SYSTEM AND METHOD FOR CREATING A TRUSTED CLOUD SECURITY ARCHITECTURE
First Claim
1. A computer implemented method for creating a trusted cloud security architecture comprising the following steps:
- a primary agent communicating with two or more secondary agents creating a trust ring, the primary agent operating on a primary guest OS and two or more secondary agents operating on two or more secondary guest OSs;
implementing a latency based topology for the trust ring comprising a network of links between disparate IP addresses, the disparate IP addresses corresponding with the primary agent and two or more secondary agents;
the primary agent and two or more secondary agents exchanging data packets between the latency based topology within the trust ring; and
outputting the exchanged data packets to a processing engine, the processing engine determining a trust status for the trust ring, the trust status based on the data packets between the latency based topology.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method for providing a computer implemented method and system for creating a trusted cloud security architecture having the following steps: a primary agent communicating with two or more secondary agents creating a trust ring or other shape of agent communications, the primary agent operating on a primary guest OS and two or more secondary agents operating on two or more secondary guest OSs; implementing a latency based topology for the trust ring having a network of links between disparate IP addresses, the disparate IP addresses corresponding with the primary agent and two or more secondary agents; the primary agent and two or more secondary agents exchanging data packets between the latency based topology within the trust ring; and outputting the exchanged data packets to a processing engine, the processing engine determining a trust status for the trust ring, the trust status based on the data packets between the latency based topology.
-
Citations
20 Claims
-
1. A computer implemented method for creating a trusted cloud security architecture comprising the following steps:
-
a primary agent communicating with two or more secondary agents creating a trust ring, the primary agent operating on a primary guest OS and two or more secondary agents operating on two or more secondary guest OSs; implementing a latency based topology for the trust ring comprising a network of links between disparate IP addresses, the disparate IP addresses corresponding with the primary agent and two or more secondary agents; the primary agent and two or more secondary agents exchanging data packets between the latency based topology within the trust ring; and outputting the exchanged data packets to a processing engine, the processing engine determining a trust status for the trust ring, the trust status based on the data packets between the latency based topology. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer implemented system for creating a trusted cloud security architecture for a primary agent with two or more secondary agents comprising:
-
a communication module configured to allow communication between the primary agent with the two or more secondary agents to create a trust ring, the primary agent and two or more secondary agents configured to operate on a primary guest OS and two or more secondary guest OSs respectively; a topology module configured to implement a latency based topology for the trust ring comprising a network of links between disparate IP addresses, the disparate IP addresses corresponding with the primary agent and two or more secondary agents, and wherein the topology module is further configured such that the primary agent and two or more secondary agents exchange data packets between the latency based topology within the trust ring; a processing engine configured to determine a trust status for the trust ring, the trust status based on the data packets between the latency based topology; and an interface to a communication means allowing communication between the communication module, topology module, processing engine, primary agent, and two or more secondary agents. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification