Abstract: Techniques for zero-trust cloud deployment are described herein. In accordance with various embodiments, a device including a processor and a non-transitory memory derives a key from deployment metadata of a virtual machine, where the deployment metadata change with each deployment of the virtual machine. The device then encrypts secrets using the key to bind the key to the virtual machine. The device further deploys the virtual machine in a cloud using the deployment metadata, including loading the encrypted secrets to the deployed virtual machine in the cloud.
Description:PLEASE SEE ATTACHED , Claims:PLEASE SEE ATTACHED
| # | Name | Date |
|---|---|---|
| 1 | 202344060935-STATEMENT OF UNDERTAKING (FORM 3) [11-09-2023(online)].pdf | 2023-09-11 |
| 2 | 202344060935-POWER OF AUTHORITY [11-09-2023(online)].pdf | 2023-09-11 |
| 3 | 202344060935-FORM 1 [11-09-2023(online)].pdf | 2023-09-11 |
| 4 | 202344060935-DRAWINGS [11-09-2023(online)].pdf | 2023-09-11 |
| 5 | 202344060935-DECLARATION OF INVENTORSHIP (FORM 5) [11-09-2023(online)].pdf | 2023-09-11 |
| 6 | 202344060935-COMPLETE SPECIFICATION [11-09-2023(online)].pdf | 2023-09-11 |
| 7 | 202344060935-Correspondence-Letter [25-09-2023(online)].pdf | 2023-09-25 |
| 8 | 202344060935-FORM 3 [20-11-2023(online)].pdf | 2023-11-20 |
| 9 | 202344060935-Proof of Right [13-02-2024(online)].pdf | 2024-02-13 |
| 10 | 202344060935-FORM 3 [03-04-2024(online)].pdf | 2024-04-03 |