Fast-booting application image
    61.
    发明授权

    公开(公告)号:US10949236B2

    公开(公告)日:2021-03-16

    申请号:US15697191

    申请日:2017-09-06

    Abstract: A method and apparatus for configuring an overlay network are provided. In the method and apparatus, an application source comprising an executable portion is obtained. A computer system instance is caused to execute at least some of the executable portion, and a snapshot of the computer system instance after partial but incomplete execution of the executable portion is obtained such that the snapshot is usable to instantiate another computer system instance to continue execution of the executable portion from a point in execution at which the snapshot was obtained.

    Hypervisor enforcement of cryptographic policy

    公开(公告)号:US10817601B2

    公开(公告)日:2020-10-27

    申请号:US15876020

    申请日:2018-01-19

    Abstract: Techniques for restricting the execution of algorithms contained in applications executing on virtual machines executing within a computer system are described herein. A first sampled set of computer executable instructions is gathered from a virtual machine by a controlling domain and compared against a reference set of computer executable instructions. If the first set is similar to the reference set, and if the execution of the algorithm corresponding to the reference set is restricted by one or more computer system polices, one or more operations limiting the execution of the restricted algorithm are performed, thus ensuring conformance with the computer system policies.

    Directed placement for request instances

    公开(公告)号:US10776141B2

    公开(公告)日:2020-09-15

    申请号:US15610459

    申请日:2017-05-31

    Abstract: Techniques for placing virtual machines at hardware locations are described herein. A first assignment of virtual machines to hardware locations that fails to satisfy a set of placement criteria is detected, a second assignment of virtual machines to hardware locations that assigns a subset of the set of virtual machines to new hardware locations is generated, and it is determined if the second assignment of virtual machines to hardware locations satisfies a subset of the set of placement criteria.

    Log monitoring system
    65.
    发明授权

    公开(公告)号:US10771306B2

    公开(公告)日:2020-09-08

    申请号:US15788381

    申请日:2017-10-19

    Abstract: Disclosed are various embodiments for a log monitoring system to monitor the health of server log files. The log monitoring system may generate at least one log health signal based on an analysis of the server log content generated by at least one host application. Furthermore, the application may generate a system integrity record based on the at least one log health signal and an external signal, wherein the external signal embodies a system health metric of the at least one host application.

    Scanning kernel data structure characteristics

    公开(公告)号:US10706146B2

    公开(公告)日:2020-07-07

    申请号:US15698399

    申请日:2017-09-07

    Abstract: A method and apparatus for detecting kernel data structure tampering are disclosed. In the method and apparatus, a memory region of a computer system is scanned for one or more characteristics of a kernel data structure of an operating system kernel. It is then determined, based at least in part on identifying whether the one or more characteristics are found in the memory region, whether the kernel data structure is stored in the memory region of the computer system for tampering with the kernel data structure.

    Response rate limiting device
    67.
    发明授权

    公开(公告)号:US10469322B2

    公开(公告)日:2019-11-05

    申请号:US15725671

    申请日:2017-10-05

    Abstract: A response rate limiting device is provided that may reduce the volume of network traffic generated as a result of an amplification attack. The rate liming device receives a packet and determines identification information corresponding to the packet. The rate limiting device receives a second packet bound for a network destination. Based at least in part on the size of the first packet and the size of the second packet, the rate limiting device determines a transmission rate for the second packet. The second packet is transmitted to the network destination in accordance with the determined transfer rate.

    Latency-based detection of covert routing

    公开(公告)号:US10129281B2

    公开(公告)日:2018-11-13

    申请号:US15344396

    申请日:2016-11-04

    Abstract: A method and apparatus for detecting covert routing is disclosed. In the method and apparatus, data addressed to a remote computer system are forwarded over a first network path, whereby the data is associated with a computer system of a plurality of computer systems. Further, a plurality of first network performance metrics is obtained. A likelihood of covert routing is determined based at least in part on the plurality of first network performance metrics.

    Signature delegation
    70.
    发明授权

    公开(公告)号:US10129034B2

    公开(公告)日:2018-11-13

    申请号:US15946614

    申请日:2018-04-05

    Abstract: A signature authority generates a master seed value that is used to generate a seed tree of subordinate nodes. Each subordinate node of the seed tree is generated from the value of its parent node using a cryptographic hash or one-way function. The signature authority selects subordinate seed values from the seed tree which are distributed to one or more subordinates, each of which generates a set of one-time-use cryptographic keys from the provided seed. Each subordinate generates a hash tree from its set of one-time-use cryptographic keys, and returns the root of its hash tree to the signature authority. The signature authority integrates the hashes provided by the key generators into a comprehensive hash tree, and the root of the hash tree acts as a public key for the signature authority.

Patent Agency Ranking