US 12,294,614 B2
Verifying trust postures of heterogeneous confidential computing clusters
Eric Voit, Bethesda, MD (US); Pradeep Kumar Kathail, Los Altos, CA (US); and Avinash Kalyanaraman, San Jose, CA (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Jan. 25, 2022, as Appl. No. 17/583,284.
Claims priority of provisional application 63/169,528, filed on Apr. 1, 2021.
Prior Publication US 2022/0321605 A1, Oct. 6, 2022
Int. Cl. H04L 9/32 (2006.01); G06F 21/00 (2013.01); H04L 9/40 (2022.01)
CPC H04L 63/20 (2013.01) 11 Claims
OG exemplary drawing
 
1. A method for verifying trust by a service node, the method comprising:
receiving a request for a security information of the service node from a client device, wherein the request includes information identifying a service to receive from the service node;
identifying a related service node to communicate with the service node based on the service, wherein the related service node is associated with the service;
after identifying the related service node, requesting a security information of the related service node;
generating a composite security information from the security information of the service node and the security information of the related service node, including:
identifying affirming claims and detracting claims in the security information of the service node and the security information of the related service node, the affirming claims being in support of providing security, and the detracting claims being opposed to provide security;
including in the composite security information matching affirming claims which appear in both the security information of the service node and the security information of the related service node;
excluding from the composite security information affirming claims which appear in one but not both of the security information of the service node and the security information of the related service node;
including in the composite security information any detracting claims that appear in either of the security information of the service node and the security information of the related service node; and
sending the composite security information to the client device.