METHODS, DEVICES, AND MEDIA FOR SECURELY UTILIZING A NON-SECURED, DISTRIBUTED, VIRTUALIZED NETWORK RESOURCE WITH APPLICATIONS TO CLOUD-COMPUTING SECURITY AND MANAGEMENT
First Claim
1. A method for securely utilizing a network resource, the method comprising the steps of:
- (a) receiving, by a deployed security mechanism, a user request over a network;
(b) parsing said user request by said deployed security mechanism;
(c) preparing, by said deployed security mechanism, said user request to transmit to a computing-service resource; and
(d) submitting, by said deployed security mechanism, said user request to said computing-service resource.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management. Methods including the steps of: receiving, by a deployed security mechanism, a user request over a network; parsing the user request by the deployed security mechanism; preparing, including applying security measures, the user request to transmit to a computing-service resource; and submitting, by the deployed security mechanism, the user request to the computing-service resource. Methods further including the steps of: dividing an original data stream into a set of split data streams; applying a first invertible transformation function to the split data streams, which produces an intermediate set of data streams; and extracting a final set of data streams from the intermediate set by applying a selection rule which produces the final set, thereby transforming the original data stream into individually-unintelligible parts.
116 Citations
39 Claims
-
1. A method for securely utilizing a network resource, the method comprising the steps of:
-
(a) receiving, by a deployed security mechanism, a user request over a network; (b) parsing said user request by said deployed security mechanism; (c) preparing, by said deployed security mechanism, said user request to transmit to a computing-service resource; and (d) submitting, by said deployed security mechanism, said user request to said computing-service resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code comprising:
-
(a) program code for receiving a user request over a computer network; (b) program code for parsing said user request; (c) program code for preparing said user request to transmit to a computing-service resource; and (d) program code for submitting said user request to said computing-service resource. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A device for securely utilizing a network resource, the device comprising:
-
(a) a server including; (i) a CPU for performing computational operations; (ii) a memory module for storing data; and (iii) a network connection for communicating across a network; and (b) a deployed security mechanism, residing on said server, configured for; (i) receiving a user request over a network; (ii) parsing said user request; (iii) preparing said user request to transmit to a computing-service resource; and (iv) submitting said user request to said computing-service resource. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method for securing information by transforming the information into individually-unintelligible parts, the method comprising the steps of:
-
(a) dividing an original data stream into a set of split data streams; (b) applying a first invertible transformation function to said split data streams, said step of applying producing an intermediate set of data streams; and (c) extracting a final set of data streams from said intermediate set by applying a selection rule which produces said final set, thereby transforming said original data stream into individually-unintelligible parts in said final set. - View Dependent Claims (29, 30, 31)
-
-
32. A computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code comprising:
-
(a) program code for dividing an original data stream into a set of split data streams; (b) program code for applying a first invertible transformation function to said split data streams, said applying producing an intermediate set of data streams; and (c) program code for extracting a final set of data streams from said intermediate set by applying a selection rule which produces said final set, thereby transforming said original data stream into individually-unintelligible parts in said final set. - View Dependent Claims (33, 34, 35)
-
-
36. A device for securing information by transforming the information into individually-unintelligible parts, the device comprising:
-
(a) a data-processing unit including; (i) a CPU for performing computational operations; and (ii) a memory module for storing data; and (b) a deployed security mechanism, residing on said data-processing unit, configured for; (i) dividing an original data stream into a set of split data streams; (ii) applying a first invertible transformation function to said split data streams, said step of applying producing an intermediate set of data streams; and (iii) extracting a final set of data streams from said intermediate set by applying a selection rule which produces said final set, thereby transforming said original data stream into individually-unintelligible parts in said final set. - View Dependent Claims (37, 38, 39)
-
Specification