Jump to content

18601777. ACHIEVING MINIMUM TRUSTWORTHINESS IN DISTRIBUTED WORKLOADS simplified abstract (Cisco Technology, Inc.)

From WikiPatents

ACHIEVING MINIMUM TRUSTWORTHINESS IN DISTRIBUTED WORKLOADS

Organization Name

Cisco Technology, Inc.

Inventor(s)

Eric Voit of Bethesda MD (US)

Einar Nilsen-nygaard of East Ayrshire (GB)

Frank Brockners of Koln (DE)

Pradeep Kumar Kathail of Los Altos CA (US)

ACHIEVING MINIMUM TRUSTWORTHINESS IN DISTRIBUTED WORKLOADS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18601777 titled 'ACHIEVING MINIMUM TRUSTWORTHINESS IN DISTRIBUTED WORKLOADS

Abstract: This disclosure describes techniques for selectively placing and maintaining sensitive workloads in subsystems that achieve a minimum level of trustworthiness. An example method includes identifying trustworthiness requirements associated with an application, transmitting a request for trustworthiness characteristics of subsystems, receiving a response indicating trustworthiness characteristics, determining satisfaction of trustworthiness requirements, and causing the application to operate on a mesh of subsystems.

  • Simplified Explanation:

The patent application discusses methods for securely managing sensitive workloads by placing them in trustworthy subsystems.

  • Key Features and Innovation:

- Identification of trustworthiness requirements for applications - Transmission of requests for trustworthiness characteristics of subsystems - Determination of satisfaction of trustworthiness requirements - Operation of applications on a mesh of subsystems for enhanced security

  • Potential Applications:

- Secure data processing in cloud computing environments - Protection of sensitive information in IoT devices - Enhanced cybersecurity measures for critical infrastructure systems

  • Problems Solved:

- Mitigating risks associated with unauthorized access to sensitive workloads - Ensuring data integrity and confidentiality in high-security environments

  • Benefits:

- Improved trustworthiness of subsystems handling sensitive workloads - Enhanced security measures for critical applications - Reduced vulnerability to cyber threats and data breaches

  • Commercial Applications:

Title: Secure Workload Management System for Critical Applications This technology can be utilized in industries such as finance, healthcare, and government sectors where data security is paramount. It can also be integrated into cloud service providers to offer enhanced security features to their clients.

  • Prior Art:

Readers can explore prior art related to secure workload management systems in the fields of cybersecurity, cloud computing, and data protection.

  • Frequently Updated Research:

Stay updated on the latest advancements in secure workload management systems, trustworthiness requirements for applications, and cybersecurity measures for sensitive workloads.

Questions about Secure Workload Management Systems: 1. How does this technology improve data security in cloud computing environments? - This technology enhances data security by placing sensitive workloads in trustworthy subsystems, reducing the risk of unauthorized access and data breaches.

2. What are the potential implications of this innovation for IoT devices? - This innovation can significantly improve the security of IoT devices by ensuring that sensitive workloads are processed in secure subsystems, safeguarding critical data from cyber threats.


Original Abstract Submitted

This disclosure describes techniques for selectively placing and maintaining sensitive workloads in subsystems that achieve a minimum level of trustworthiness. An example method includes identifying at least one trustworthiness requirement associated with an application and transmitting, to a first subsystem, a request for at least one trustworthiness characteristic of the first subsystem and at least one second subsystem connected to the first subsystem. A response indicating the at least one trustworthiness characteristic is received from the first subsystem. The example method further includes determining that the at least one trustworthiness characteristic satisfies the at least one trustworthiness requirement; and causing the application to operate on a mesh comprising the first subsystem and the at least one second subsystem.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.