Intel corporation (20240348660). Hardware-based Zero Trust Network Access Agent for Improved Security simplified abstract

From WikiPatents
Revision as of 00:37, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Hardware-based Zero Trust Network Access Agent for Improved Security

Organization Name

intel corporation

Inventor(s)

Omer Ben-shalom of Rishon Le-Tzion (IL)

Dan Horovitz of Rishon Le-Tzion (IL)

Ilil Blum Shem-tov of Kiryat Tivon (IL)

Lev Faerman of Ramat Gan (IL)

Wissam Ghammashi of Carmiel (IL)

Hardware-based Zero Trust Network Access Agent for Improved Security - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240348660 titled 'Hardware-based Zero Trust Network Access Agent for Improved Security

Simplified Explanation

This patent application describes hardware-based zero trust network access agents that enhance security by detecting device requests, determining device security states, and transmitting requests to a host operating system based on the security state.

  • Network interface circuitry
  • Machine-readable instructions
  • First processor circuitry for detecting and determining security states
  • Transmission of requests to a host operating system via a virtual network interface

Key Features and Innovation

  • Hardware-based zero trust network access agents
  • Detection of device requests
  • Determination of device security states
  • Transmission of requests to a host operating system based on security state

Potential Applications

This technology can be applied in various industries such as cybersecurity, network security, and data protection.

Problems Solved

This technology addresses the need for improved security measures in network access by implementing zero trust principles.

Benefits

  • Enhanced security for network access
  • Improved protection against unauthorized access
  • Efficient transmission of requests to host operating systems

Commercial Applications

  • Cybersecurity companies
  • Network security providers
  • Data protection services

Prior Art

Readers can explore prior art related to zero trust network access agents in the field of cybersecurity and network security.

Frequently Updated Research

Stay updated on the latest research in hardware-based zero trust network access agents to ensure optimal security measures are in place.

Questions about Zero Trust Network Access Agents

How do hardware-based zero trust network access agents improve security?

Hardware-based zero trust network access agents enhance security by detecting device requests, determining security states, and transmitting requests based on the security state.

What industries can benefit from implementing zero trust network access agents?

Various industries such as cybersecurity, network security, and data protection can benefit from the implementation of zero trust network access agents.


Original Abstract Submitted

hardware-based zero trust network access agents for improved security are disclosed herein. an example apparatus includes network interface circuitry; machine-readable instructions; and first processor circuitry programmable by the instructions to detect, via firmware execution, a request from a device to access a resource via a zero trust network access interface; determine, via the firmware execution, a security state of the device; and based on the security state of the device, transmit the request to a host operating system (os) via a virtual network interface, the operating system executed via second processor circuitry different than the first processor circuitry.