Security system for cloud computing
First Claim
1. A security system for cloud computing comprising:
- a computing resource available for remote access by a user over a network;
an authentication permitting use of said computing resource;
hardware connected to the network for accessing said computing resource, wherein the user does not have administrative rights and/or physical security control over said hardware;
an external device in communication with said hardware; and
software stored on said external device analyzing security of said hardware by scanning said hardware and preventing transmission of said authentication to said computing resource unless said software confirms security of said hardware to a predetermined trust level;
whereby the risk of transmitting said authentication to the network from insecure hardware is reduced;
wherein the computing resource sends a request for the authentication before the software analyzes the security of the hardware.
1 Assignment
0 Petitions
Accused Products
Abstract
Security system for cloud computing that will improve the security of users'"'"' authentications to cloud data and resources. User authentication to cloud resources requires analyzing confidence in the hardware used to transmit the authentication for access to the cloud data and/or resource. User authentication can be transmitted after the user confirms administrative rights and/or physical security control over the hardware used to transmit the authentication for access to the cloud data and/or resource. The hardware used to access the cloud data and/or resource can be analyzed for malicious code before the user authentication is transmitted. The authentication can be provided on a hardware token, and the system can execute on the hardware token to analyze hardware confidence and thereafter transmit the user authentication.
15 Citations
29 Claims
-
1. A security system for cloud computing comprising:
-
a computing resource available for remote access by a user over a network; an authentication permitting use of said computing resource; hardware connected to the network for accessing said computing resource, wherein the user does not have administrative rights and/or physical security control over said hardware; an external device in communication with said hardware; and software stored on said external device analyzing security of said hardware by scanning said hardware and preventing transmission of said authentication to said computing resource unless said software confirms security of said hardware to a predetermined trust level; whereby the risk of transmitting said authentication to the network from insecure hardware is reduced; wherein the computing resource sends a request for the authentication before the software analyzes the security of the hardware. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for cloud computing security comprising the steps of:
-
providing a computing resource available for remote access over a network, the computing resource requiring an authentication for use; providing hardware enabling a user to access the computing resource, wherein the user does not have administrative rights and/or physical security control over said hardware; providing an external device in communication with said hardware; and providing software stored on said external device analyzing the security of the hardware by scanning said hardware and preventing the authentication from being transmitted to the computing resource unless the software confirms security of the hardware to a predetermined trust level; whereby the risk of transmitting said authentication to the network from insecure hardware is reduced; wherein the computing resource sends a request for the authentication before the software analyzes the security of the hardware. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
Specification