H04L63/0823 H04L63/0876 H04L63/0892 H04L67/303

    Abstract: In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.

    Abstract translation: 在一个实施例中,将制造商安装证书(MIC)和个人识别号码发送到呼叫控制器以请求配置简档。 当接收到配置文件时,会根据配置配置文件配置IP电话。

Patent Agency Ranking