-
公开(公告)号:US20240406148A1
公开(公告)日:2024-12-05
申请号:US18626354
申请日:2024-04-04
Applicant: MELLANOX TECHNOLOGIES, LTD.
Inventor: Uria Basher , Michael Tahar , Amir Modan , Ben Witulski , Miriam Menes , Miri Shtaif
IPC: H04L9/40
Abstract: In one embodiment, a system includes a networking device including a network interface to receive network packets having headers including datagram transport layer security (DTLS) headers from a remote device over a packet data network, packet processing circuitry to identify first packets of the received packets for DTLS processing in the packet processing circuitry, identify second packets of the received packets to bypass DTLS processing in the packet processing circuitry and to be provided to software to perform DTLS processing on the second packets, and perform DTLS processing on the first packets, and a host interface to provide the DTLS processed first packets to the software, and provide the second packets to the software to perform DTLS processing on the second packets.
-
公开(公告)号:US20240370579A1
公开(公告)日:2024-11-07
申请号:US18142968
申请日:2023-05-03
Applicant: MELLANOX TECHNOLOGIES, LTD.
Inventor: Dotan Finkelshtein , Michael Tahar , Irit Granovsky , Yaniv Strassberg , Guy-Avraham Harel
Abstract: A system, circuit, and method are described, among other things. An illustrative system is disclosed to include a processor and a memory storing data for processing by the processor. The data, when processed, causes the processor to receive an initiator message comprising a request to access one or more registers of a plurality of registers, determine that the initiator message corresponds to an entry of a privilege access table, determine a configured level of access control for the initiator message to access the one or more requested registers based at least in part on a group mapping table, and provide a level of access to the one or more requested registers corresponding to the received initiator message based on the initiator message corresponding to the entry of the privilege access table and based, at least in part, on the determined configured level of access control.
-
公开(公告)号:US11909710B2
公开(公告)日:2024-02-20
申请号:US17859022
申请日:2022-07-07
Applicant: MELLANOX TECHNOLOGIES, LTD.
Inventor: Eitan Zahavi , Guy Rozenberg , Matty Kadosh , Lion Levi , Boris Pismenny , Alex Netes , Miriam Menes , Lior Hodaya Bezen , Michael Tahar
IPC: H04L61/106 , H04L61/5061 , H04L61/5092
CPC classification number: H04L61/106 , H04L61/5061 , H04L61/5092
Abstract: A method for communication includes provisioning each node in a network with a respective set of two or more network addresses. Each node in succession is assigned a respective network address from the respective provisioned set that has not been assigned for use by any preceding node. Upon finding for a given node that all the network addresses in the respective provisioned set were assigned to preceding nodes, the preceding nodes are searched to identify a candidate node having an additional network address in the respective provisioned set, other than the assigned respective network address, that was not yet assigned to any of the nodes. The additional network address is assigned to the candidate node instead of the respective network address that was previously assigned to the candidate node, and the assigning of the network addresses to the nodes in the succession resumes following the candidate node.
-
公开(公告)号:US20230379172A1
公开(公告)日:2023-11-23
申请号:US17745906
申请日:2022-05-17
Applicant: MELLANOX TECHNOLOGIES, LTD.
Inventor: Yuval Itkin , Michael Tahar , Haim Kupershmidt , Ameer Mahagneh
IPC: H04L9/32
CPC classification number: H04L9/3271 , H04L9/3213 , H04L9/3247
Abstract: In one embodiment, a secure challenge-response method includes requesting respective token challenges from devices, receiving the respective token challenges from the devices, providing the respective token challenges to a signing server, receiving from the signing server a signature of the respective token challenges signed with a private key of the signing server, and providing to a given device of the devices a request to perform an operation, the request including the signature and the respective token challenges.
-
公开(公告)号:US12231585B2
公开(公告)日:2025-02-18
申请号:US17745906
申请日:2022-05-17
Applicant: MELLANOX TECHNOLOGIES, LTD.
Inventor: Yuval Itkin , Michael Tahar , Haim Kupershmidt , Ameer Mahagneh
IPC: H04L9/32
Abstract: In one embodiment, a secure challenge-response method includes requesting respective token challenges from devices, receiving the respective token challenges from the devices, providing the respective token challenges to a signing server, receiving from the signing server a signature of the respective token challenges signed with a private key of the signing server, and providing to a given device of the devices a request to perform an operation, the request including the signature and the respective token challenges.
-
公开(公告)号:US20240015130A1
公开(公告)日:2024-01-11
申请号:US17859022
申请日:2022-07-07
Applicant: MELLANOX TECHNOLOGIES, LTD.
Inventor: Eitan Zahavi , Guy Rozenberg , Matty Kadosh , Lion Levi , Boris Pismenny , Alex Netes , Miriam Menes , Lior Hodaya Bezen , Michael Tahar
IPC: H04L61/106 , H04L61/5092 , H04L61/5061
CPC classification number: H04L61/106 , H04L61/5092 , H04L61/5061
Abstract: A method for communication includes provisioning each node in a network with a respective set of two or more network addresses. Each node in succession is assigned a respective network address from the respective provisioned set that has not been assigned for use by any preceding node. Upon finding for a given node that all the network addresses in the respective provisioned set were assigned to preceding nodes, the preceding nodes are searched to identify a candidate node having an additional network address in the respective provisioned set, other than the assigned respective network address, that was not yet assigned to any of the nodes. The additional network address is assigned to the candidate node instead of the respective network address that was previously assigned to the candidate node, and the assigning of the network addresses to the nodes in the succession resumes following the candidate node.
-
-
-
-
-