-
公开(公告)号:US11463265B2
公开(公告)日:2022-10-04
申请号:US16839255
申请日:2020-04-03
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Sharath Karkada Srinivasa , Bindu Loganathan , Naveena Kedlaya , Rekha G , Varsha Anandani
Abstract: A system to facilitate data center security is described. The system includes a processor and a machine readable medium storing instructions that, when executed, cause the processor to receive a plurality of resources that are to be provided to process a workload, receive one or more characteristics associated with each of the plurality of resources, generate a resource signature for each of the plurality of resources using the one or more characteristics associated with each resource and generate an aggregated signature using the resource signatures generated for each of the plurality of resources.
-
公开(公告)号:US20210243912A1
公开(公告)日:2021-08-05
申请号:US16779495
申请日:2020-01-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Naveena Kedlaya , Bindu Loganathan , Sharath Karkada Srinivasa , Rekha G , Varsha Anandani
Abstract: Example implementations relate to method and controller for secure management of a rack. The method includes generating a first unique identifier corresponding to a rack profile of the rack hosting rack devices including physical devices and logical devices, in accordance with a rack topology, wherein the rack profile is based on configuration of the rack devices and the rack topology. Further, the method includes receiving information corresponding to the rack profile of the rack from peripheral devices disposed in the rack, wherein the information is based on monitored condition of the rack devices and the rack topology. The method further includes generating a second unique identifier based on the information, and determining variation in the rack profile based on comparison of the first and second unique identifiers. Further, the method includes generating an alert signal in the rack, in response to determination of the variation in the rack profile.
-
公开(公告)号:US20230359514A1
公开(公告)日:2023-11-09
申请号:US18353322
申请日:2023-07-17
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Naveena Kedlaya , Sharath Karkada Srinivasa , Bindu Loganathan
CPC classification number: G06F9/542 , G06F11/006 , G06F2201/86
Abstract: Techniques for performing operation-based event suppression are described. In an example, a determination may be performed as to whether an event is to be suppressed if the event is received in response to performance of an operation. The determination may be performed based on at least one of number of actions triggered by the event, frequency of occurrence of the event in an event stream in response to performance of the operation, and frequency of occurrence of the event in the event stream without performance of the first operation.
-
公开(公告)号:US20200310890A1
公开(公告)日:2020-10-01
申请号:US16370839
申请日:2019-03-29
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Naveena Kedlaya , Sharath Karkada Srinivasa , Bindu Loganathan
Abstract: Techniques for performing operation-based event suppression are described. In an example, a determination may be performed as to whether an event is to be suppressed if the event is received in response to performance of an operation. The determination may be performed based on at least one of number of actions triggered by the event, frequency of occurrence of the event in an event stream in response to performance of the operation, and frequency of occurrence of the event in the event stream without performance of the first operation.
-
公开(公告)号:US11800676B2
公开(公告)日:2023-10-24
申请号:US16779495
申请日:2020-01-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Naveena Kedlaya , Bindu Loganathan , Sharath Karkada Srinivasa , Rekha G , Varsha Anandani
CPC classification number: H05K7/1498 , G06F9/542 , G08B25/00
Abstract: Example implementations relate to method and controller for secure management of a rack. The method includes generating a first unique identifier corresponding to a rack profile of the rack hosting rack devices including physical devices and logical devices, in accordance with a rack topology, wherein the rack profile is based on configuration of the rack devices and the rack topology. Further, the method includes receiving information corresponding to the rack profile of the rack from peripheral devices disposed in the rack, wherein the information is based on monitored condition of the rack devices and the rack topology. The method further includes generating a second unique identifier based on the information, and determining variation in the rack profile based on comparison of the first and second unique identifiers. Further, the method includes generating an alert signal in the rack, in response to determination of the variation in the rack profile.
-
公开(公告)号:US11734086B2
公开(公告)日:2023-08-22
申请号:US16370839
申请日:2019-03-29
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Naveena Kedlaya , Sharath Karkada Srinivasa , Bindu Loganathan
CPC classification number: G06F9/542 , G06F11/006 , G06F2201/86
Abstract: Techniques for performing operation-based event suppression are described. In an example, a determination may be performed as to whether an event is to be suppressed if the event is received in response to performance of an operation. The determination may be performed based on at least one of number of actions triggered by the event, frequency of occurrence of the event in an event stream in response to performance of the operation, and frequency of occurrence of the event in the event stream without performance of the first operation.
-
公开(公告)号:US20210314165A1
公开(公告)日:2021-10-07
申请号:US16839255
申请日:2020-04-03
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Sharath Karkada Srinivasa , Bindu Loganathan , Naveena Kedlaya , Rekha G , Varsha Anandani
Abstract: A system to facilitate data center security is described. The system includes a processor and a machine readable medium storing instructions that, when executed, cause the processor to receive a plurality of resources that are to be provided to process a workload, receive one or more characteristics associated with each of the plurality of resources, generate a resource signature for each of the plurality of resources using the one or more characteristics associated with each resource and generate an aggregated signature using the resource signatures generated for each of the plurality of resources.
-
-
-
-
-
-