-
公开(公告)号:US20240364543A1
公开(公告)日:2024-10-31
申请号:US18307324
申请日:2023-04-26
申请人: Red Hat, Inc.
发明人: Leigh Griffin , Stephen Coady
IPC分类号: H04L9/36
摘要: A quantum computing device determines that an error occurred during a transmission of an update for content from a server computing device to a client computing device over a quantum communication channel (QCC) that is using a quantum key distribution (QKD) protocol and a key generated by the QKD protocol. The quantum computing device determines a risk of discovery of a vulnerability in the update for the content based on a severity level of the vulnerability in the update for the content transmitted from the server computing device to the client computing device over the QCC, an amount of the key discovered, and an amount of the update for the content transmitted from the server computing device to the client computing device over the QCC discovered. The quantum computing device performs an action based on the risk of discovery of the vulnerability in the update for the content.
-
公开(公告)号:US20240362080A1
公开(公告)日:2024-10-31
申请号:US18309009
申请日:2023-04-28
申请人: Red Hat, Inc.
发明人: Huamin Chen , Yuval Lifshitz , Douglas Smithy
IPC分类号: G06F9/50 , G06F1/28 , H04L41/0895 , H04L47/78
CPC分类号: G06F9/5077 , G06F1/28 , H04L41/0895 , H04L47/781
摘要: A method includes determining, by a processing device, an intended level of power consumption associated with a network function; allocating, in view of the intended level of power consumption, a network device to the network function; allocating, in view of the intended level of power consumption, a processor to the network function; and designating the processor to handle interrupts from the network function via the network device.
-
公开(公告)号:US20240354143A1
公开(公告)日:2024-10-24
申请号:US18305048
申请日:2023-04-21
申请人: Red Hat, Inc.
发明人: Michael TSIRKIN
IPC分类号: G06F9/455
CPC分类号: G06F9/45558 , G06F2009/45595
摘要: A network address is allocated for a guest virtual machine (VM) of a computing device by the host operating system. The network address is externally accessible from an external network coupled to the computing device. An indication is received, from the guest VM, that the guest VM is using the network address. The network address as used by the guest VM matches the network address as exposed by the host operating system on the external network. A network transmission, from the external network, is received that is directed to the network address. Responsive to the indication that the guest VM is using the network address, the network transmission is transferred to the guest VM.
-
公开(公告)号:US12124877B2
公开(公告)日:2024-10-22
申请号:US17402883
申请日:2021-08-16
申请人: RED HAT, INC.
CPC分类号: G06F9/5027 , H04L67/56 , G06F2209/509
摘要: A client-side system can include a service proxy that can receive a request to perform a computing operation from a web application that is executable in a web browser of the client-side system. The service proxy can determine if the computing operation is executable by a local execution module that is external to the web browser and local to the client-side system. The local execution module may be different from the web application and may be configured to execute one or more computing operations using computing resources local to the client-side system. If the computing operation is executable by a local execution module, the service proxy can transmit a communication to the local execution module for causing the local execution module to execute the computing operation.
-
公开(公告)号:US12124562B2
公开(公告)日:2024-10-22
申请号:US17671464
申请日:2022-02-14
申请人: Red Hat, Inc.
发明人: Peter Jones , Adam Jackson
CPC分类号: G06F21/52 , G06F21/51 , G06F21/54 , G06F2221/033
摘要: A method includes configuring one or more permissions for a first page of memory including a first section of a plurality of sections of an executable program code to enable execution of the first section. The method also includes configuring one or more permissions for a second page of the memory including a second section of the executable program code to disable execution of the second section. The method also includes identifying one or more annotations in the executable program code, wherein the one or more annotations indicate one or more allowed transitions and one or more disallowed transitions between the plurality of sections. The method also includes changing, in view of the one or more annotations, the one or more permissions of the second page to enable execution of the second section of the executable program code.
-
公开(公告)号:US12124414B2
公开(公告)日:2024-10-22
申请号:US17533361
申请日:2021-11-23
申请人: RED HAT, INC.
