Dynamic selection and calibration of ciphers based on network and resource constraints

    公开(公告)号:US12088713B2

    公开(公告)日:2024-09-10

    申请号:US17385287

    申请日:2021-07-26

    申请人: VMware LLC

    IPC分类号: H04L9/14

    CPC分类号: H04L9/14

    摘要: The disclosure provides an approach for cryptographic agility. Embodiments include receiving a request from an application for a cryptographic operation, wherein the request is associated with a computing device. Embodiments include determining one or more resource constraints related to the computing device. Embodiments include selecting, based on the one or more resource constraints, a cryptographic technique from a plurality of cryptographic techniques associated with indications of resource requirements. Embodiments include performing the cryptographic operation using the cryptographic technique. Embodiments include providing a response to the application based on performing the cryptographic operation.

    Proxy-enabled communication across network boundaries by self-replicating applications

    公开(公告)号:US11902353B2

    公开(公告)日:2024-02-13

    申请号:US18055235

    申请日:2022-11-14

    申请人: VMware LLC

    摘要: The disclosure provides an approach for cross-network communication by self-replicating applications. Embodiments include identifying, by a first instance of a self-replicating application on a first computing device having a first network connection to a parent component, a second computing device that is connected to the first computing device via a second network connection. Embodiments include self-replicating, by the first instance of the self-replicating application, across the second network connection to produce a second instance of the self-replicating application on the second computing device. Embodiments include initiating, by the first instance of the self-replicating application, a proxy tunnel on the first computing device. Embodiments include receiving, by the proxy tunnel, a first communication from the second instance of the self-replicating application via the second network connection. Embodiments include sending, by the proxy tunnel, based on the first communication, a second communication to the parent component via the first network connection.