US Patent Application 17827641. ESTABLISHMENT OF TRUST FOR DISCONNECTED EDGE-BASED DEPLOYMENTS simplified abstract

From WikiPatents
Jump to navigation Jump to search

ESTABLISHMENT OF TRUST FOR DISCONNECTED EDGE-BASED DEPLOYMENTS

Organization Name

Microsoft Technology Licensing, LLC==Inventor(s)==

[[Category:Rahul Bose of Acton MA (US)]]

[[Category:Anand Muthurajan of Redmond WA (US)]]

[[Category:Ronald Mark Parker of Manchester MA (US)]]

[[Category:Michael Anthony Brown of McKinney TX (US)]]

[[Category:Mark Gordon Libby of Groton MA (US)]]

ESTABLISHMENT OF TRUST FOR DISCONNECTED EDGE-BASED DEPLOYMENTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17827641 titled 'ESTABLISHMENT OF TRUST FOR DISCONNECTED EDGE-BASED DEPLOYMENTS

Simplified Explanation

The patent application describes a computing network that includes a computing service provider and an edge computing network.

  • The network includes a trusted device that establishes a root of trust at the edge computing network using a trusted component on the device.
  • If there is a disconnection or degradation of communications between the computing service provider and the edge computing network, the edge computing network enters an autonomous mode.
  • In this mode, the trusted device identifies new devices trying to access computing resources in the edge computing network.
  • The trusted device then stores data about these unauthorized devices that attempted to access the network.


Original Abstract Submitted

A computing network comprising a computing service provider and an edge computing network is managed. A trusted device establishes a root of trust at the edge computing network via a trusted component on the trusted device. In response to receiving a first indication of a disconnection or degradation of communications between the computing service provider and the edge computing network, the edge computing network initiates an autonomous mode at the edge computing network. While the edge computing network is operating in the autonomous mode, the trusted device detects new devices that are attempting to access computing resources in the edge computing network. The trusted device stores data pertaining to new devices that were not authorized to access the computing resources in the edge computing network.