-
公开(公告)号:US20210153019A1
公开(公告)日:2021-05-20
申请号:US17076452
申请日:2020-10-21
Applicant: Intel Corporation
Inventor: Alexander Bachmutsky , Dario Sabella , Francesc Guim Bernat , John J. Browne , Kapil Sood , Kshitij Arun Doshi , Mats Gustav Agerstam , Ned M. Smith , Rajesh Poornachandran , Tarun Viswanathan
IPC: H04W12/08 , H04W76/10 , H04W28/02 , G06F9/455 , H04W4/46 , H04L29/08 , H04W12/42 , H04W12/60 , H04W12/06
Abstract: A service coordinating entity device includes communications circuitry to communicate with a first access network, processing circuitry, and a memory device. The processing circuitry is to perform operations to, in response to a request for establishing a connection with a user equipment (UE) in a second access network, retrieve a first Trusted Level Agreement (TLA) including trust attributes associated with the first access network. One or more exchanges of the trust attributes of the first TLA and trust attributes of a second TLA associated with the second access network are performed using a computing service executing on the service coordinating entity. A common TLA with trust attributes associated with communications between the first and second access networks is generated based on the exchanges. Data traffic is routed from the first access network to the UE in the second access network based on the trust attributes of the common TLA.
-
公开(公告)号:US20210144517A1
公开(公告)日:2021-05-13
申请号:US17119785
申请日:2020-12-11
Applicant: Intel Corporation
Inventor: Francesc Guim Bernat , Kshitij Arun Doshi , Kapil Sood , Tarun Viswanathan
Abstract: Various aspects of methods, systems, and use cases for multi-entity (e.g., multi-tenant) edge computing deployments are disclosed. Among other examples, various configurations and features enable the management of resources (e.g., controlling and orchestrating hardware, acceleration, network, processing resource usage), security (e.g., secure execution and communication, isolation, conflicts), and service management (e.g., orchestration, connectivity, workload coordination), in edge computing deployments, such as by a plurality of edge nodes of an edge computing environment configured for executing workloads from among multiple tenants.
-
43.
公开(公告)号:US10860374B2
公开(公告)日:2020-12-08
申请号:US14866869
申请日:2015-09-26
Applicant: Intel Corporation
Inventor: James Robert Hearn , Patrick Connor , Kapil Sood , Scott P. Dubai , Andrew J. Herdrich
IPC: G06F3/00 , G06F9/50 , G06F9/4401 , G06F9/48 , G06F13/362
Abstract: In one embodiment, a system comprises platform logic comprising a plurality of processor cores and resource allocation logic. The resource allocation logic may receive a processing request and direct the processing request to a processor core of the plurality of processor cores, wherein the processor core is selected based at least in part on telemetry data associated with the platform logic, the telemetry data indicating a topology of at least a portion of the platform logic.
-
公开(公告)号:US10528721B2
公开(公告)日:2020-01-07
申请号:US15298416
申请日:2016-10-20
Applicant: INTEL CORPORATION
Inventor: Kapil Sood , Somnath Chakrabarti , Wei Shen , Carlos V. Rozas , Mona Vij , Vincent R. Scarlata
IPC: G06F21/53 , G06F9/4401 , G06F9/455 , G06F21/79 , G06F12/1036 , G06F12/109 , G06F12/14 , G06F21/57 , G06F8/61 , H04L12/24
Abstract: Methods and apparatus for implemented trusted packet processing for multi-domain separatization and security. Secure enclaves are created in system memory of a compute platform configured to support a virtualized execution environment including a plurality of virtual machines (VMs) or containers, each secure enclave occupying a respective protected portion of the system memory, wherein software code external from a secure enclave cannot access code or data within a secure enclave, and software code in a secure enclave can access code and data both within the secure enclave and external to the secure enclave. Software code for implementing packet processing operations is installed in the secure enclaves. The software in the secure enclaves is then executed to perform the packet processing operations. Various configurations of secure enclaves and software code may be implemented, including configurations supporting service chains both within a VM or contain or across multiple VMs or containers, as well a parallel packet processing operations.
