SECURE COMPLIANCE PROTOCOLS
First Claim
Patent Images
1. A secure compliance protocol system comprising:
- a virtual computing instance (VCI) deployed on a hypervisor and provisioned with a plurality of hardware computing resources, the VCI comprising;
a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes; and
a plurality of agents to generate a plurality of compliance proofs; and
the VCI to;
communicate with a server corresponding to a node of the plurality of nodes; and
receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device.
1 Assignment
0 Petitions
Accused Products
Abstract
In some examples, a secure compliance protocol may include a virtual computing instance (VCI) deployed on a hypervisor and may be provisioned with hardware computing resources. In some examples the VCI may also include a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes, and a plurality of agents to generate a plurality of compliance proofs; the VCI may communicate with a server corresponding to a node of the plurality of nodes; and receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device.
-
Citations
20 Claims
-
1. A secure compliance protocol system comprising:
a virtual computing instance (VCI) deployed on a hypervisor and provisioned with a plurality of hardware computing resources, the VCI comprising; a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes; and a plurality of agents to generate a plurality of compliance proofs; and the VCI to; communicate with a server corresponding to a node of the plurality of nodes; and receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 14, 15)
-
11. A method for secure compliance protocols, comprising:
-
deploying, on a hypervisor, a virtual computing instance (VCI) provisioned with a plurality of hardware computing resources; deploying, on the hypervisor, a cryptoprocessor to provide cryptoprocessing to a plurality of agents and securely communicate with a plurality of servers; executing, by the plurality of agents, instructions to generate a plurality of compliance proofs; and authenticating a particular compliance proof of the plurality of compliance proofs at a particular time, wherein a time stamp of the particular time is generated by a particular server of the plurality of servers corresponding to a first node. - View Dependent Claims (12, 13)
-
-
16. A system comprising:
-
a memory storing instructions corresponding to a plurality of agents; a processor to execute the instructions stored by the memory, the instructions to authenticate a plurality of compliance proofs; a cryptoprocessor to; provide cryptoprocessing to securely communicate with a plurality of nodes; securely communicate with a Mobile Edge Computing (MEC) server corresponding to each node of the plurality of nodes; transmit at least one compliance proof based on a metric of a connected device to a first MEC server corresponding to a first node of the plurality of nodes, and transmit the compliance proof based on the metric of the connected device to a second MEC server corresponding to a second node of the plurality of nodes, wherein the first node and the second node correspond to a respective first and second geographical position. - View Dependent Claims (17, 18, 19, 20)
-
Specification