Data Center Asset Authentication for a Prospective Data Center Asset Owner via an Onboarding Operation

    公开(公告)号:US20240428197A1

    公开(公告)日:2024-12-26

    申请号:US18211614

    申请日:2023-06-20

    Abstract: A system, method, and computer-readable medium for performing a data center monitoring and management operation. The data center monitoring and management operation includes: providing the data center asset to a prospective owner; establishing a secure communication channel between an onboarding system and the data center asset; establishing a communication channel between a rendezvous server and the data center asset; exchanging information between the onboarding system and the data center asset via the secure communication channel, the information including a data center asset ownership voucher; maintaining the data center asset ownership voucher at the rendezvous server; and, using the data center asset ownership voucher to associate the data center asset with the prospective owner.

    Increased efficiency of query types of representational state transfer programming interfaces

    公开(公告)号:US12169495B2

    公开(公告)日:2024-12-17

    申请号:US18047879

    申请日:2022-10-19

    Abstract: A system can receive, from a device, a first request according to a representational state transfer protocol, wherein the first request identifies a uniform resource locator to a resource. The system can determine a group of identifiers that are related to the resource, based on a group of nested join operations, based on the first request and without reference to another request, and wherein respective identifiers of the group of identifiers comprise respective uniform resource locators to the respective identifiers. The system can generate a query response that comprises the group of identifiers, and send a message to the device according to the representational state transfer protocol, wherein the message comprises the query response. The system can receive, from the device, a second request that indicates executing a stored procedure that corresponds to a first identifier of the group of identifiers, and execute the stored procedure.

    MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING

    公开(公告)号:US20240129736A1

    公开(公告)日:2024-04-18

    申请号:US18046646

    申请日:2022-10-14

    Inventor: Ching-Yun Chao

    CPC classification number: H04W12/088 H04W88/02

    Abstract: A system can access an application programming interface of a device to set an owner authorization cryptographic key on the device. The system can receive, at a device discovery service, a first request from the device for an identifier of the device onboarding service, wherein the first request comprises an indication of possessing the owner authorization cryptographic key. The system can, in response to validating the indication of the owner authorization cryptographic key, send, by the device discovery service, the identifier of the device onboarding service to the device. The system can, in response to receiving, at the device onboarding service, a second request from the device that is based on the identifier of the device onboarding service and demonstrates possession of the owner authorization cryptographic key, provision the device by the device onboarding service. The system can, permit, via the firewall, the device to access a device management service.

    SCALABLE ACCESS CONTROL MECHANISM
    6.
    发明公开

    公开(公告)号:US20240095390A1

    公开(公告)日:2024-03-21

    申请号:US17932905

    申请日:2022-09-16

    CPC classification number: G06F21/6227 G06F2221/2113 G06F2221/2141

    Abstract: A system can maintain a first data store that stores first associations between subjects and first attributes, and a second data store that stores second associations between second attributes and permissions. The system can receive a query that identifies a user account and a resource. The system can determine, from the first data store and a context of the user account in initiating the query, first permissions for the user account with respect to the resource and given the context. The system can determine, from the second data store and the context, second permissions that are a precondition to access the resource given the context. The system can determine, based on whether there is an overlap between the first permissions and the second permissions, whether to approve the query. The system can respond to the query based on a result of the determining whether to approve the query.

    Application Program Interface For Use With a Data Schema Mapping Operation

    公开(公告)号:US20230376466A1

    公开(公告)日:2023-11-23

    申请号:US17750691

    申请日:2022-05-23

    CPC classification number: G06F16/213 G06F9/54

    Abstract: A system, method, and computer-readable medium are disclosed for performing a data schema mapping operation. The data schema mapping operation includes receiving product information comprising a first document corresponding to a first data schema, the first data schema comprising an unspecified JavaScript Object Notation (JSON) schema; identifying a plurality of components within the first document corresponding to the first data schema, the plurality of components comprising JSON data elements; identifying a second plurality of components corresponding to a second data schema, the second data schema being associated with a data center services provider, at least some of the second plurality of components being associated with a relational database; mapping a component of the document corresponding to the first data schema to a component corresponding to the second data schema, the mapping providing a second document; and, accessing the second document via a data access application program interface.

    METHODS TO ENSURE TRUST VALIDATION AND INTEGRITY OF WORKFLOW EXECUTION

    公开(公告)号:US20250094590A1

    公开(公告)日:2025-03-20

    申请号:US18466907

    申请日:2023-09-14

    Abstract: One example method includes receiving, at a multi cloud service orchestration platform from a client, a request for performance of a workflow, authenticating and authorizing the client, invoking orchestration of the workflow, invoking the workflow, validating a workflow definition associated with the workflow, and on successful validation, initializing execution of the workflow, and executing, at an activity container, the workflow. The method may be performed in the multi cloud service orchestration platform.

    Data Center Workload Orchestration Via A Data Center Monitoring And Management Operation

    公开(公告)号:US20250036474A1

    公开(公告)日:2025-01-30

    申请号:US18226893

    申请日:2023-07-27

    Abstract: A system, method, and computer-readable medium for performing a data center monitoring and management operation. The data center monitoring and management operation includes: receiving workload orchestration input data; applying the workload orchestration data to a network model; generating a probability distribution of the workload orchestration data, the probability distribution including performance indicator information; and, managing data center workload provisioning based upon the probability distribution of the workload orchestration data.

Patent Agency Ranking