FINGERPRINT TRACKING STRUCTURE FOR STORAGE SYSTEM

    公开(公告)号:US20240143213A1

    公开(公告)日:2024-05-02

    申请号:US18050626

    申请日:2022-10-28

    CPC classification number: G06F3/0641 G06F3/0656 G06F3/0604 G06F3/0679

    Abstract: Example implementations relate to deduplication operations in a storage system. An example includes receiving data units to be stored in a persistent storage of a deduplication storage system; generating a fingerprint for each received data unit; identifying a set of fingerprints to be stored in container indexes, the container indexes including metadata indicating storage locations of data units stored in the persistent storage of the deduplication storage system; storing the identified set of fingerprints in at least one container index; and loading fingerprint entries for the identified set of fingerprints in a root node of a fingerprint tracking structure, where the fingerprint tracking structure is to identify each data unit stored in the persistent storage of the deduplication storage system.

    AGGREGATING SMALL REMOTE MEMORY ACCESS REQUESTS

    公开(公告)号:US20240143198A1

    公开(公告)日:2024-05-02

    申请号:US17976728

    申请日:2022-10-28

    CPC classification number: G06F3/0625 G06F3/0659 G06F3/067

    Abstract: A network interface card (NIC) receives a stream of commands, a respective command comprising memory-operation requests, each request associated with a destination NIC. The NIC buffers asynchronously the requests into queues based on the destination NIC, each queue specific to a corresponding destination NIC. When first queue requests reach a threshold, the NIC aggregates the first queue requests into a first packet and sends the first packet to the destination NIC. The NIC receives a plurality of packets, a second packet comprising memory-operation requests, each request associated with a same destination NIC and a destination core. The NIC buffers asynchronously the requests of the second packet into queues based on the destination core, each queue specific to a corresponding destination core. When second queue requests reach the threshold, the NIC aggregates the second queue requests into a third packet and sends the third packet to the destination core.

    UNAUTHORIZED DEVICE DETECTION IN A COMPUTING ENVIRONMENT

    公开(公告)号:US20240137363A1

    公开(公告)日:2024-04-25

    申请号:US18047785

    申请日:2022-10-18

    CPC classification number: H04L63/0876 H04L63/0209

    Abstract: In some examples, a system receives information from electronic devices comprising network devices and computing devices in a computing environment that are subject to attestations of interfaces of the network devices and the computing devices. For each interface of a given computing device being attested, the system verifies that the interface of the given computing device is connected to an interface of a corresponding network device that is being attested. For each interface of a given network device being attested, the system verifies that the interface of the given network device is connected to an interface of a corresponding computing device that is being attested or an interface of another network device that is being attested. The system detects a presence of an unauthorized electronic device in the computing environment in response to determining that an interface of a computing device being attested or an interface of a network device being attested is not connected to a corresponding interface of an electronic device being attested.

    MITIGATION OF A DENIAL OF SERVICE ATTACK IN A DEVICE PROVISIONING PROTOCOL (DPP) NETWORK

    公开(公告)号:US20240129337A1

    公开(公告)日:2024-04-18

    申请号:US17968310

    申请日:2022-10-18

    CPC classification number: H04L63/1458 H04L63/0442 H04L63/1416 H04L2463/141

    Abstract: Systems and methods are provided for mitigating denial-of-service attacks that can disrupt onboarding internet-of-things (IoT) devices onto a network and ensuring legitimate IoT devices are onboarded. Example implementations include receiving, at an access point (AP) from a device, a chirp signal comprising a hash of data including a first public key of an IoT device. Upon verification of the first public key, the AP generates a context based on a first public key received from the authenticator. The context comprises information for onboarding the IoT device without subsequent communications between the AP, configurator and the authenticator. The AP can use the context to create and transmit authentication authorization requests responsive to chirp signals. In some examples, a chirp table can be created by a configurator for tracking severing APs. The chirp table can be utilized in provisioning APs for future chirp signals as needed.

    GENERATING POST-QUANTUM PRE-SHARED KEYS
    170.
    发明公开

    公开(公告)号:US20240129115A1

    公开(公告)日:2024-04-18

    申请号:US18046169

    申请日:2022-10-13

    CPC classification number: H04L9/0852 H04L9/0866 H04L9/0869

    Abstract: In implementations of the present disclosure, there is provided an approach for generating post-quantum pre-shared keys (PPKs). A first device sends a first request including first data generated by the first device to a second device, and the first device receives a first response including second data generated by the second device from the second device. The first device derives a PPK based on the first data, the second data and a seed PPK, and then sends a second request including an identification of the seed PPK to the second device to enable the second device to determine the derived PPK. Then, the first device receives a second response including a confirmation to the second request from the second device. Implementations of the present disclosure can improve the efficiency of the PPK configuration and release the administrator device from tedious manual work.

Patent Agency Ranking