Technologies for collective authorization with hierarchical group keys

    公开(公告)号:US12047503B2

    公开(公告)日:2024-07-23

    申请号:US18051825

    申请日:2022-11-01

    CPC classification number: H04L9/14 H04L9/0822 H04L9/0825 H04L9/0836 H04L9/3247

    Abstract: Technologies for secure collective authorization include multiple computing devices in communication over a network. A computing device may perform a join protocol with a group leader to receive a group private key that is associated with an interface implemented by the computing device. The interface may be an instance of an object model implemented by the computing device or membership of the computing device in a subsystem. The computing device receives a request for attestation to the interface, selects the group private key for the interface, and sends an attestation in response to the request. Another computing device may receive the attestation and verify the attestation with a group public key corresponding to the group private key. The group private key may be an enhanced privacy identifier (EPID) private key, and the group public key may be an EPID public key. Other embodiments are described and claimed.

    Continuous testing, integration, and deployment management for edge computing

    公开(公告)号:US12026074B2

    公开(公告)日:2024-07-02

    申请号:US17028844

    申请日:2020-09-22

    CPC classification number: G06F11/263 G06F9/44505

    Abstract: Various aspects of methods, systems, and use cases for testing, integration, and deployment of failure conditions in an edge computing environment is provided through use of perturbations. In an example, operations to implement controlled perturbations in an edge computing platform include: identifying at least one perturbation parameter available to be implemented with a hardware components of an edge computing system that provides a service using the hardware components; determining values, which disrupt operation of the service, to implement the perturbation parameter among the hardware components; deploying the perturbation parameters to the hardware components, during operation of the service to process a computing workload, to cause perturbation effects on the service; collecting telemetry values associated with the hardware components, produced during operation of the service that indicate the perturbation effects upon the operation of the service; and cause a computing operation to occur based on the collected telemetry values.

    METHODS AND APPARATUS TO MANAGE TELEMETRY DATA IN COMPUTING SYSTEMS

    公开(公告)号:US20240187310A1

    公开(公告)日:2024-06-06

    申请号:US18399569

    申请日:2023-12-28

    CPC classification number: H04L41/147 H04L67/12

    Abstract: Systems, apparatus, articles of manufacture, and methods are disclosed to monitor telemetry data in computing system. An example apparatus includes interface circuitry to obtain telemetry data; computer readable instructions; and programmable circuitry to instantiate: aggregation circuitry to analyze the telemetry data using an artificial intelligence model to detect an event; and action controller circuitry to: determine a telemetry collection resolution associated with the event; and instruct a telemetry collection operation associated with the telemetry data to adjust collection of the telemetry data according to the determined telemetry collection resolution.

    One-touch inline cryptographic data processing

    公开(公告)号:US11943207B2

    公开(公告)日:2024-03-26

    申请号:US17032391

    申请日:2020-09-25

    CPC classification number: H04L63/0435 G06F13/28 G06F21/602 H04L63/166

    Abstract: Methods, systems, and use cases for one-touch inline cryptographic data security are discussed, including an edge computing device with a network communications circuitry (NCC), an enhanced DMA engine coupled to a memory device and including a cryptographic engine, and processing circuitry configured to perform a secure exchange with a second edge computing device to negotiate a shared symmetric encryption key, based on a request for data. An inline encryption command for communication to the enhanced DMA engine is generated. The inline encryption command includes a first address associated with a storage location storing the data, a second address associated with a memory location in the memory device, and the shared symmetric encryption key. The data is retrieved from the storage location using the first address, the data is encrypted using the shared symmetric encryption key, and the encrypted data is stored in the memory location using the second address.

    Calculus for trust in edge computing and named function networks

    公开(公告)号:US11888858B2

    公开(公告)日:2024-01-30

    申请号:US17064218

    申请日:2020-10-06

    CPC classification number: H04L63/123 G06F8/60 H04L45/72 H04L63/08 H04L67/568

    Abstract: Various aspects of methods, systems, and use cases for verification and attestation of operations in an edge computing environment are described, based on use of a trust calculus and established definitions of trustworthiness properties. In an example, an edge computing verification node is configured to: obtain a trust representation, corresponding to an edge computing feature, that is defined with a trust calculus and provided in a data definition language; receive, from an edge computing node, compute results and attestation evidence from the edge computing feature; attempt validation of the attestation evidence based on attestation properties defined by the trust representation; and communicate an indication of trustworthiness for the compute results, based on the validation of the attestation evidence. In further examples, the trust representation and validation is used in a named function network (NFN), for dynamic composition and execution of a function.

Patent Agency Ranking