×

Cloud over IP session layer network

  • US 10,348,767 B1
  • Filed: 02/24/2017
  • Issued: 07/09/2019
  • Est. Priority Date: 02/26/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing, through a virtual network, a public cloud provided by a cloud services provider for an enterprise comprising:

  • providing a plurality of agents for a plurality of endpoints, the plurality of endpoints to be hosted by a plurality of server machines in the public cloud provided by the cloud services provider for the enterprise;

    providing a controller that connects to the plurality of agents;

    storing, at the controller, a whitelist identifying components of a multi-tiered application authorized by the enterprise to use the virtual network;

    defining an application profile for the multi-tiered application, the application profile specifying valid computing flows between components of a tier of the multi-tiered application and components of another tier of the multi-tiered application, the components of the tier to be executed at an endpoint, and the other components of the other tier to be executed at another different endpoint;

    provisioning the plurality of endpoints according to the application profile, the provisioning comprising generating a plurality of static routing tables for the plurality of endpoints, a static routing table for an endpoint comprising at least one Internet Protocol (IP) subnet;

    distributing a first static routing table, and a first agent to a first endpoint, wherein when a request is received at the first endpoint to connect to a second endpoint, the first agent determines whether an IP address of the second endpoint falls within the at least one IP subnet;

    when the IP address of the second endpoint falls within the at least one IP subnet, receiving, at the controller from the first agent, a request to perform a security check;

    in response to the security check request, checking the whitelist to determine whether a requestor of the request to connect to the second endpoint is listed as a component of the multi-tiered application authorized to use the virtual network; and

    when the requestor of the request to connect to the second endpoint is not listed in the whitelist as a component of the multi-tiered application authorized to use the virtual network, denying the connection to the second endpoint.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×