-
公开(公告)号:US20190116108A1
公开(公告)日:2019-04-18
申请号:US15787658
申请日:2017-10-18
Applicant: Google LLC
Inventor: Daniel Earle Gibson , Simon Luigi Sabato , Monica C. Wong-Chan , Milo Martin
IPC: H04L12/26
Abstract: System utilization related to memory usage can be monitored by storing host memory usage information in the corresponding host physical memory. However, retrieving this information can be a high overhead operation because it involves engaging with the operating system of each host. Moreover, storing memory usage information in the host physical memories can pose a security risk if they also store privileged data. Network interfaces according to the present disclosure provide unobtrusive and secure support for monitoring of network and other system resources such as regions of memory within host physical memories. Implementations according to the present disclosure include a plurality of memory region counters stored on a network interface. Each memory region counter corresponds to one of the memory regions located in a physical memory of a host coupled to the network interface. Each of the counters includes a system utilization metric associated with its corresponding memory region.
-
公开(公告)号:US11469890B2
公开(公告)日:2022-10-11
申请号:US17080098
申请日:2020-10-26
Applicant: Google LLC
Inventor: Daniel Earle Gibson , Joel Scherpelz
IPC: H04L29/06 , H04L9/08 , H04L9/06 , H04L67/133
Abstract: Aspects of the disclosure relate to providing derived keys for connectionless network protocols. The derived key may be provided by receiving, at a host, a remote procedure call (RPC) sent by a remote host in response a request by an application executing on the remote host. The host may generate a derived key from a region key, the region key being associated with an application-specific memory region on the host. The host may transmit the derived key to the remote host.
-
公开(公告)号:US10986011B2
公开(公告)日:2021-04-20
申请号:US15787658
申请日:2017-10-18
Applicant: Google LLC
Inventor: Daniel Earle Gibson , Simon Luigi Sabato , Monica C. Wong-Chan , Milo Martin
Abstract: System utilization related to memory usage can be monitored by storing host memory usage information in the corresponding host physical memory. However, retrieving this information can be a high overhead operation because it involves engaging with the operating system of each host. Moreover, storing memory usage information in the host physical memories can pose a security risk if they also store privileged data. Network interfaces according to the present disclosure provide unobtrusive and secure support for monitoring of network and other system resources such as regions of memory within host physical memories. Implementations according to the present disclosure include a plurality of memory region counters stored on a network interface. Each memory region counter corresponds to one of the memory regions located in a physical memory of a host coupled to the network interface. Each of the counters includes a system utilization metric associated with its corresponding memory region.
-
公开(公告)号:US10521360B1
公开(公告)日:2019-12-31
申请号:US15787619
申请日:2017-10-18
Applicant: Google LLC
Inventor: Daniel Earle Gibson , Monica C. Wong-Chan , Milo Martin
Abstract: Network protocols generally implement integrity protection, encryption and authentication as separate validation steps. Since each validation step contributes encoding and processing overhead associated with individual packet transfers over the network, such network protocols can make inefficient use of limited packet space. Systems and methods according to the present disclosure combine integrity protection, encryption and authentication into a single validation step thereby making efficient use of limited packet space.
-
公开(公告)号:US11126567B1
公开(公告)日:2021-09-21
申请号:US16704411
申请日:2019-12-05
Applicant: Google LLC
Inventor: Daniel Earle Gibson , Monica C. Wong-Chan , Milo Martin
Abstract: Network protocols generally implement integrity protection, encryption and authentication as separate validation steps. Since each validation step contributes encoding and processing overhead associated with individual packet transfers over the network, such network protocols can make inefficient use of limited packet space. Systems and methods according to the present disclosure combine integrity protection, encryption and authentication into a single validation step thereby making efficient use of limited packet space.
-
公开(公告)号:US20210250167A1
公开(公告)日:2021-08-12
申请号:US17080098
申请日:2020-10-26
Applicant: Google LLC
Inventor: Daniel Earle Gibson , Joel Scherpelz
Abstract: Aspects of the disclosure relate to providing derived keys for connectionless network protocols. The derived key may be provided by receiving, at a host, a remote procedure call (RPC) sent by a remote host in response a request by an application executing on the remote host. The host may generate a derived key from a region key, the region key being associated with an application-specific memory region on the host. The host may transmit the derived key to the remote host.
-
公开(公告)号:US10691619B1
公开(公告)日:2020-06-23
申请号:US15787625
申请日:2017-10-18
Applicant: Google LLC
Inventor: Daniel Earle Gibson , Monica C. Wong-Chan , Milo Martin
Abstract: Network protocols generally implement integrity protection, encryption and authentication as separate validation steps. Since each validation step contributes encoding and processing overhead associated with individual packet transfers over the network, such network protocols can make inefficient use of limited packet space. Systems and methods according to the present disclosure combine integrity protection, encryption and authentication into a single validation step thereby making efficient use of limited packet space.
-
-
-
-
-
-