VMware, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 451 pour VMware, Inc. et 4 filiales Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 449
        Marque 2
Juridiction
        International 388
        États-Unis 62
        Europe 1
Propriétaire / Filiale
[Owner] VMware, Inc. 304
Nicira, Inc. 105
AirWatch LLC 39
Desktone, Inc. 2
CloudVolumes, Inc. 1
Date
2025 10
2024 34
2023 38
2022 36
2021 22
Voir plus
Classe IPC
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation 100
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 65
G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT] 55
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison 47
H04L 12/24 - Dispositions pour la maintenance ou la gestion 34
Voir plus
Classe NICE
09 - Appareils et instruments scientifiques et électriques 2
42 - Services scientifiques, technologiques et industriels, recherche et conception 2
Statut
En Instance 43
Enregistré / En vigueur 408
  1     2     3     ...     5        Prochaine page

1.

TWO TIER DNS

      
Numéro d'application 19193322
Statut En instance
Date de dépôt 2025-04-29
Date de la première publication 2025-08-14
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Iyer, Sreeram
  • Basavaiah, Murali
  • Rao, Prasad
  • Anisetti, Shyam Prasad
  • Dhillon, Naveen

Abrégé

Some embodiments provide a two-tier DNS (Domain Name System) service for processing DNS requests. In some embodiments, the two-tier DNS service deploys first and second tiers of service machines, with the second-tier having several groups of service machines each of which is configured to resolve DNS requests for a different set of domain names than the other second-tier group(s). Each service machine in the first-tier is configured to identify the second-tier group responsible for each particular DNS request that the service machine receives for each particular domain name, and to forward the particular DNS request to the second-tier group that it identifies for the particular DNS request. The first-tier DNS service in some embodiments has only one group of service machines. Each first or second service machine group in some embodiments can have one or more service machines, and can be scaled up or down to add or remove service machines to the group (e.g., through an active/active layer 3 scaleout with BGP). In some embodiments, two different second-tier service groups can process DNS requests for two or more different FQDNs (fully qualified domain names) that are part of the same domain, and/or for two or more different FQDNs that are part of different domains.

Classes IPC  ?

  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 67/1004 - Sélection du serveur pour la répartition de charge

2.

METHOD FOR AGGREGATING SECURITY ALERTS TO REDUCE ALERT FATIGUE AND TO HELP ALERT TRIAGING

      
Numéro d'application 18491593
Statut En instance
Date de dépôt 2023-10-20
Date de la première publication 2025-04-24
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Mo, Jue
  • Choudhary, Aditya
  • Oliver, Jonathan James
  • Batta, Raghav
  • Jain, Lalit Prithviraj

Abrégé

A computer system comprises a plurality of endpoints at which security agents generate security alerts and a machine-learning (ML) system that receives the security alerts from the endpoints and that separates the security alerts into a plurality of clusters, wherein the ML system is configured to execute on a processor of a hardware platform to: determine that a group of first alerts of the security alerts belongs to a first cluster of the clusters; create a first representative alert from metadata of the first alerts belonging to the first cluster; and in response to a security analytics platform evaluating the first representative alert as being harmless to the computer system, store information indicating that all of the first alerts are harmless.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

3.

SCORE BASED METHOD TO DETERMINE APPLICATION LOAD FOR AUTO-SCALING AND REBALANCING IN CONTAINER-BASED CLUSTERS

      
Numéro d'application 18489793
Statut En instance
Date de dépôt 2023-10-18
Date de la première publication 2025-04-24
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Biswas, Sudipta
  • Das, Monotosh
  • Chawla, Kavita
  • Gupta, Ayush

Abrégé

The disclosure provides a method for assigning new load to an application instance in a public cloud. The method generally includes calculating, for each application instance of a plurality of application instances running in the public cloud, a respective resource utilization score, wherein for each application instance: the respective score is calculated by applying, for each of two or more resource utilization metrics associated with the application instance, a respective weight to a respective resource usage value for the resource utilization metric, and wherein, for each of the two or more resource utilization metrics, the respective weight is a function of the respective resource usage values for the two or more resource utilization metrics; identifying an application instance having a highest respective score among the respective scores calculated for the application instances; and determining whether the application instance having the highest respective score is capable of handling the new load.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • G06F 9/54 - Communication interprogramme

4.

METHODS AND SYSTEMS FOR APPLICATION DISCOVERY FROM LOG MESSAGES

      
Numéro d'application 18381520
Statut En instance
Date de dépôt 2023-10-18
Date de la première publication 2025-04-24
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Harutyunyan, Ashot Nshan
  • Poghosyan, Arnak
  • Bunarjyan, Tigran
  • Haroyan, Andranik
  • Harutyunyan, Marine
  • Harutyunyan, Litit
  • Baghdasaryan, Ashot

Abrégé

This disclosure is directed to automated computer-implemented methods for application discovery from log messages generated by event sources of applications executing in a cloud infrastructure. The methods are executed by an operations manager that constructs a data frame of probability distributions of event types of the log messages generated by the event sources in a time period. The operations manager executes clustering techniques that are used to form clusters of the probability distributions in the data frame, where each of the clusters corresponds to one of the applications. The operations manager displays the clusters of the probability distributions in a two-dimensional map of applications in a graphical user interface that enables a user to select one of the clusters in the map of applications that corresponds to one of the applications and launch clustering of probability distributions of the user-selected cluster to discover two or more instances of the application.

