18298657. SECURE METERING FOR HYPERCONVERGED INFRASTRUCTURES simplified abstract (VMware, Inc.)
Contents
- 1 SECURE METERING FOR HYPERCONVERGED INFRASTRUCTURES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SECURE METERING FOR HYPERCONVERGED INFRASTRUCTURES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Secure Metering of Hyperconverged Infrastructures
- 1.13 Original Abstract Submitted
SECURE METERING FOR HYPERCONVERGED INFRASTRUCTURES
Organization Name
Inventor(s)
Wenguang Wang of Santa Clara CA (US)
SECURE METERING FOR HYPERCONVERGED INFRASTRUCTURES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18298657 titled 'SECURE METERING FOR HYPERCONVERGED INFRASTRUCTURES
Simplified Explanation
The patent application discloses solutions for secure metering of hyperconverged infrastructures. This includes receiving a security token, accessing secondary storage using the token, determining usage data, generating a message digest, and transmitting data to a metering server.
- Receiving a security token
- Accessing secondary storage with the token
- Determining usage data for the storage
- Generating a message digest for the data and token
- Transmitting data to a metering server
Key Features and Innovation
- Secure metering of hyperconverged infrastructures
- Usage data optimization for secondary storage
- Security token-based access control
- Message digest generation for data verification
- No persistence of security token on customer premises
Potential Applications
The technology can be applied in cloud computing, data centers, and storage management systems to ensure secure metering and optimize usage data for secondary storage.
Problems Solved
The technology addresses the need for secure metering in hyperconverged infrastructures, access control for secondary storage, and data verification for usage optimization.
Benefits
- Enhanced security for metering processes
- Improved access control for secondary storage
- Optimization of usage data for storage management
- Efficient data verification for accuracy
Commercial Applications
- Cloud service providers
- Data center operators
- Storage management software developers
Prior Art
Prior art related to this technology may include patents or research papers on secure metering in cloud computing and data storage systems.
Frequently Updated Research
Stay updated on research related to secure metering, access control, and data optimization in hyperconverged infrastructures for the latest advancements in the field.
Questions about Secure Metering of Hyperconverged Infrastructures
How does the technology ensure secure access to secondary storage?
The technology uses a security token for access control and generates message digests for data verification, ensuring secure access to secondary storage.
What are the potential applications of this technology beyond hyperconverged infrastructures?
The technology can be applied in various industries such as cloud computing, data centers, and storage management systems for secure metering and data optimization.
Original Abstract Submitted
Solutions for secure metering of hyperconverged infrastructures are disclosed. Examples include: receiving a security token; accessing a secondary storage (e.g., cold storage, backups) using the security token; determining usage data for the secondary storage; generating a first message digest for a combination of the usage data and the security token; and transmitting, to a metering server, the usage data and the first message digest. In some examples, the combination of the usage data and the security token comprises a concatenation of the usage data and the security token. In some examples, the metering server requests verification usage data from the secondary storage, generates a second message digest for a combination of the verification usage data and the security token, and compares the first message digest with the second message digest. Examples do not persist the security token on customer premises. Examples leverage the usage data to optimize the secondary storage.