17806635. INFRASTRUCTURAL EDGE SECURITY AS A SERVICE simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

INFRASTRUCTURAL EDGE SECURITY AS A SERVICE

Organization Name

Dell Products L.P.

Inventor(s)

Victor Fong of Melrose MA (US)

Sarah Evans of Parker CO (US)

INFRASTRUCTURAL EDGE SECURITY AS A SERVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 17806635 titled 'INFRASTRUCTURAL EDGE SECURITY AS A SERVICE

Simplified Explanation

Abstract

The patent application discloses edge security for distributed infrastructure. Hosts in the infrastructure have data processing units that can be centrally managed. Security policies can be selectively distributed and localized at the hosts, allowing for real-time reactions to security violations. The security policies can be rule-based or inference mode-based.

Bullet Points

  • Distributed infrastructure equipped with data processing units
  • Central management of hosts using a control plane
  • Selective distribution and localization of security policies
  • Real-time reactions to security violations
  • Rule-based and inference mode-based security policies

Potential Applications

  • Cloud computing environments
  • Internet of Things (IoT) networks
  • Industrial control systems
  • Edge computing platforms

Problems Solved

  • Lack of centralized management for distributed infrastructure
  • Inability to react to security violations in real-time
  • Difficulty in distributing and localizing security policies

Benefits

  • Enhanced security for distributed infrastructure
  • Real-time reactions to security violations
  • Centralized management for improved efficiency
  • Flexibility in choosing security policy types


Original Abstract Submitted

Edge security is disclosed. Hosts included in a distributed infrastructure are equipped with data processing units that may be centrally managed using a control plane. Security policies can be selectively distributed to the hosts and localized at the hosts. Reactions to security violations can be initiated at the hosts in substantially real-time. The security policies may take various forms, including rule-based security policies and inference mode-based security policies.