DEVICE SELECTION FOR WORKLOAD EXECUTION
    21.
    发明公开

    公开(公告)号:US20230153174A1

    公开(公告)日:2023-05-18

    申请号:US17528581

    申请日:2021-11-17

    CPC classification number: G06F9/5083 G06F9/5044 G06F9/505

    Abstract: Examples described herein relate to a network interface device. In some examples, the network interface device includes circuitry to provide access to an accelerator device on a second platform to perform a workload in response to communication with a device driver executed by a first platform. In some examples, the first platform and second platform are connected by a network and wherein the accelerator device satisfies a selection criteria and wherein the selection criteria comprises a device type. In some examples, the accelerator device on the second platform is accessible to an application via the device driver.

    APPLICATION-TO-APPLICATION RESOURCE RESERVATION SCHEMES FOR PRECISION NETWORKING

    公开(公告)号:US20220263770A1

    公开(公告)日:2022-08-18

    申请号:US17179249

    申请日:2021-02-18

    Abstract: Methods and apparatus for application-to-application resource reservation schemes for precision networking. Hardware resources, such as interconnects and processing resources, are reserved for forwarding and processing data along flow paths for end-to-end delivery of data between applications running on respective platforms communicating over a network. Operating system and/or hypervisor resources are also reserved. The reservations may be based per application, per virtual machine (VM), or per container, and reservations for multiple applications/VMs/containers are supported. The interconnects include chip-to-chip, socket-to-socket (for multi-socket platforms), and die-to-die interconnects. Reservations for on-chip fabrics are also supported. Under one approach, an orchestrator is used to manage resources reservations by sending resources reservation requests to a platform's operating system or hypervisor, with the operating system/hypervisor configuring the platform hardware resources to effect based on the reserved resources. The method and apparatus may be used to implement flow paths having deterministic latencies and/or meet SLA QoS requirements.

    METHODS AND APPARATUS TO HASH DATA
    23.
    发明申请

    公开(公告)号:US20220103345A1

    公开(公告)日:2022-03-31

    申请号:US17547018

    申请日:2021-12-09

    Abstract: Methods, apparatus, and software for hashing data. The methods and apparatus employ novel improvements to hash algorithms, such as a SHA-2 hash algorithm to reduce computations and increase performance. In one aspect, calculation of SHA-2 message scheduling and SHA compression operations are separated under which an SHA-2 message schedule is applied to multiple rounds of SHA compression operations over multiple chunks of data for the data item being hashed. In another aspect, the SHA-2 message schedule is implemented such that message schedules for multiple message words or data blocks are performed in parallel. The approaches may be employed to reduce hash calculations for various purposes, including generating Filecoin nodes.

    EFFICIENT ENCRYPTION IN VPN SESSIONS

    公开(公告)号:US20210314359A1

    公开(公告)日:2021-10-07

    申请号:US17349247

    申请日:2021-06-16

    Abstract: Methods, apparatus, and software for efficient encryption in virtual private network (VPN) sessions. A VPN link and an auxiliary link (and associated sessions) are established between computing platforms to support end-to-end communication between respective application running on the platforms. The VPN link may employ a conventional VPN protocol such as TLS or IPsec, while the auxiliary link comprises a NULL encryption VPN tunnel. To transfer data, a determination is made to whether the data are encrypted or non-encrypted. Encrypted data are transferred over the auxiliary link to avoid re-encryption of the data. Non-encrypted are transferred over the VPN link. TLS and IPsec VPN agents may be used to assist in setting up the VPN and auxiliary sessions. The techniques avoid double encryption of VPN traffic, while ensuring that various types of traffic transferred between platforms is encrypted.

    ACCELERATOR FOR ENCRYPTING OR DECRYPTING CONFIDENTIAL DATA WITH ADDITIONAL AUTHENTICATION DATA

    公开(公告)号:US20200007329A1

    公开(公告)日:2020-01-02

    申请号:US16022619

    申请日:2018-06-28

    Abstract: Disclosed embodiments relate to encrypting or decrypting confidential data with additional authentication data by an accelerator and a processor. In one example, a processor includes processor circuitry to compute a first hash of a first block of data stored in a memory, store the first hash in the memory, and generate an authentication tag based in part on a second hash. The processor further includes accelerator circuitry to obtain the first hash from the memory, decrypt a second block of data using the first hash, and compute the second hash based in part on the first hash and the second block of data.

    STORAGE DEVICE WITH FINE GRAINED SEARCH CAPABILITY

    公开(公告)号:US20180095720A1

    公开(公告)日:2018-04-05

    申请号:US15282544

    申请日:2016-09-30

    CPC classification number: G06F7/20 G06F16/2255 G06F16/24553

    Abstract: A storage device is described. The storage device includes non volatile memory having data storage resources organized into slots to store chunks of data. The storage device includes memory to store a data pointer table having groups of pointers to the slots. Each of the groups correspond to a respective block that is stored in the non volatile memory. Certain ones of the pointers are to have an associated set of hashes of different segments of the respective chunks that are pointed to by the certain ones of the pointers. The storage device includes a search module to implement a search function within the storage device that hashes a search key and compares the hashed search key to the hashes of the different segments to identify a possible match to the search key.

Patent Agency Ranking