The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 29, 2022

Filed:

May. 31, 2019
Applicant:

Varmour Networks, Inc., Mountain View, CA (US);

Inventors:

Marc Woolward, Bude, GB;

Meng Xu, Los Altos, CA (US);

Hong Xiao, San Jose, CA (US);

Keith Stewart, San Francisco, CA (US);

Matthew M. Williamson, Marblehead, MA (US);

Assignee:

vArmour Networks, Inc., Los Altos, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/00 (2013.01); G06F 16/901 (2019.01); H04L 67/10 (2022.01); G06F 9/50 (2006.01); G06F 9/54 (2006.01);
U.S. Cl.
CPC ...
H04L 63/20 (2013.01); G06F 9/5083 (2013.01); G06F 9/547 (2013.01); G06F 16/9024 (2019.01); H04L 67/10 (2013.01);
Abstract

Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: receiving a target, the target specifying workloads of a plurality of workloads to be included in the security policy, the plurality of workloads being associated with the cloud computing environment; identifying nodes and edges in the graph database using the target, the graph database representing the plurality of workloads as nodes and relationships between the plurality of workloads as edges; getting a security intent, the security intent including a high-level security objective in a natural language; obtaining a security template associated with the security intent; and applying the security template to the identified nodes and edges to produce security rules for the security policy, the security rules at least one of allowing and denying communications between the target and other workloads of the plurality of workloads.


Find Patent Forward Citations

Loading…