SECURE TRANSMISSION OF CONTENT UPDATES VIA QKD NETWORKS

    公开(公告)号:US20240364543A1

    公开(公告)日:2024-10-31

    申请号:US18307324

    申请日:2023-04-26

    申请人: Red Hat, Inc.

    IPC分类号: H04L9/36

    CPC分类号: H04L9/36 G06N10/70

    摘要: A quantum computing device determines that an error occurred during a transmission of an update for content from a server computing device to a client computing device over a quantum communication channel (QCC) that is using a quantum key distribution (QKD) protocol and a key generated by the QKD protocol. The quantum computing device determines a risk of discovery of a vulnerability in the update for the content based on a severity level of the vulnerability in the update for the content transmitted from the server computing device to the client computing device over the QCC, an amount of the key discovered, and an amount of the update for the content transmitted from the server computing device to the client computing device over the QCC discovered. The quantum computing device performs an action based on the risk of discovery of the vulnerability in the update for the content.

    TECHNIQUES FOR COOPERATIVE HOST/GUEST NETWORKING

    公开(公告)号:US20240354143A1

    公开(公告)日:2024-10-24

    申请号:US18305048

    申请日:2023-04-21

    申请人: Red Hat, Inc.

    发明人: Michael TSIRKIN

    IPC分类号: G06F9/455

    摘要: A network address is allocated for a guest virtual machine (VM) of a computing device by the host operating system. The network address is externally accessible from an external network coupled to the computing device. An indication is received, from the guest VM, that the guest VM is using the network address. The network address as used by the guest VM matches the network address as exposed by the host operating system on the external network. A network transmission, from the external network, is received that is directed to the network address. Responsive to the indication that the guest VM is using the network address, the network transmission is transferred to the guest VM.

    Coordinating execution of computing operations for software applications

    公开(公告)号:US12124877B2

    公开(公告)日:2024-10-22

    申请号:US17402883

    申请日:2021-08-16

    申请人: RED HAT, INC.

    IPC分类号: G06F9/50 H04L67/56

    摘要: A client-side system can include a service proxy that can receive a request to perform a computing operation from a web application that is executable in a web browser of the client-side system. The service proxy can determine if the computing operation is executable by a local execution module that is external to the web browser and local to the client-side system. The local execution module may be different from the web application and may be configured to execute one or more computing operations using computing resources local to the client-side system. If the computing operation is executable by a local execution module, the service proxy can transmit a communication to the local execution module for causing the local execution module to execute the computing operation.

    Labeled security for control flow inside executable program code

    公开(公告)号:US12124562B2

    公开(公告)日:2024-10-22

    申请号:US17671464

    申请日:2022-02-14

    申请人: Red Hat, Inc.

    IPC分类号: G06F21/52 G06F21/51 G06F21/54

    摘要: A method includes configuring one or more permissions for a first page of memory including a first section of a plurality of sections of an executable program code to enable execution of the first section. The method also includes configuring one or more permissions for a second page of the memory including a second section of the executable program code to disable execution of the second section. The method also includes identifying one or more annotations in the executable program code, wherein the one or more annotations indicate one or more allowed transitions and one or more disallowed transitions between the plurality of sections. The method also includes changing, in view of the one or more annotations, the one or more permissions of the second page to enable execution of the second section of the executable program code.

    Deduplication of container image files

    公开(公告)号:US12124414B2

    公开(公告)日:2024-10-22

    申请号:US17533361

    申请日:2021-11-23

    申请人: RED HAT, INC.

    发明人: Giuseppe Scrivano

    摘要: A method includes receiving, at a container registry, a container image including a set of files, determining that at least one file of the set of files is a duplicate of a previously stored container image file at the container registry. The method further includes storing the container image at the container registry with the at least one file of the plurality of files that is a duplicate of the previously stored container image file removed from the container image.

