DISPLAY OF SERVICE RULE INFORMATION FOR DATA MESSAGES

    公开(公告)号:US20240007369A1

    公开(公告)日:2024-01-04

    申请号:US17852826

    申请日:2022-06-29

    Applicant: VMware, Inc.

    CPC classification number: H04L43/045 H04L43/106 G06F3/0482

    Abstract: Some embodiments provide a method for displaying information about a data message. Through a graphical user interface (GUI) that provides a visualization of paths for a plurality of data messages in a network, the method receives a selection of a particular data message. In response to the selection, the method displays in the GUI (i) a set of characteristics of the selected data message, (ii) a path through a set of services of the network traversed by the selected data message, (iii) information regarding additional data messages sharing at least a subset of the set of characteristics of the selected data message, and (iv) information regarding one or more service rules applied to the data message at one or more of the services.

    EXTERNAL COMMUNICATION WITH PACKAGED VIRTUAL MACHINE APPLICATIONS WITHOUT NETWORKING

    公开(公告)号:US20240004692A1

    公开(公告)日:2024-01-04

    申请号:US18470588

    申请日:2023-09-20

    Applicant: VMware, Inc.

    Abstract: One or more embodiments provide techniques that permit virtual computing instances in isolated environments to communicate information outside the isolated environments without requiring networking. In one embodiment, an encoder which runs in a virtual machine (VM) within an isolated environment, such as one of the VMs of a packaged virtual machine application that does not have external network connectivity, is configured to encode information, such as state information of the packaged virtual machine application, in portion(s) of a network address. The encoder further configures an unconnected network interface of the same VM, or another VM in the isolated environment, with the network address that includes the encoded information. A decoder, which could not otherwise communicate with the virtual computing instance via any network, may then retrieve the network address assigned to the unconnected network interface and decode that network address to obtain the information encoded therein.

    CUSTOM RESOURCE DEFINITION BASED CONFIGURATION MANAGEMENT

    公开(公告)号:US20240004686A1

    公开(公告)日:2024-01-04

    申请号:US17940084

    申请日:2022-09-08

    Applicant: VMWARE, INC.

    CPC classification number: G06F9/45558 G06F9/44505 G06F2009/4557

    Abstract: A method of managing configurations of a software-defined data center (SDDC) includes: retrieving a current configuration of a first management appliance of the SDDC and a current configuration of a second management appliance of the SDDC; calling a first custom resource object of a container orchestration platform to acquire a desired configuration of the first management appliance and calling a second custom resource object of the container orchestration platform to acquire a desired configuration of the second management appliance; determining a difference between the current and desired configurations of the first management appliance and instructing the first management appliance to apply the desired configuration of the first management appliance; and determining a difference between the current and desired configurations of the second management appliance and instructing the second management appliance to apply the desired configuration of the second management appliance.

    ENTERPRISE COMMUNICATION CHANNEL ASSISTANCE
    155.
    发明公开

    公开(公告)号:US20230419126A1

    公开(公告)日:2023-12-28

    申请号:US17891206

    申请日:2022-08-19

    Applicant: VMWARE, INC.

    CPC classification number: G06N5/022 H04L51/02 H04L67/535

    Abstract: Disclosed are various approaches for determining an optimal communication channel for contacting a user. In one such embodiment, application usage data corresponding to user interactions on available communication channels within an enterprise environment is obtained and used to generate a knowledge graph representing an individual user communicating over two or more of the available communication channels with other users. Thus, based on the knowledge graph, at least one optimal communication channel can be provided for contacting the individual user, wherein the at least one optimal communication channel is represented in the knowledge graph.

    DETECTING TAMPERING IN DATA PROCESSING PIPELINES

    公开(公告)号:US20230418935A1

    公开(公告)日:2023-12-28

    申请号:US17850541

    申请日:2022-06-27

    Applicant: VMware, Inc.

    CPC classification number: G06F21/554 G06F2221/034

    Abstract: Techniques for detecting tampering in a data processing pipeline are provided. At a high level, these techniques involve instrumenting each transformer in the data processing pipeline to (1) compute a digest of the input data it actually receives for processing, and (2) generate an immutable log entry that records, among other things, the computed input digest and a digest of the resulting output data. With this approach, if an adversary attempts to tamper with the input data for a transformer, the tampering will be evident due to an “orphaned link scenario” in which the input digest for the log entry generated by that transformer fails to map to the output digest of any other log entry (or to the digest of input data from a known data source).

    ANONYMOUS TOKEN ENHANCEMENTS
    160.
    发明公开

    公开(公告)号:US20230412379A1

    公开(公告)日:2023-12-21

    申请号:US17807756

    申请日:2022-06-20

    Applicant: VMware, Inc.

    Inventor: Avishay YANAI

    CPC classification number: H04L9/3213 H04L9/3271 H04L9/0869

    Abstract: The disclosure provides an approach for anonymous access control. Embodiments include receiving, by a client device Ci of a plurality of client devices, from a server, a first table R comprising a plurality of rows. Each row R(j) of the plurality of rows corresponds to a client device Cj of the plurality of client devices. Each row R(j) comprises a public encryption key ekj corresponding to the client device Cj, a commitment cmj that is based on a token budget tj of the client device Cj and a random value rj, and a ciphertext ctj that is an encryption of the random value rj using the public encryption key ekj. Embodiments include generating, by the client device Ci, based on the table R, a new table R′ comprising a new plurality of rows. Embodiments include sending R and R′ to the server in association with a request.

Patent Agency Ranking