-
公开(公告)号:US20230010406A1
公开(公告)日:2023-01-12
申请号:US17711933
申请日:2022-04-01
IPC分类号: H04L9/40
摘要: The subject matter described herein provides technical solutions for technical problems facing computing network security. Technical solutions described herein include adaptive sniffing of networking traffic, such as using a brokered network traffic sniffing framework. A brokered sniffing framework may be used to provide dynamic adjustment of network access points and network traffic sampling queries, such as by providing dynamic adjustment in response to changes to the network topology or network traffic. The brokered sniffing framework may provide improved statistical sampling of network traffic using improved network traffic telemetry, such as by modifying a statistical profile of network traffic contents that are collected. The network traffic telemetry may be used to identify various changes in network traffic, such as by identifying statistically significant changes in latencies, bandwidths, or other data center performance metrics.
-
公开(公告)号:US20220114251A1
公开(公告)日:2022-04-14
申请号:US17561134
申请日:2021-12-23
申请人: Francesc Guim Bernat , Kshitij Arun Doshi , Adrian Hoban , Thijs Metsch , Dario Nicolas Oliver , Marcos E. Carranza , Mats Gustav Agerstam , Bin Li , Patrick Koeberl , Susanne M. Balle , John J. Browne , Cesar Martinez-Spessot , Ned M. Smith
发明人: Francesc Guim Bernat , Kshitij Arun Doshi , Adrian Hoban , Thijs Metsch , Dario Nicolas Oliver , Marcos E. Carranza , Mats Gustav Agerstam , Bin Li , Patrick Koeberl , Susanne M. Balle , John J. Browne , Cesar Martinez-Spessot , Ned M. Smith
IPC分类号: G06F21/51 , G06F21/57 , H04L43/0823 , H04L41/5009
摘要: Various systems and methods for implementing reputation management and intent-based security mechanisms are described herein. A system for implementing intent-driven security mechanisms, configured to: determine, based on a risk tolerance intent related to execution of an application on a compute node, whether execution of a software-implemented operator requires a trust evaluation; and in response to determining that the software-implemented operator requires the trust evaluation: obtain a reputation score of the software-implemented operator; determine a minimum reputation score from the risk tolerance intent; compare the reputation score of the software-implemented operator to the minimum reputation score; and reject or permit execution of the software-implemented operator based on the comparison
-
公开(公告)号:US20220113914A1
公开(公告)日:2022-04-14
申请号:US17560945
申请日:2021-12-23
IPC分类号: G06F3/06 , G06F12/02 , G06F12/0888
摘要: Systems and techniques for storage-class memory device including a network interface are described herein. A write for a network communication is received by the host interface of the memory device. Here, the network communication includes a header. The header is written to a non-volatile storage array managed by a memory controller. A network command is detected by the memory device. Here, the network command includes a pointer to the header in the non-volatile storage array. The header is retrieved from the non-volatile storage array and a packet based on the header is transmitted via a network interface of the memory controller.
-
公开(公告)号:US20220113790A1
公开(公告)日:2022-04-14
申请号:US17561301
申请日:2021-12-23
申请人: Kshitij Arun Doshi , John J. Browne , Christopher MacNamara , Francesc Guim Bernat , Adrian Hoban , Thijs Metsch
发明人: Kshitij Arun Doshi , John J. Browne , Christopher MacNamara , Francesc Guim Bernat , Adrian Hoban , Thijs Metsch
IPC分类号: G06F1/3296 , G06F1/3228 , H04L47/70
摘要: Various systems and methods for implementing intent-driven power management are described herein. A system includes: a power monitoring unit to collect real-time telemetry of a processor on a compute node; and a power level controller to: receive a power intent for execution of an application on the compute node; configure a power level of the processor of the compute node based on the power intent, the processor to execute the application; set an initial execution priority of the application on the compute node based on the power intent; and modify the initial execution priority based on the power intent and the real-time telemetry of the compute node.
-
公开(公告)号:US20210152543A1
公开(公告)日:2021-05-20
申请号:US17127852
申请日:2020-12-18
摘要: Systems and techniques for automatic escalation of trust credentials are described herein. Requestor data may be received that describes workloads of a requestor. A set of trust credentials may be determined by using an escalation prediction model to evaluate the requestor data. The multi-access token may be assembled from the set of trust credentials. The multi-access token may be transmitted to an information provider to fulfill a request of a requestor.
