Dell Products, L.P. (20240235852). BLOCKCHAIN SECURITY FOR DISTRIBUTED MULTI-CLOUD ORCHESTRATION AND CONFIGURATION MANAGEMENT simplified abstract

From WikiPatents
Jump to navigation Jump to search

BLOCKCHAIN SECURITY FOR DISTRIBUTED MULTI-CLOUD ORCHESTRATION AND CONFIGURATION MANAGEMENT

Organization Name

Dell Products, L.P.

Inventor(s)

Bridget Cate of Taylors SC (US)

Ching-Yun Chao of Austin TX (US)

Elie Antoun Jreij of Pflugerville TX (US)

BLOCKCHAIN SECURITY FOR DISTRIBUTED MULTI-CLOUD ORCHESTRATION AND CONFIGURATION MANAGEMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240235852 titled 'BLOCKCHAIN SECURITY FOR DISTRIBUTED MULTI-CLOUD ORCHESTRATION AND CONFIGURATION MANAGEMENT

The abstract describes a method for blockchain security in distributed multi-cloud orchestration and configuration management. The method involves receiving an admission request from a computing device, validating hardware verification data by other computing devices in the blockchain system, and granting admission based on successful validation.

  • Blockchain security method for distributed multi-cloud orchestration and configuration management
  • Admission request with hardware verification data signed by a private key
  • Validation of hardware verification data by other computing devices using public key certificates
  • Granting admission based on a supermajority of successful validations

Potential Applications: - Secure multi-cloud orchestration and configuration management - Enhanced security for distributed computing environments

Problems Solved: - Ensuring secure admission of computing devices into a blockchain system - Preventing unauthorized access to the blockchain network

Benefits: - Improved security for multi-cloud environments - Enhanced trust and integrity in distributed systems

Commercial Applications: - Cloud service providers - Enterprise IT departments - Cybersecurity firms

Questions about Blockchain Security for Distributed Multi-Cloud Orchestration and Configuration Management:

1. How does the method ensure the authenticity of hardware verification data? The method uses public key certificates to validate the hardware verification data, ensuring its authenticity.

2. What is the significance of requiring a supermajority of successful validations for granting admission? Requiring a supermajority of successful validations enhances the security and trustworthiness of the blockchain system by ensuring consensus among a majority of computing devices.


Original Abstract Submitted

blockchain security for distributed multi-cloud orchestration and configuration management is described herein. a method as described herein can include receiving, by a system comprising a processor from a first computing device, an admission request for entry of the first computing device into a blockchain system, the admission request comprising hardware verification data relating to a hardware configuration of the first computing device, wherein the admission request is signed by a private key associated with the first computing device; facilitating, by the system, validation of the hardware verification data by respective second computing devices in the blockchain system, the validation being based on a public key stored in a public key certificate associated with the first computing device; and granting, by the system, admission of the first computing device into the blockchain system in response to a supermajority of the second computing devices successfully validating the hardware verification data.