-
公开(公告)号:US20190229897A1
公开(公告)日:2019-07-25
申请号:US16368982
申请日:2019-03-29
Applicant: Intel Corporation
Inventor: Timothy Verrall , Thomas Willhalm , Francesc Guim Bernat , Karthik Kumar , Ned M. Smith , Rajesh Poornachandran , Kapil Sood , Tarun Viswanathan , John J. Browne , Patrick Kutch
IPC: H04L9/08
Abstract: Technologies for accelerated key caching in an edge hierarchy include multiple edge appliance devices organized in tiers. An edge appliance device receives a request for a key, such as a private key. The edge appliance device determines whether the key is included in a local key cache and, if not, requests the key from an edge appliance device included in an inner tier of the edge hierarchy. The edge appliance device may request the key from an edge appliance device included in a peer tier of the edge hierarchy. The edge appliance device may activate per-tenant accelerated logic to identify one or more keys in the key cache for eviction. The edge appliance device may activate per-tenant accelerated logic to identify one or more keys for pre-fetching. Those functions of the edge appliance device may be performed by an accelerator such as an FPGA. Other embodiments are described and claimed.
-
公开(公告)号:US20190042783A1
公开(公告)日:2019-02-07
申请号:US16143724
申请日:2018-09-27
Applicant: Intel Corporation
Inventor: Francesc Guim Bernat , Mark Schmisseur , Kshitij Doshi , Kapil Sood , Tarun Viswanathan
Abstract: An embodiment of a semiconductor apparatus may include technology to receive data with a unique identifier, and bypass encryption logic of a media controller based on the unique identifier. Other embodiments are disclosed and claimed.
-
47.
公开(公告)号:US20180131557A1
公开(公告)日:2018-05-10
申请号:US15574140
申请日:2015-12-21
Applicant: Intel Corporation
Inventor: Joey Chou , Stephen Gooch , Kapil Sood , Brian J. Skerry
Abstract: Apparatus, systems, and methods create, modify, and delete managed objects utilized by VNF lifecycle management automatically are disclosed and claimed. Other examples are also disclosed and claimed.
-
公开(公告)号:US09942631B2
公开(公告)日:2018-04-10
申请号:US14866567
申请日:2015-09-25
Applicant: Intel Corporation
Inventor: Andrew J Herdrich , Patrick L. Connor , Dinesh Kumar , Alexander W Min , Daniel J. Dahle , Kapil Sood , Jeffrey B Shaw , Edwin Verplanke , Scott P. Dubal , James Robert Hearn
CPC classification number: H04Q9/02 , H04L41/5009 , H04L41/5019 , H04L43/08 , H04L43/10
Abstract: Devices and techniques for out-of-band platform tuning and configuration are described herein. A device can include a telemetry interface to a telemetry collection system and a network interface to network adapter hardware. The device can receive platform telemetry metrics from the telemetry collection system, and network adapter silicon hardware statistics over the network interface, to gather collected statistics. The device can apply a heuristic algorithm using the collected statistics to determine processing core workloads generated by operation of a plurality of software systems communicatively coupled to the device. The device can provide a reconfiguration message to instruct at least one software system to switch operations to a different processing core, responsive to detecting an overload state on at least one processing core, based on the processing core workloads. Other embodiments are also described.
-
公开(公告)号:US20170250892A1
公开(公告)日:2017-08-31
申请号:US15056570
申请日:2016-02-29
Applicant: Intel Corporation
Inventor: Trevor Cooper , Kapil Sood , Scott P. Dubal , Michael Hingston McLaughlin Bursell , Jesse C. Brandeburg , Stephen T. Palermo
CPC classification number: G06F21/44 , G06F21/552 , H04L41/5009 , H04L41/5019
Abstract: Technologies for monitoring service level agreement (SLA) performance in an end-to-end SLA monitoring architecture include a network functions virtualization (NFV) SLA controller configured to manage SLA agents initialized in various network processing components of the end-to-end SLA monitoring architecture. To do so, the NFV SLA controller is configured to provide instruction to the SLA agents indicating which types of telemetry data to monitor and receive the requested telemetry data, as securely collected and securely packaged by the SLA agents. The NFV SLA controller is further configured to securely analyze the received telemetry data to determine one or more performance metrics and compare performance benchmarks against the performance metrics to generate an SLA report that includes the results of the comparison. Other embodiments are described and claimed.
-
公开(公告)号:US20170142163A1
公开(公告)日:2017-05-18
申请号:US15420858
申请日:2017-01-31
Applicant: Intel Corporation
Inventor: Kapil Sood , Valerie J. Young , Muthaiah Venkatachalam , Manuel Nedbal
CPC classification number: H04L63/205 , G06F21/552 , G06F21/577 , G06F2221/2101 , H04L47/25 , H04L63/1408 , H04L63/1425 , H04L63/20 , H04L67/10 , H04Q9/00
Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.
-
-
-
-
-
-
-
-
-