-
公开(公告)号:US20210006972A1
公开(公告)日:2021-01-07
申请号:US17025519
申请日:2020-09-18
摘要: Methods, systems, and use cases for geofence-based edge service control and authentication are discussed, including an orchestration system with memory and at least one processing circuitry coupled to the memory. The processing circuitry is configured to perform operations to obtain, from a plurality of connectivity nodes providing edge services, physical location information, and resource availability information associated with each of the plurality of connectivity nodes. An edge-to-edge location graph (ELG) is generated based on the physical location information and the resource availability information, the ELG indicating a subset of the plurality of connectivity nodes that are available for executing a plurality of services associated with an edge workload. The connectivity nodes are provisioned with the ELG and a workflow execution plan to execute the plurality of services, the workflow execution plan including metadata with a geofence policy. The geofence policy specifies geofence restrictions associated with each of the plurality of services.
-
公开(公告)号:US20200285523A1
公开(公告)日:2020-09-10
申请号:US16878861
申请日:2020-05-20
申请人: Francesc Guim Bernat , Kshitij Arun Doshi , Bassam N. Coury , Suraj Prabhakran , Timothy Verrall
发明人: Francesc Guim Bernat , Kshitij Arun Doshi , Bassam N. Coury , Suraj Prabhakran , Timothy Verrall
摘要: Systems and methods may be used to determine where to run a service based on workload-based conditions or system-level conditions. An example method may include determining whether power available to a resource of a compute device satisfies a target power, for example to satisfy a target performance for a workload. When the power available is insufficient, an additional resource may be provided, for example on a remote device from the compute device. The additional resource may be used as a replacement for the resource of the compute device or to augment the resource of the compute device.
-
公开(公告)号:US20200084202A1
公开(公告)日:2020-03-12
申请号:US16683410
申请日:2019-11-14
申请人: Ned M. Smith , John J. Browne , Kapil Sood , Francesc Guim Bernat , Kshitij Arun Doshi , Rajesh Poornachandran , Tarun Viswanathan , Manish Dave
发明人: Ned M. Smith , John J. Browne , Kapil Sood , Francesc Guim Bernat , Kshitij Arun Doshi , Rajesh Poornachandran , Tarun Viswanathan , Manish Dave
摘要: Various approaches for implementing attestation using an attestation token are described. In an edge computing system deployment, an edge computing device includes an attestable feature (e.g., resource, service, entity, property, etc.) which is accessible from use of an attestation token, by the operations of: obtaining a first instance of a token that provides proof of attestation for an accessible feature of the edge computing device, with the token including data to indicate trust level designations for the feature as attested by an attestation provider; receiving, from a prospective user of the feature, a request to use the feature and a second instance of the token, with the second instance of the token originating from the attestation provider; and providing access to the feature based on a verification of the instances of the token, by using the verification to confirm attestation of the trust level designations for the feature.
-
公开(公告)号:US20230319141A1
公开(公告)日:2023-10-05
申请号:US18205664
申请日:2023-06-05
CPC分类号: H04L67/12 , H04L12/1881 , H04L12/185
摘要: Various systems and methods for providing consensus-based named function execution are described herein. A system is configured to access an interest packet received from a user device, the interest packet including a function name of a function and a data payload; broadcast the interest packet to a plurality of compute nodes, wherein the plurality of compute nodes are configured to execute a respective instance of the function; receive a plurality of responses from the plurality of compute nodes, the plurality of responses including respective results of the execution of the respective instances of the function; analyze the plurality of responses using a consensus protocol to identify a consensus result; and transmit the consensus result to the user device.
-
公开(公告)号:US20230133020A1
公开(公告)日:2023-05-04
申请号:US18090653
申请日:2022-12-29
摘要: Various approaches for deploying and controlling distributed accelerated compute operations with the use of infrastructure processing units (IPUs) and similar networked processing units are disclosed. A system for orchestrating acceleration functions in a network compute mesh is configured to access a flowgraph, the flowgraph including data producer-consumer relationships between a plurality of tasks in a workload; identify available artifacts and resources to execute the artifacts to complete each of the plurality of tasks, wherein an artifact is an instance of a function to perform a task of the plurality of tasks; determine a configuration assigning artifacts and resources to each of the plurality of tasks in the flowgraph; and schedule, based on the configuration, the plurality of tasks to execute using the assigned artifacts and resources.
-
-
-
-
-
-
-
-
-