17806635. INFRASTRUCTURAL EDGE SECURITY AS A SERVICE simplified abstract (Dell Products L.P.)
INFRASTRUCTURAL EDGE SECURITY AS A SERVICE
Organization Name
Inventor(s)
Victor Fong of Melrose MA (US)
INFRASTRUCTURAL EDGE SECURITY AS A SERVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 17806635 titled 'INFRASTRUCTURAL EDGE SECURITY AS A SERVICE
Simplified Explanation
Abstract
The patent application discloses edge security for distributed infrastructure. Hosts in the infrastructure have data processing units that can be centrally managed. Security policies can be selectively distributed and localized at the hosts, allowing for real-time reactions to security violations. The security policies can be rule-based or inference mode-based.
Bullet Points
- Distributed infrastructure equipped with data processing units
- Central management of hosts using a control plane
- Selective distribution and localization of security policies
- Real-time reactions to security violations
- Rule-based and inference mode-based security policies
Potential Applications
- Cloud computing environments
- Internet of Things (IoT) networks
- Industrial control systems
- Edge computing platforms
Problems Solved
- Lack of centralized management for distributed infrastructure
- Inability to react to security violations in real-time
- Difficulty in distributing and localizing security policies
Benefits
- Enhanced security for distributed infrastructure
- Real-time reactions to security violations
- Centralized management for improved efficiency
- Flexibility in choosing security policy types
Original Abstract Submitted
Edge security is disclosed. Hosts included in a distributed infrastructure are equipped with data processing units that may be centrally managed using a control plane. Security policies can be selectively distributed to the hosts and localized at the hosts. Reactions to security violations can be initiated at the hosts in substantially real-time. The security policies may take various forms, including rule-based security policies and inference mode-based security policies.