Applying trusted backup configuration to a node

    公开(公告)号:US12056262B2

    公开(公告)日:2024-08-06

    申请号:US17822480

    申请日:2022-08-26

    CPC classification number: G06F21/73 G06F21/568 G06F21/72

    Abstract: Examples to restore a trusted backup configuration for a node. Example techniques include failover to an alternate firmware of the node, in response to an unverifiable condition of an existing firmware of the node. The node may validate a first configuration file stored in the node. The first configuration file includes a first backup configuration. The node may validate a second configuration file stored in the node based on the validation of the first configuration file. The second configuration file includes a second backup configuration. In response to the validation of at least one of the first configuration file and the second configuration file, the node may select one of the first backup configuration and the second backup configuration, and apply the selected backup configuration to the node.

    MULTICAST TRAFFIC SEGMENTATION IN AN OVERLAY NETWORK

    公开(公告)号:US20240259373A1

    公开(公告)日:2024-08-01

    申请号:US18103341

    申请日:2023-01-30

    Abstract: A system for enforcement of a set of segmentation policies at a gateway switch of a network is provided. Here, the segmentation policies can indicate which other roles are allowed to communicate with a respective role, which can indicate a set of privileges in the network. During operation, the switch can receive a first message associated with a join request for a multicast group from a host. The switch can also receive a second message comprising data from a source of the multicast group. The first and second messages can indicate first and second roles, respectively, of the host and source. Based on the first and second roles and a corresponding segmentation policy, the system can determine whether the host is allowed to receive the data from the source. If not allowed, the system can prevent the second message from being forwarded to the host from the gateway switch.

    COMPACTING TRAFFIC SEPARATION POLICIES IN CAMPUS NETWORKS

    公开(公告)号:US20240259346A1

    公开(公告)日:2024-08-01

    申请号:US18161171

    申请日:2023-01-30

    CPC classification number: H04L63/0254 H04L63/0245 H04L63/104

    Abstract: A system for compacting traffic separation policies in campus networks, the system comprising an access layer switch and a campus border switch. The access layer switch is configured to receive a definition of one or more policies; responsive to receiving a packet, determine whether any of the policies apply to the packet; responsive to determining that none of the policies apply, cause a tag to be inserted into a communication header of the packet and forward the packet; and responsive to determining that one of the policies applies, forward or drop the packet according to the applicable policy and omit the tag. The campus border switch is configured to, responsive to receiving a packet from the access layer switch, determine whether the packet includes the tag, and responsive to determining that the packet includes the tag, apply a traffic separation policy associated with the tag to the packet.

    DETECTING AND DEFENDING AGAINST ADVERSARIAL ATTACKS IN DECENTRALIZED MACHINE LEARNING SYSTEMS

    公开(公告)号:US20240259208A1

    公开(公告)日:2024-08-01

    申请号:US18459891

    申请日:2023-09-01

    CPC classification number: H04L9/3236 G06N20/00 H04L2209/463

    Abstract: A system and a method for detecting and defending against adversarial attacks in decentralized learning models are described. The method comprises obtaining a learning parameter for determining a reference cryptographic hash value and a similarity between the data processing nodes (102). A cryptographic hash value is determined for each data processing node (102) based on the learning parameter. The trust score of each data processing node (102) is updated based on matching of the cryptographic hash value with the reference cryptographic hash value. The learning parameter of each data processing node (102) is merged to obtain a merged learning parameter based on the trust score. The merged learning parameter is provided to the data processing nodes (102) to be used for training the machine learning models.

    MAPPING CONFIGURATION DATA OF MICROSERVICES, APPLICATIONS, AND SERVICES

    公开(公告)号:US20240256252A1

    公开(公告)日:2024-08-01

    申请号:US18161208

    申请日:2023-01-30

    CPC classification number: G06F8/65 G06F8/71

    Abstract: Examples described herein relate to mapping configuration objects of microservices in a cloud cluster. Examples include discovering isolated configuration objects of a microservice deployed in a cloud cluster, where relationships between the isolated configuration objects and a first package of the microservice is not visible. Examples include mapping the isolated configuration objects to a second package based on their metadata. After the mapping, the first and second packages are grouped into a configuration catalog, which includes complete configuration data of the microservice. Some examples include grouping configuration catalogs of multiple microservices into a library, which provides complete configuration data of an application composed of the multiple microservices. Some examples include grouping libraries of multiple applications into a parent library, which includes complete configuration data of a service composed of the multiple applications.

    ELECTRONIC DEVICE HAVING KEYING MECHANISMS FOR A DRIVE CARRIER AND A DRIVE CAGE

    公开(公告)号:US20240256008A1

    公开(公告)日:2024-08-01

    申请号:US18161237

    申请日:2023-01-30

    Inventor: Earl W. Moore

    CPC classification number: G06F1/187 G11B33/126 G11B33/128 H05K7/1489

    Abstract: Electronic device includes a drive carrier, a drive cage, and a backplane circuit board. The drive carrier includes a front structure, a first side structure having a keying protrusion, and a second side structure, which in conjunction receives a media drive such that a rear face of the front structure abuts a front face of the drive and the keying protrusion extends beyond a rear face of the drive. The drive cage includes a drive bay and a keying flange inside the drive bay. When the drive carrier is arranged in the drive bay in a first orientation, the keying protrusion aligns with the keying flange and prevents the drive to couple with the backplane circuit board. When the drive carrier is arranged in the drive bay in a second orientation, the keying protrusion aligns away from the keying flange and allows the drive to couple with the backplane circuit board.

Patent Agency Ranking