Trusted Prober Validates Digital Certificates in Cloud Containers
Summary
The USPTO published patent application US20260095442A1 describing a method for validating digital certificates in cloud-based confidential container environments using a trusted prober. The invention enables verification of confidential containers running application workloads in trusted execution environments by matching decrypted digital certificates. This application names five inventors and was filed on September 30, 2024.
What changed
The USPTO published Patent Application US20260095442A1 for a method enabling a trusted prober to validate digital certificates of confidential containers in cloud orchestration environments. The system determines whether a probe result indicates success by comparing a first decrypted digital certificate from a confidential container against a second decrypted certificate stored in a trusted prober. Upon successful validation, the container is authorized to run application workloads in the trusted execution environment of a host node.
Patent applications do not impose compliance obligations on regulated entities. Technology companies developing confidential computing solutions, container orchestration platforms, or cloud security infrastructure may wish to review this filing for prior art awareness or potential licensing considerations. No action is required for compliance purposes as this is a patent publication, not a regulatory requirement.
Source document (simplified)
Trusted Prober in Cloud-Based Container Orchestration Environments
Application US20260095442A1 Kind: A1 Apr 02, 2026
Inventors
Qi Feng Huo, Da Li Liu, Yuan Yuan Wang, Lei Li, Yan Song Liu
Abstract
Validating confidential containers running application workloads in trusted execution environments is provided. It is determined whether a probe result is success indicating that a first decrypted digital certificate in a confidential container matches a second decrypted digital certificate corresponding to the confidential container in a trusted prober. In response to determining that the probe result is success indicating that the first decrypted digital certificate in the confidential container matches the second decrypted digital certificate corresponding to the confidential container in the trusted prober, it is determined that the confidential container running an application workload in a trusted execution environment of a host node is a valid confidential container having a valid digital certificate. The confidential container is allowed to run the application workload in the trusted execution environment of the host node in response to determining that the confidential container is the valid confidential container having the valid digital certificate.
CPC Classifications
H04L 63/0823 H04L 9/321
Filing Date
2024-09-30
Application No.
18901193
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Telecom & Technology alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when ChangeBridge: Patent Apps - Networking (H04L) publishes new changes.