SECURE APPLICATION MONITORING

Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an I...

Full description

Saved in:
Bibliographic Details
Main Authors SAMUEL, Arjmand M, BARRY, Damon Luke, OSBORNE, James W, STREET, Chipalo N, ASANGHANWA, Eustace
Format Patent
LanguageEnglish
Published 11.04.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an IoT device to a cloud server. Based on initiating, accreditation information corresponding to at least one of the modular application and the edge device may be received. The accreditation information are generated by a hardware encryption device associated with the edge device. Further, an accreditation status of the modular application may be monitored during execution of the modular application to ascertain whether the modular application and the edge device have been tampered. In case tampering is detected, a remedial action to address the tampering may be performed.
Bibliography:Application Number: US201815903938