VIRTUAL PRIVATE NETWORK AGGREGATION
    11.
    发明申请
    VIRTUAL PRIVATE NETWORK AGGREGATION 审中-公开
    虚拟私有网络聚合

    公开(公告)号:WO2017100083A1

    公开(公告)日:2017-06-15

    申请号:PCT/US2016/064509

    申请日:2016-12-02

    Abstract: Aggregating traffic over multiple VPN connections is described. A first Virtual Private Network (VPN) connection is established between a client device and a first VPN server via a a first access network of the client device. A second Virtual Private Network (VPN) connection is established between the client device and a second VPN server via a second access network of the client device. Application traffic associated with a connection between an application server and a client application that corresponds to the client device is received. The application traffic associated with the connection between the application server and the client application is distributed between at least the first VPN connection and the second VPN connection.

    Abstract translation: 描述了通过多个VPN连接聚集流量。 经由客户端装置的第一接入网络在客户端装置与第一VPN服务器之间建立第一虚拟专用网络(VPN)连接。 通过客户端设备的第二接入网络在客户端设备和第二VPN服务器之间建立第二虚拟专用网络(VPN)连接。 接收与应用服务器和对应于客户端设备的客户端应用之间的连接相关联的应用流量。 与应用程序服务器和客户端应用程序之间的连接关联的应用程序流量至少分配在第一个VPN连接和第二个VPN连接之间。

    SYSTEM COMPLIANCE BASED ON A MIX OF HOTPATCHES AND COLDPATCHES

    公开(公告)号:WO2022010562A1

    公开(公告)日:2022-01-13

    申请号:PCT/US2021/029034

    申请日:2021-04-26

    Abstract: Enacting a compliance action using an assessment that considers a mix of coldpatches and hotpatches includes identifying a policy defining the compliance condition based on patching status of a software component. A patching state of the software component is determined, including identifying evidence of coldpatched binary file(s) and hotpatch binary file(s) applicable to the software component, and using the evidence to determine whether or not the hotpatch binary file(s) have been applied to a memory image into which an instance of the software component is loaded. Based on the policy and on the patching state of the software component, a compliance action is enacted for the compliance condition. The compliance action includes generating a health report or a health attestation, initiating a patching action, initiating an execution control action, and the like.

    PARTIALLY PRIVILEGED LIGHTWEIGHT VIRTUALIZATION ENVIRONMENTS

    公开(公告)号:WO2021247138A1

    公开(公告)日:2021-12-09

    申请号:PCT/US2021/025841

    申请日:2021-04-06

    Abstract: A fine-grain selectable partially privileged container virtual computing environment provides a vehicle by which processes that are directed to modifying specific aspects of a host computing environment can be delivered to, and executed upon, the host computing environment while simultaneously maintaining the advantageous and desirable protections and isolations between the remaining aspects of the host computing environment and the partially privileged container computing environment. Such partial privilege is provided based upon directly or indirectly delineated actions that are allowed to be undertaken on the host computing environment by processes executing within the partially privileged container virtual computing environment and actions which are not allowed. Aspects of the host computing environment operating system, such as the kernel, are extended to interface with container-centric mechanisms to receive information upon which actions can be allowed or denied by the kernel even if the process attempting such actions would otherwise have sufficient privilege.

    HARDWARE-BASED VIRTUALIZED SECURITY ISOLATION
    17.
    发明申请
    HARDWARE-BASED VIRTUALIZED SECURITY ISOLATION 审中-公开
    基于硬件的虚拟化安全隔离

    公开(公告)号:WO2017210065A1

    公开(公告)日:2017-12-07

    申请号:PCT/US2017/034354

    申请日:2017-05-25

    Abstract: A host operating system running on a computing device monitors network communications for the computing device to identify network resources that are requested by the computing device. The host operating system compares requested network resources against security policies to determine if the requested network resources are trusted. When an untrusted network resource is identified, the host operating system accesses the untrusted network resource within a container that is isolated from the host operating system kernel using techniques discussed herein. By restricting access to untrusted network resources to isolated containers, the host operating system is protected from even kernel-level attacks or infections that may result from an untrusted network resource.

    Abstract translation: 运行在计算设备上的主机操作系统监视计算设备的网络通信,以识别计算设备请求的网络资源。 主机操作系统将请求的网络资源与安全策略进行比较,以确定请求的网络资源是否可信。 当识别不可信网络资源时,主机操作系统使用本文讨论的技术访问与主机操作系统内核隔离的容器内的不可信网络资源。 通过将访问不受信任的网络资源限制在隔离的容器中,主机操作系统即使受到内核级别的攻击或可能由不可信网络资源导致的感染,也能受到保护。

    SCALABLE TENANT NETWORKS
    19.
    发明申请
    SCALABLE TENANT NETWORKS 审中-公开
    可扩展租户网络

    公开(公告)号:WO2017105969A1

    公开(公告)日:2017-06-22

    申请号:PCT/US2016/065471

    申请日:2016-12-08

    Abstract: Template-driven locally calculated policy updates for virtualized machines in a datacenter environment are described. A central control and monitoring node calculates and pushes down policy templates to local control and monitoring nodes. The templates provide boundaries and/or a pool of networking resources, from which the local control and monitoring node is enabled to calculate policy updates for locally instantiated virtual machines and containers.

    Abstract translation: 描述了数据中心环境中虚拟机器的模板驱动本地计算策略更新。 中央控制和监视节点计算策略模板并将其推送到本地控制和监视节点。 这些模板提供了边界和/或网络资源池,从中可以使本地控制和监视节点为本地实例化的虚拟机和容器计算策略更新。

Patent Agency Ranking