Patent application number | Description | Published |
20120265976 | Secure Network Cloud Architecture - Apparatuses, computer readable media, methods, and systems are described for requesting creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud. Through various communications between a cloud DMZ, cloud provider, and/or company's network, a VM instance may be securely created, initialized, booted, unlocked, and/or monitored through a series of interactions building, in some examples, upon a root of trust. | 10-18-2012 |
20120266167 | Tenant Data Center for Establishing a Virtual Machine in a Cloud Environment - Apparatuses, computer readable media, methods, and systems are described for generating a first measurement of a virtualization platform, receiving a create measured virtual machine request comprising authentication information, in response to the request, creating a measured virtual machine based on the authentication information, generating a second measurement of the measured virtual machine, and communicating a quote generated based on the first measurement and the second measurement for attesting to authenticity of the virtualization platform and of the measured virtual machine. | 10-18-2012 |
20120266213 | TRUSTED HARDWARE FOR ATTESTING TO AUTHENTICITY IN A CLOUD ENVIRONMENT - Apparatuses, computer readable media, methods, and systems are described for storing a first measurement of a virtualization platform, storing a second measurement of a measured virtual machine, generating a quote using a key, wherein the quote is based on the first measurement and the second measurement, and providing the quote for attesting to authenticity of the virtualization platform and of the measured virtual machine. In a further example, the quote may be generated based on a third measurement of a secure tunnel. | 10-18-2012 |
20120266231 | Secure Network Cloud Architecture - Apparatuses, computer readable media, methods, and systems are described for requesting creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud. Through various communications between a cloud DMZ, cloud provider, and/or company's network, a VM instance may be securely created, initialized, booted, unlocked, and/or monitored through a series of interactions building, in some examples, upon a root of trust. | 10-18-2012 |
20120266252 | HARDWARE-BASED ROOT OF TRUST FOR CLOUD ENVIRONMENTS - Apparatuses, computer readable media, methods, and systems are described for generating and communicating a create measured virtual machine (VM) request, the request comprising a network address of a boot server, initiating establishment of a secure tunnel with a measured VM, receiving a quote from the measured VM, and determining, by a processor, whether the measured VM is authentic based on the quote. | 10-18-2012 |
20130019104 | CELL LEVEL DATA ENCRYPTIONAANM Halas; MiroslavAACI CharlottesvilleAAST VAAACO USAAGP Halas; Miroslav Charlottesville VA USAANM Umamaheswaran; RangarajanAACI Simi ValleyAAST CAAACO USAAGP Umamaheswaran; Rangarajan Simi Valley CA US - Embodiments of the invention provide for cell level data encryption. The methods, apparatus and computer program products herein described provide for the encryption of individual data values without requiring adjacent data valued to also be encrypted. For example, in situations where individual data values are arranged in a database that is visualized as a two-dimensional representation, individual data values may be encrypted without requiring horizontally or vertically adjacent data values to also be encrypted. In situations where data values is transmitted and visualized as a sequential stream of data values, one data value may be encrypted without requiring previous or subsequent data values to be encrypted. In some such examples, an individual data value may be encrypted without requiring the entire transmission channel to be encrypted. | 01-17-2013 |
20130304661 | CREATING FEDERATED CUSTOMER IDENTIFIERS TO POSITIVELY IDENTIFY CUSTOMERS INTERFACING WITH A BUSINESS ACROSS ACCESS PLATFORMS - Methods, apparatus, systems and computer program products described and claimed that provide for automatically and positively determining that a customer interfacing with one business platform application using a platform-specific customer identifier is the same customer that is interfacing with another business platform application using another platform-specific customer identifier. Once the positive determination of same customer is made, a federated identifier key is generated and applied to all of the platforms, so as to globally identify the customer across multiple enterprise-wide platforms. As such, the present invention eliminates the labor-intensive need to manually analyze customer data to determine if a customer interfacing with one platform is the same customer interfacing with another platform. | 11-14-2013 |
20130305317 | CREATING FEDERATED ASSOCIATE IDENTIFIERS TO POSITIVELY IDENTIFY ASSOCIATES INTERFACING ACROSS MULTIPLE BUSINESS APPLICATIONS - Methods, apparatus, systems and computer program products are described and claimed that provide for automatically and positively determining that an associate accessing a business domain/application using an application-specific associate identifier is the same associate that is accessing another business domain/application using another application-specific associate identifier. Once the positive determination of same associate is made, a federated identifier key is generated and applied to all of the platforms in which the associate can be positively identified, so as to globally identify the associates across multiple enterprise-wide domains/applications. As such, the present invention eliminates the need to manually analyze associate data to determine if an associate interfacing with one domain/application is the same associate interfacing with another domain/application. | 11-14-2013 |
20130339949 | Provisioning of a Virtual Machine by Using a Secured Zone of a Cloud Environment - Apparatuses, computer readable media, methods, and systems are described for providing a list of cloud orchestrator clients, each of the clients being associated with one of a plurality of cloud provider data centers, processing an instruction to at least one of create a virtual machine and change a state of the virtual machine, select a particular one of the cloud orchestrator clients associated with a particular one of the cloud provider data centers where the virtual machine is to be created or where the virtual machine currently resides, generating a provisioning request instructing the particular cloud orchestrator client to perform at least one of creating the virtual machine and changing the state of the virtual machine, and communicating the request to the particular cloud orchestrator client. | 12-19-2013 |
20140298439 | Trusted Hardware for Attesting to Authenticity in a Cloud Environment - Apparatuses, computer readable media, methods, and systems are described for storing a first measurement of a virtualization platform, storing a second measurement of a measured virtual machine, generating a quote using a key, wherein the quote is based on the first measurement and the second measurement, and providing the quote for attesting to authenticity of the virtualization platform and of the measured virtual machine. In a further example, the quote may be generated based on a third measurement of a secure tunnel. | 10-02-2014 |
20140331309 | Secure Network Cloud Architecture - Apparatuses, computer readable media, methods, and systems are described for requesting creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud. Through various communications between a cloud DMZ, cloud provider, and/or company's network, a VM instance may be securely created, initialized, booted, unlocked, and/or monitored through a series of interactions building, in some examples, upon a root of trust. | 11-06-2014 |