Partitioning of container workload based on a temporal relationship

    公开(公告)号:US10601908B1

    公开(公告)日:2020-03-24

    申请号:US16152291

    申请日:2018-10-04

    Abstract: For each node in a plurality of nodes corresponding to a particular computer network element, the performance metric data regarding the node based on a first time interval is received. The plurality of nodes is organized in a tree structure which comprises a plurality of spine nodes, a plurality of leaf nodes, a plurality of host nodes, and a plurality of container nodes. The metric data is applied for a recursive partitioning algorithm on the plurality of nodes to generate an allocation strategy for the plurality of container nodes. The allocation strategy defines a topology of the tree structure that maximizes usage of computing resources on each node based on the first time interval.

    Authentication of messages sent across a network of multiple data centers

    公开(公告)号:US11212077B2

    公开(公告)日:2021-12-28

    申请号:US16168208

    申请日:2018-10-23

    Inventor: Xueqiang Ma

    Abstract: The disclosure provides an approach for authenticating the contents of a control message sent between data centers. The data centers are located in a computing system comprising multiple data centers. The computing system has a controller, and each data center has a local controller. The message contents comprise a tree of data objects. The tree is converted to a hash tree, and the root hash of the hash tree is stored on a distributed blockchain. Storage on the distributed blockchain ensures that the root hash is not tampered with by an attacker. The receiver of the message then authenticates that the hash tree has not been modified by comparing various hash values, as described herein.

    Multi-domain extension to cloud security

    公开(公告)号:US11343234B2

    公开(公告)日:2022-05-24

    申请号:US16709188

    申请日:2019-12-10

    Abstract: Presented herein are methodologies for implementing multi-domain cloud security and ways to partition end-points in data center/cloud network topologies into hierarchical domains to increase security and key negotiation efficiency. The methodology includes receiving, from a first endpoint, at a cloud security protocol stack, a packet encrypted in accordance with a cloud security key negotiated between the first endpoint and a second endpoint; extracting a cloud security globally unique domain-id from the packet; querying a cloud security domain repository using the cloud security globally unique domain-id as an index to identify a first cloud security domain, among a plurality of cloud security domains, to which the first endpoint and the second endpoint belong; and selecting the first cloud security domain to process the packet.

    Mechanism for encryption key distribution in computer networks

    公开(公告)号:US11290436B2

    公开(公告)日:2022-03-29

    申请号:US16249785

    申请日:2019-01-16

    Abstract: Techniques for key distribution are provided. A first symmetric key is generated for a first downstream site, and a second symmetric key is generated for a second downstream site. The first symmetric key is transmitted to the first downstream site, and the second symmetric key is transmitted to the second downstream site. Upon receiving an indication that the first symmetric key was successfully deployed at the first downstream site, the first symmetric key is deployed on a first network node of an upstream site. Finally, upon determining that the second symmetric key was not successfully deployed at the second downstream site, techniques include refraining from deploying the second symmetric key to a second network node of the upstream site, where the second network node continues to communicate with the second downstream site using an original symmetric key.

    TRAFFIC MIRRORING IN HYBRID NETWORK ENVIRONMENTS

    公开(公告)号:US20210218673A1

    公开(公告)日:2021-07-15

    申请号:US16863713

    申请日:2020-04-30

    Abstract: This disclosure describes various methods, systems, and devices related to mirrored traffic forwarding in a hybrid network. An example method includes receiving, from a source forwarder in a source network, a mirrored data packet. A session of the mirrored data packet may be identified based on a header of the mirrored data packet. A destination forwarder in a destination network may be identified based on the session. The destination network may be different than the source network. The mirrored data packet may be forwarded to the destination forwarder.

    MULTI-DOMAIN EXTENSION TO CLOUD SECURITY

    公开(公告)号:US20210176224A1

    公开(公告)日:2021-06-10

    申请号:US16709188

    申请日:2019-12-10

    Abstract: Presented herein are methodologies for implementing multi-domain cloud security and ways to partition end-points in data center/cloud network topologies into hierarchical domains to increase security and key negotiation efficiency. The methodology includes receiving, from a first endpoint, at a cloud security protocol stack, a packet encrypted in accordance with a cloud security key negotiated between the first endpoint and a second endpoint; extracting a cloud security globally unique domain-id from the packet; querying a cloud security domain repository using the cloud security globally unique domain-id as an index to identify a first cloud security domain, among a plurality of cloud security domains, to which the first endpoint and the second endpoint belong; and selecting the first cloud security domain to process the packet.

Patent Agency Ranking