发明人: Giuseppe Scrivano
IPC分类号: G06F16/00 , G06F16/16 , G06F16/174 , G06F16/178
CPC分类号: G06F16/1752 , G06F16/164 , G06F16/178
摘要: A method includes receiving, at a container registry, a container image including a set of files, determining that at least one file of the set of files is a duplicate of a previously stored container image file at the container registry. The method further includes storing the container image at the container registry with the at least one file of the plurality of files that is a duplicate of the previously stored container image file removed from the container image.
-
公开(公告)号:US20240345937A1
公开(公告)日:2024-10-17
申请号:US18756888
申请日:2024-06-27
申请人: Red Hat, Inc.
发明人: Arik Hadas , Daniel Erez
CPC分类号: G06F11/3457 , G06F9/5077 , G06F30/20 , G06F2201/86 , G06F2209/505
摘要: Systems and methods for simulating containerized clusters. An example method may include determining a first value of an entity property that characterizes a simulated cluster entity in a containerized cluster entity, where the first value of the entity property is determined in view of an entity simulation specification associated with the simulated cluster entity, identifying one or more simulation policies that correspond to the simulated cluster entity, the simulation policies comprising a value generation policy that specifies a modification factor, the entity property, and one or more entity modification criteria. The example method may further include responsive to determining that the one or more entity modification criteria are satisfied, determining a second value of the entity property in view of the first value of the entity property and the modification factor, and generating simulation output comprising the second value of the entity property.
-
公开(公告)号:US20240333482A1
公开(公告)日:2024-10-03
申请号:US18190296
申请日:2023-03-27
申请人: Red Hat, Inc.
发明人: Leigh Griffin , Stephen Coady
IPC分类号: H04L9/08
CPC分类号: H04L9/0852 , H04L9/088
摘要: A system comprises a first set of quantum hardware (QH) that includes a first set of qubits, a second set of QH that includes a second set of qubits, and a third set of QH. The first set of qubits encodes a first portion of a cryptographic key (CK). The second set of qubits encodes a second portion of the CK. In response to receiving an access request, the third set of QH receives from the first set of QH, a first transmission that encodes the first portion of the CK and a second transmission, from the second set of QH, that encodes the second portion of the CK. The third set of QH generates a first encoding of the CK that includes the first portion and the second portion of the CK. The system provides a requesting party a third transmission based on the first encoding of the CK.
-
公开(公告)号:US20240330435A1
公开(公告)日:2024-10-03
申请号:US18126918
申请日:2023-03-27
申请人: Red Hat, Inc.
CPC分类号: G06F21/53 , G06F21/602 , G06F21/64
摘要: Responsive to a request for an encrypted confidential virtual machine (CVM) disk image, an unencrypted CVM disk image, an image signature, and a public key associated with the image signature is obtained. The CVM disk image is encrypted to produce an encrypted CVM disk image. Full disk encryption (FDE) is applied against the encrypted CVM disk image to obtain an FDE header. A concatenation of the image signature, the public key associated with the image signature, and the FDE header is signed to obtain an image encryption service (IES) signature. The IES signature and associated certificate chain are written to the extensible firmware interface system partition (ESP) of the encrypted CVM disk image.
-
公开(公告)号:US20240320022A1
公开(公告)日:2024-09-26
申请号:US18189641
申请日:2023-03-24
申请人: Red Hat, Inc.
发明人: Yuval Kashtan , Michael Gourin
CPC分类号: G06F9/45541 , G06F11/0784
摘要: A system can be provided for deploying bare metal clusters that satisfy custom resource requests. For example, the system can receive from a client device, a custom resource request. The custom resource request can include a set of requirements for a bare metal cluster. The set of requirements can include a number of nodes for the bare metal cluster. The system can determine a set of resources that satisfies the set of requirements. The set of resources can include virtual Internet Protocol (IP) addresses and a set of baseband management controller (BMC) IP addresses. A number of BMC IP addresses in the set of BMC IP addresses can be equal to the number of nodes for the bare metal cluster. Additionally, the system can generate, based on the set of resources, a configuration file for the bare metal cluster and deploy, based on the configuration file, the bare metal cluster.
-
-
-
-
-
-
-
-
-