US 11,868,474 B2
Securing node groups
Nigel Edwards, Bristol (GB); Michael R. Krause, Boulder Creek, CA (US); Melvin Benedict, Magnolia, TX (US); Ludovic Emmanuel Paul Noel Jacquin, Bristol (GB); Luis Luciani, Tomball, TX (US); Thomas Laffey, Roseville, CA (US); Theofrastos Koulouris, Bristol (GB); and Shiva Dasari, Houston, TX (US)
Assigned to Hewlett Packard Enterprise Development LP, Spring, TX (US)
Appl. No. 17/280,507
Filed by Hewlett Packard Enterprise Development LP, Houston, TX (US)
PCT Filed Jan. 8, 2019, PCT No. PCT/US2019/012610
§ 371(c)(1), (2) Date Mar. 26, 2021,
PCT Pub. No. WO2020/145944, PCT Pub. Date Jul. 16, 2020.
Prior Publication US 2022/0043914 A1, Feb. 10, 2022
Int. Cl. G06F 21/00 (2013.01); G06F 21/57 (2013.01); G06F 21/32 (2013.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC G06F 21/57 (2013.01) [G06F 21/32 (2013.01); H04L 9/0816 (2013.01); H04L 9/3226 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for securing a plurality of compute nodes, comprising:
authenticating a hardware architecture of each of a plurality of components of the compute nodes;
authenticating a firmware of each of the plurality of components; and
generating an authentication database comprising a plurality of authentication descriptions that are based on the authenticated hardware architecture and the authenticated firmware, wherein a policy for securing a specified subset of the plurality of compute nodes is implemented by using the authentication database.