Unknown Organization (20240265128). SYSTEMS AND METHODS FOR REMOTELY STORING SECURITY CREDENTIALS IN CLOUD COMPUTING SYSTEMS FEATURING PARTITIONED NETWORK STRUCTURES simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR REMOTELY STORING SECURITY CREDENTIALS IN CLOUD COMPUTING SYSTEMS FEATURING PARTITIONED NETWORK STRUCTURES

Organization Name

Unknown Organization

Inventor(s)

Jinlian Wang of Falls Church VA (US)

Peter Zeller of McLean VA (US)

Christopher Schultz of Henrico VA (US)

SYSTEMS AND METHODS FOR REMOTELY STORING SECURITY CREDENTIALS IN CLOUD COMPUTING SYSTEMS FEATURING PARTITIONED NETWORK STRUCTURES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240265128 titled 'SYSTEMS AND METHODS FOR REMOTELY STORING SECURITY CREDENTIALS IN CLOUD COMPUTING SYSTEMS FEATURING PARTITIONED NETWORK STRUCTURES

Simplified Explanation:

The patent application describes systems and methods that generate requests for encrypted credentials and data using various API plugins selected based on the access protocol for a network partition where the data is stored. By dynamically selecting API plugins, the systems can work across different access protocols for managing user accounts, networks, and cloud platforms.

  • Key Features and Innovation:
   * Generation of requests for encrypted credentials and data.
   * Selection of API plugins based on access protocols.
   * Compatibility with various access protocols for central management.

Potential Applications: This technology can be applied in various industries such as cybersecurity, cloud computing, network management, and data protection.

Problems Solved: The technology addresses the challenge of managing encrypted credentials and data across diverse network partitions with different access protocols.

Benefits: The technology provides a secure and efficient way to request and manage encrypted credentials and data across various network partitions and access protocols.

Commercial Applications: Potential commercial applications include cybersecurity software, cloud management platforms, and network security solutions. This technology can cater to organizations looking to enhance their data security and management capabilities.

Prior Art: Readers can explore prior art related to this technology by researching patents in the fields of cybersecurity, network management, and data encryption.

Frequently Updated Research: Stay updated on the latest advancements in cybersecurity, network management, and data encryption to understand how this technology fits into the evolving landscape.

Questions about Encrypted Credentials and Data Management: 1. How does the technology ensure compatibility with different access protocols? 2. What are the potential implications of using various API plugins for managing encrypted credentials and data?


Original Abstract Submitted

systems and methods generate requests for encrypted (e.g., secured) credentials and data using one of a plurality of api plugins that are selected based on an access protocol for a network partition at which requested data is determined to be stored. through the use of the dynamically-selected api plugins, the systems and methods may provide the aforementioned functions while being compatible with the different access protocols that may be encountered when providing central management across a diverse spectrum of user accounts, networks, and/or cloud platforms.