    SIMULATING CONTAINERIZED CLUSTERS
    7.
    发明公开

    公开(公告)号:US20240345937A1

    公开(公告)日:2024-10-17

    申请号:US18756888

    申请日:2024-06-27

    申请人: Red Hat, Inc.

    IPC分类号: G06F11/34 G06F9/50 G06F30/20

    摘要: Systems and methods for simulating containerized clusters. An example method may include determining a first value of an entity property that characterizes a simulated cluster entity in a containerized cluster entity, where the first value of the entity property is determined in view of an entity simulation specification associated with the simulated cluster entity, identifying one or more simulation policies that correspond to the simulated cluster entity, the simulation policies comprising a value generation policy that specifies a modification factor, the entity property, and one or more entity modification criteria. The example method may further include responsive to determining that the one or more entity modification criteria are satisfied, determining a second value of the entity property in view of the first value of the entity property and the modification factor, and generating simulation output comprising the second value of the entity property.

    CRYPTOGRAPHIC KEY MANAGEMENT FOR DISTRIBUTED QUANTUM COMPUTING SYSTEMS

    公开(公告)号:US20240333482A1

    公开(公告)日:2024-10-03

    申请号:US18190296

    申请日:2023-03-27

    申请人: Red Hat, Inc.

    IPC分类号: H04L9/08

    CPC分类号: H04L9/0852 H04L9/088

    摘要: A system comprises a first set of quantum hardware (QH) that includes a first set of qubits, a second set of QH that includes a second set of qubits, and a third set of QH. The first set of qubits encodes a first portion of a cryptographic key (CK). The second set of qubits encodes a second portion of the CK. In response to receiving an access request, the third set of QH receives from the first set of QH, a first transmission that encodes the first portion of the CK and a second transmission, from the second set of QH, that encodes the second portion of the CK. The third set of QH generates a first encoding of the CK that includes the first portion and the second portion of the CK. The system provides a requesting party a third transmission based on the first encoding of the CK.

    ATTESTING ON-THE-FLY ENCRYPTED ROOT DISKS FOR CONFIDENTIAL VIRTUAL MACHINES

    公开(公告)号:US20240330435A1

    公开(公告)日:2024-10-03

    申请号:US18126918

    申请日:2023-03-27

    申请人: Red Hat, Inc.

    IPC分类号: G06F21/53 G06F21/60 G06F21/64

    摘要: Responsive to a request for an encrypted confidential virtual machine (CVM) disk image, an unencrypted CVM disk image, an image signature, and a public key associated with the image signature is obtained. The CVM disk image is encrypted to produce an encrypted CVM disk image. Full disk encryption (FDE) is applied against the encrypted CVM disk image to obtain an FDE header. A concatenation of the image signature, the public key associated with the image signature, and the FDE header is signed to obtain an image encryption service (IES) signature. The IES signature and associated certificate chain are written to the extensible firmware interface system partition (ESP) of the encrypted CVM disk image.

    Software Operator for Deploying and Managing Bare Metal Clusters

    公开(公告)号:US20240320022A1

    公开(公告)日:2024-09-26

    申请号:US18189641

    申请日:2023-03-24

    申请人: Red Hat, Inc.

    IPC分类号: G06F9/455 G06F11/07

    CPC分类号: G06F9/45541 G06F11/0784

    摘要: A system can be provided for deploying bare metal clusters that satisfy custom resource requests. For example, the system can receive from a client device, a custom resource request. The custom resource request can include a set of requirements for a bare metal cluster. The set of requirements can include a number of nodes for the bare metal cluster. The system can determine a set of resources that satisfies the set of requirements. The set of resources can include virtual Internet Protocol (IP) addresses and a set of baseband management controller (BMC) IP addresses. A number of BMC IP addresses in the set of BMC IP addresses can be equal to the number of nodes for the bare metal cluster. Additionally, the system can generate, based on the set of resources, a configuration file for the bare metal cluster and deploy, based on the configuration file, the bare metal cluster.