VERIFYING THAT USAGE OF VIRTUAL NETWORK FUNCTION (VNF) BY A PLURALITY OF COMPUTE NODES COMPLY WITH ALLOWED USAGE RIGHTS

    公开(公告)号:US20180288101A1

    公开(公告)日:2018-10-04

    申请号:US15472939

    申请日:2017-03-29

    Abstract: In some examples, a method includes establishing, by a network device acting as an orchestrator host for a virtual network function (VNF), a trust relationship with a VNF vendor that dynamically specify a set of usage right policies; determining, by the network device, allowed usage rights associated with the VNF based on the set of usage right policies; installing, by the network device, the VNF on a plurality of compute nodes based on the allowed usage rights; and auditing VNF usage right compliance by: issuing a proof quote request to the plurality of compute nodes; receiving a proof quote response comprising a plurality of resource states on the plurality of compute nodes; and verifying whether usage of the VNF on the plurality of compute nodes complies with the allowed usage rights based on the proof quote response.

    EFFICIENT CACHING AND DATA ACCESS TO A REMOTE DATA LAKE IN A LARGE SCALE DATA PROCESSING ENVIRONMENT

    公开(公告)号:US20220300422A1

    公开(公告)日:2022-09-22

    申请号:US17204899

    申请日:2021-03-17

    Abstract: Embodiments described herein are generally directed to caching and data access improvements in a large scale data processing environment. According to an example, an agent running on a first worker node of a cluster receives a read request from a task. The worker node of the cluster to which the data at issue is mapped is identified. When the first worker node is the identified worker node, it is determined whether its cache contains the data; if so, the data is fetched from a remote data lake and the agent locally caches the data; otherwise, when the identified worker node is another worker node of the compute cluster, the data is fetched from a remote agent of that worker node. The agent responds to the read request with cached data, data returned by the remote data lake, or data returned by the remote data agent as the case may be.

    SECURE COMPLIANCE PROTOCOLS
    5.
    发明申请

    公开(公告)号:US20190312855A1

    公开(公告)日:2019-10-10

    申请号:US15947052

    申请日:2018-04-06

    Abstract: In some examples, a secure compliance protocol may include a virtual computing instance (VCI) deployed on a hypervisor and may be provisioned with hardware computing resources. In some examples the VCI may also include a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes, and a plurality of agents to generate a plurality of compliance proofs; the VCI may communicate with a server corresponding to a node of the plurality of nodes; and receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device.

Patent Agency Ranking