Dell Products L.P. (20240380610). SECURE COMMUNICATIONS BETWEEN EDGE CLUSTERS AND CLUSTER MANAGEMENT SYSTEM simplified abstract
Contents
SECURE COMMUNICATIONS BETWEEN EDGE CLUSTERS AND CLUSTER MANAGEMENT SYSTEM
Organization Name
Inventor(s)
Emmanuel Andre of Singapore (SG)
Yedukondalu Vanipenta of Singapore (SG)
Bradley K. Goodman of Nashua NH (US)
SECURE COMMUNICATIONS BETWEEN EDGE CLUSTERS AND CLUSTER MANAGEMENT SYSTEM - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240380610 titled 'SECURE COMMUNICATIONS BETWEEN EDGE CLUSTERS AND CLUSTER MANAGEMENT SYSTEM
Simplified Explanation: The patent application describes an apparatus that establishes secure communication channels between edge computing sites and a management system using certificates and a mutual authentication protocol.
Key Features and Innovation:
- Establishment of secure communication channels between edge computing sites and a management system.
- Use of certificate signing requests and digitally signed certificates for authentication.
- Utilization of a mutual authentication protocol for the secure communication channels.
Potential Applications: This technology can be applied in various industries such as telecommunications, IoT, and cloud computing for secure data transmission and management.
Problems Solved: This technology addresses the need for secure communication channels between edge computing sites and a central management system to prevent unauthorized access and data breaches.
Benefits:
- Enhanced security for data transmission and management.
- Efficient establishment of secure communication channels.
- Prevention of unauthorized access to edge computing sites.
Commercial Applications: The technology can be used in industries where secure communication channels are essential, such as healthcare, finance, and government sectors, to ensure data privacy and security.
Prior Art: Readers can explore prior art related to secure communication protocols, certificate authentication, and mutual authentication protocols in the field of network security.
Frequently Updated Research: Stay updated on advancements in secure communication protocols, certificate management systems, and mutual authentication technologies to enhance the efficiency and security of edge computing networks.
Questions about Secure Communication Channels: 1. How does the mutual authentication protocol enhance the security of the communication channels? 2. What are the potential vulnerabilities that this technology aims to address in edge computing networks?
Original Abstract Submitted
an apparatus comprises at least one processing device configured to establish a first secure communication channel between at least one edge computing site and a management system, and to send a certificate signing request over the first secure communication channel from the at least one edge computing site to the management system. the processing device is further configured to receive, over the first secure communication channel from the management system in response to the certificate signing request, a digitally signed certificate for the at least one edge computing site and a certificate authority certificate. the processing device is still further configured to establish a second secure communication channel between the at least one edge computing site and the management system. the second secure communication channel utilizes a mutual authentication protocol. the certificate authority certificate and the digitally signed certificate are used to establish the second secure communication channel.