Methods and apparatus to handle dependencies associated with resource deployment requests

    公开(公告)号:US11442784B2

    公开(公告)日:2022-09-13

    申请号:US16932521

    申请日:2020-07-17

    Applicant: VMware, Inc.

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to handle dependencies associated with resource deployment requests are disclosed herein. An example apparatus includes a dependency graph generator to generate a dependency graph based on a resource request file specifying a first resource and a second resource to deploy to a resource-based service, the dependency graph representative of the first resource being dependent on a second resource, and a resource controller to send a first request a second request to the resource-based service based on the dependency graph and in response to a verification controller determining that a time-based ordering of the first request relative to the second request satisfies the dependency graph, send the first request and the second request to a user device.

    SECURELY SHARING SECRET INFORMATION THROUGH AN UNSECURE CHANNEL

    公开(公告)号:US20230291549A1

    公开(公告)日:2023-09-14

    申请号:US17694607

    申请日:2022-03-14

    Applicant: VMware, Inc.

    CPC classification number: H04L9/0825 H04L9/0869 H04L9/0894

    Abstract: Secure exchange of information over an unauthenticated communication channel between a sender and a receiver can be implemented as computer-implemented methods, media, and systems. In response to receiving an identifier (ID) of the receiver, a sender provides a symmetric key to the receiver that matches the ID. The symmetric key is configured for use by the receiver to decrypt encrypted information provided by the sender. The sender receives a plurality of heartbeat calls from a receiver to notify the sender of availability to receive encrypted information. Each call of the plurality of heartbeat calls includes a checksum of the symmetric key. In response to determining that the received plurality of heartbeat calls comply with one or more verification rules for confirming an identity of the receiver, the sender sends the encrypted information for decryption by the receiver using the symmetric key.

    METHODS AND APPARATUS TO HANDLE DEPENDENCIES ASSOCIATED WITH RESOURCE DEPLOYMENT REQUESTS

    公开(公告)号:US20230004441A1

    公开(公告)日:2023-01-05

    申请号:US17941974

    申请日:2022-09-09

    Applicant: VMware, Inc.

    Abstract: An example apparatus includes a dependency graph generator to generate a dependency graph based on a resource request file specifying a first resource and a second resource to deploy to a resource-based service, the dependency graph representative of the first resource being dependent on a second resource, a verification controller to generate a status indicator after a determination that a time-based ordering of a first request relative to a second request satisfies the dependency graph, and a resource controller to cause transmission of the first request and the second request to the resource-based service based on the dependency graph, and, after determining that the time-based ordering of the first request relative to the second request satisfies the dependency graph, cause transmission of the status indicator to a user device.

    METHODS AND APPARATUS TO HANDLE DEPENDENCIES ASSOCIATED WITH RESOURCE DEPLOYMENT REQUESTS

    公开(公告)号:US20220019476A1

    公开(公告)日:2022-01-20

    申请号:US16932521

    申请日:2020-07-17

    Applicant: VMware, Inc.

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to handle dependencies associated with resource deployment requests are disclosed herein. An example apparatus includes a dependency graph generator to generate a dependency graph based on a resource request file specifying a first resource and a second resource to deploy to a resource-based service, the dependency graph representative of the first resource being dependent on a second resource, and a resource controller to send a first request a second request to the resource-based service based on the dependency graph and in response to a verification controller determining that a time-based ordering of the first request relative to the second request satisfies the dependency graph, send the first request and the second request to a user device.

Patent Agency Ranking