SYSTEM AND METHOD FOR PROVIDING FLEXIBLE CLOUD NAMESPACES IN A CLOUD COMPUTING ENVIRONMENT

    公开(公告)号:US20250036443A1

    公开(公告)日:2025-01-30

    申请号:US18378220

    申请日:2023-10-10

    Applicant: VMware, Inc.

    Abstract: System and method for provide a computing infrastructure as a service creates a flexible cloud namespace in a software-defined data center (SDDC) in response to a first instruction from a user and deploys virtual computing instances in the flexible cloud namespace in response to a second instruction from the user. The flexible cloud namespace comprises a logical construct with resources in the SDDC that are supported by underlying SDDC management entities, where the virtual computing instances execute in the flexible cloud namespace of the SDDC using the resources.

    TEMPORARY BREAK GLASS ACCOUNT-BASED DATA CENTER OPERATIONS

    公开(公告)号:US20250030679A1

    公开(公告)日:2025-01-23

    申请号:US18377773

    申请日:2023-10-07

    Applicant: VMWARE, INC.

    Abstract: An example method may include receiving a request to create a temporary break glass account from a user associated with a user account. The request may include a time period for accessing a data center resource. In response to receiving the request, the temporary break glass account may be created. Further, credentials associated with the temporary break glass account may be notified to the user. Furthermore, an operation may be enabled on the data center resource via the temporary break glass account using the credentials. Further, the temporary break glass account may be deleted in response to an expiration of a timer. The timer may be configured based on the time period.

    SYSTEMS AND METHODS FOR NETWORK STATUS VISUALIZATION

    公开(公告)号:US20250030615A1

    公开(公告)日:2025-01-23

    申请号:US18377321

    申请日:2023-10-06

    Applicant: VMWARE, INC.

    Abstract: Example methods and systems for network status visualization are described. In one example, a first computer system may generate and send a first query identifying a first-level object. Based on a first response, the first computer system may generate and display a first UI view that includes (a) a first user interface (UI) element and multiple second UI elements, (b) a first-level status indicator to indicate that the first-level object is associated with a performance issue, and (c) a second-level status indicator to indicate that the performance issue is associated with a particular second-level object. In response to detecting a user's interaction, the first computer system may generate and send a second query identifying the particular second-level object. Based on a second response, the first computer system may generate and display a second UI view to facilitate troubleshooting of the performance issue.

    BLOCKCHAIN-BASED LICENSING AS A SERVICE

    公开(公告)号:US20250028791A1

    公开(公告)日:2025-01-23

    申请号:US18239766

    申请日:2023-08-30

    Applicant: VMware, Inc.

    Abstract: Example methods and systems for blockchain-based licensing as a service are described. In one example, a computer system may receive a first request to obtain a first license associated with a first product from a first client system. In response, the computer system may (a) select a first blockchain from multiple blockchains, and (b) generate and store a first non-fungible token (NFT) on the first blockchain to issue the first license. Further, the computer system may receive a second request to obtain a second license associated with the first product or a second product from a second client system. In response, the computer system may (a) select a second blockchain from multiple blockchains, and (b) generate and store a second NFT on the second blockchain to issue the second license.

    PREDICTIVE PRIORITIZATION AND ADAPTIVE SECURITY OF INFRASTRUCTURE

    公开(公告)号:US20250023905A1

    公开(公告)日:2025-01-16

    申请号:US18371469

    申请日:2023-09-22

    Applicant: VMWARE, INC.

    Abstract: Techniques associated with adaptive infrastructure security are disclosed. Information regarding a plurality of threat events from one or more source systems is received. For each of the plurality of threat events, a probability of a target system being exploited can be computed. A threat event can be selected at a first time from the plurality of threat events associated with a first probability that meets a threshold. Remedial actions performed to address the threat event at a respective source system can be received, and a guardrail to apply to the target system can be determined based on the remedial actions. The guardrail can then be applied to the target system.

    Blockchain based certificate pinning

    公开(公告)号:US12184789B2

    公开(公告)日:2024-12-31

    申请号:US17578198

    申请日:2022-01-18

    Applicant: VMware, Inc.

    Abstract: Disclosed are various embodiments for replacing hard-coded certificate pinning with blockchain based certificate pinning. A signing device can obtain a public key from an endpoint device, produce a signature for the public key, and store the public key on a distributed data store, such as a blockchain. A client device can obtain and validate the public keys from the distributed data store and use the public keys to establish a secure connection between the client device and the endpoint device.

    UPGRADING VIRTUAL MACHINE MANAGEMENT SOFTWARE THAT EXECUTES WITH REDUNDANCY

    公开(公告)号:US20240427618A1

    公开(公告)日:2024-12-26

    申请号:US18232381

    申请日:2023-08-10

    Applicant: VMWARE, INC

    Abstract: A method of upgrading virtual machine (VM) management software from a first version to a second version, wherein the first version of the VM management software executes in a plurality of workloads of a plurality of host computers, the plurality of workloads including a first active workload executing on a first host computer, a first passive workload executing on a second host computer, and a first witness workload executing on a third host computer, and the method comprising: creating and powering on a second active workload that is configured to execute the second version of the VM management software; copying state information from the first active workload to the second active workload and continuing execution of the VM management software in the second active workload; and creating and powering on a second passive workload and creating and powering on a second witness workload.

Patent Agency Ranking