METHOD AND APPARATUS FOR CONTROLLING COMPUTING ASSETS WITHIN A ZERO-TRUST ARCHITECTURE

A method and apparatus are disclosed for controlling access of a computing device to a multi-layer network implementing a zero-trust architecture, the multi-layer network including a switch and apparatus for controlling access to a plurality of hierarchical levels of the multi-layer network. The met...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: BOYER, MARK J, INMAN, WILLIAM S
Format: Patent
Sprache:eng ; fre
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator BOYER, MARK J
INMAN, WILLIAM S
description A method and apparatus are disclosed for controlling access of a computing device to a multi-layer network implementing a zero-trust architecture, the multi-layer network including a switch and apparatus for controlling access to a plurality of hierarchical levels of the multi-layer network. The method includes receiving, at the apparatus, an access request message from the computing device, the access request message including one or more identifiers associated with the computing device for requesting access to the multi-layer network. The method further includes determining a hierarchical penetration level among the plurality of hierarchical levels of the multi-layer network to be assigned to the computing device based on the one or more identifiers within the access request message. The method further includes assigning the hierarchical penetration level to the computing device, and granting the computing device access and control privileges to the multi-layer network, based on the assigned hierarchical penetration level.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CA3209585A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CA3209585A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CA3209585A13</originalsourceid><addsrcrecordid>eNqNikEKwjAQAHPxIOof9gMFtRT0uMStCbRJ2GwqeClF4km0UP-PFXyAh2HmMEvVtSTGnwDdTAjIKClC7Rm0d8K-aaw7z92GJN_CGEkiXKwY6wDhSuwL4RQFkLWxQloS01ot7sNjypufVwpqEm2KPL76PI3DLT_zu9dY7rfH6lDhrvxj-QBhSjCp</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>METHOD AND APPARATUS FOR CONTROLLING COMPUTING ASSETS WITHIN A ZERO-TRUST ARCHITECTURE</title><source>esp@cenet</source><creator>BOYER, MARK J ; INMAN, WILLIAM S</creator><creatorcontrib>BOYER, MARK J ; INMAN, WILLIAM S</creatorcontrib><description>A method and apparatus are disclosed for controlling access of a computing device to a multi-layer network implementing a zero-trust architecture, the multi-layer network including a switch and apparatus for controlling access to a plurality of hierarchical levels of the multi-layer network. The method includes receiving, at the apparatus, an access request message from the computing device, the access request message including one or more identifiers associated with the computing device for requesting access to the multi-layer network. The method further includes determining a hierarchical penetration level among the plurality of hierarchical levels of the multi-layer network to be assigned to the computing device based on the one or more identifiers within the access request message. The method further includes assigning the hierarchical penetration level to the computing device, and granting the computing device access and control privileges to the multi-layer network, based on the assigned hierarchical penetration level.</description><language>eng ; fre</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240217&amp;DB=EPODOC&amp;CC=CA&amp;NR=3209585A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240217&amp;DB=EPODOC&amp;CC=CA&amp;NR=3209585A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BOYER, MARK J</creatorcontrib><creatorcontrib>INMAN, WILLIAM S</creatorcontrib><title>METHOD AND APPARATUS FOR CONTROLLING COMPUTING ASSETS WITHIN A ZERO-TRUST ARCHITECTURE</title><description>A method and apparatus are disclosed for controlling access of a computing device to a multi-layer network implementing a zero-trust architecture, the multi-layer network including a switch and apparatus for controlling access to a plurality of hierarchical levels of the multi-layer network. The method includes receiving, at the apparatus, an access request message from the computing device, the access request message including one or more identifiers associated with the computing device for requesting access to the multi-layer network. The method further includes determining a hierarchical penetration level among the plurality of hierarchical levels of the multi-layer network to be assigned to the computing device based on the one or more identifiers within the access request message. The method further includes assigning the hierarchical penetration level to the computing device, and granting the computing device access and control privileges to the multi-layer network, based on the assigned hierarchical penetration level.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNikEKwjAQAHPxIOof9gMFtRT0uMStCbRJ2GwqeClF4km0UP-PFXyAh2HmMEvVtSTGnwDdTAjIKClC7Rm0d8K-aaw7z92GJN_CGEkiXKwY6wDhSuwL4RQFkLWxQloS01ot7sNjypufVwpqEm2KPL76PI3DLT_zu9dY7rfH6lDhrvxj-QBhSjCp</recordid><startdate>20240217</startdate><enddate>20240217</enddate><creator>BOYER, MARK J</creator><creator>INMAN, WILLIAM S</creator><scope>EVB</scope></search><sort><creationdate>20240217</creationdate><title>METHOD AND APPARATUS FOR CONTROLLING COMPUTING ASSETS WITHIN A ZERO-TRUST ARCHITECTURE</title><author>BOYER, MARK J ; INMAN, WILLIAM S</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CA3209585A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>BOYER, MARK J</creatorcontrib><creatorcontrib>INMAN, WILLIAM S</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BOYER, MARK J</au><au>INMAN, WILLIAM S</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>METHOD AND APPARATUS FOR CONTROLLING COMPUTING ASSETS WITHIN A ZERO-TRUST ARCHITECTURE</title><date>2024-02-17</date><risdate>2024</risdate><abstract>A method and apparatus are disclosed for controlling access of a computing device to a multi-layer network implementing a zero-trust architecture, the multi-layer network including a switch and apparatus for controlling access to a plurality of hierarchical levels of the multi-layer network. The method includes receiving, at the apparatus, an access request message from the computing device, the access request message including one or more identifiers associated with the computing device for requesting access to the multi-layer network. The method further includes determining a hierarchical penetration level among the plurality of hierarchical levels of the multi-layer network to be assigned to the computing device based on the one or more identifiers within the access request message. The method further includes assigning the hierarchical penetration level to the computing device, and granting the computing device access and control privileges to the multi-layer network, based on the assigned hierarchical penetration level.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre
recordid cdi_epo_espacenet_CA3209585A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title METHOD AND APPARATUS FOR CONTROLLING COMPUTING ASSETS WITHIN A ZERO-TRUST ARCHITECTURE
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T08%3A15%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BOYER,%20MARK%20J&rft.date=2024-02-17&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECA3209585A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true