Classes IPC  ?

  • G06F 9/54 - Communication interprogramme
  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques

5.

RAN APPLICATION FOR INTERFERENCE DETECTION AND CLASSIFICATION

      
Numéro d'application 18378882
Statut En instance
Date de dépôt 2023-10-11
Date de la première publication 2025-04-17
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Yang, Yang
  • Campello, Fernanda
  • Elabbasy, Islam

Abrégé

Some embodiments of the invention provide a method for an interference detection RAN application deployed across one or more RICs for detecting and identifying external interference in a RAN that includes multiple RAN base stations servicing users located across multiple regions, each region including at least one RAN base station. The method is performed for a particular region serviced by a particular RAN base station. The method detects an interference incident associated with the particular region. The method analyzes a pattern of spectrum interference associated with the particular region. Based on said analysis, the method determines whether the pattern of spectrum interference matches a first signature pattern associated with internal interference or a second signature pattern associated with external interference. When the pattern of spectrum interference matches the second signature pattern, the method generates an alert to notify an operator of the particular RAN base station of the external interference.

Classes IPC  ?

  • H04B 17/345 - Valeurs d’interférence
  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04W 28/08 - Équilibrage ou répartition des charges

6.

HYPERVISOR-HOSTING-BASED SERVICE MESH SOLUTION

      
Numéro d'application 18510351
Statut En instance
Date de dépôt 2023-11-15
Date de la première publication 2025-04-17
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Lin, Bo
  • Zhou, Zhengsheng
  • Han, Donghai
  • Chen, Dongping
  • Liang, Xiao

Abrégé

Some embodiments of the invention provide a method of implementing a virtualization software-based service mesh for a network that includes multiple host computers, each host computer including a set of virtualization software executing a set of application instances. For each host computer, the method deploys, to the set of virtualization software, an application service agent and an application service data plane that includes a set of data plane service mesh levels. The method configures the application service agent to apply policy rules defined for flows associated with the set of application instances to the flows on the application service data plane, and configures the application service data plane to forward the flows for the set of application instances to and from services provided at each data plane service mesh level in the set of data plane service mesh levels according to the policy rules applied by the application service agent.

Classes IPC  ?

  • H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p. ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p. ex. prêt à l’emploi [plug-and-play]
  • H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles

7.

METHOD FOR MANAGING THE DESIRED STATES OF SOFTWARE-DEFINED DATA CENTERS

      
Numéro d'application 18381197
Statut En instance
Date de dépôt 2023-10-18
Date de la première publication 2025-02-27
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Urmese, Nidhin
  • Hu, Jeffrey Gabriel
  • Wu, Bing
  • Kulkarni, Anmol
  • Komatsu, Kiyoshi James
  • Nayak, Lipsa

Abrégé

A method of managing desired states of software-defined data centers (SDDCs), includes the steps of: in response to a user selection of a first modular template that includes a first set of desired configurations and a user selection of a second modular template that includes a second set of desired configurations, creating a composite template that includes desired configurations from the first and second modular templates; and in response to a user selection to assign the composite template to an SDDC, creating a desired state document that includes desired configurations from the composite template and then transmitting an instruction to update actual configurations of the SDDC to match corresponding desired configurations from the desired state document.

Classes IPC  ?

  • G06F 9/445 - Chargement ou démarrage de programme

8.

METHODS AND SYSTEMS THAT MANAGE CLOUD-COMPUTING INFRASTRUCTURE BY IDEMPOTENT APPLICATION OF DATA SPECIFICATIONS AND ENFORCED-STATE MANAGEMENT

      
Numéro d'application 18379689
Statut En instance
Date de dépôt 2023-10-13
Date de la première publication 2025-02-20
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Devarakonda, Kalyan
  • Bobba, Praneeth
  • Ganapathi, Prasanna
  • Sampangiramiaiah, Murali

Abrégé

The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that allows users and upstream management systems to define and deploy infrastructure, such as virtual networks, virtual machines, load balancers, and connection topologies, within cloud-computing systems. The IaC cloud-infrastructure-management service or system includes a service frontend, a task manager, an event-processing component, and multiple Idem-service workers. The task manager manages execution of commands and requests received from the service frontend, using multiple queues, provides for prioritization of command-and-request execution by the multiple Idem-service workers, and provides for preemption of long-running executing commands and requests. The IaC cloud-infrastructure-management service or system enforces specified states of the cloud infrastructure using enforced-state identifiers and enforced-state versions supplied in state commands and enforce requests.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

9.

ADAPTIVE PRIVILEGE ADJUSTMENT FOR LEAST PRIVILEGE ACCESS

      
Numéro d'application 18371517
Statut En instance
Date de dépôt 2023-09-22
Date de la première publication 2025-01-16
Propriétaire VWWARE, INC. (USA)
Inventeur(s)
  • Burle, Siddharth
  • Meena, Amit
  • Aneja, Anuj
  • Wagh, Ashitosh

Abrégé

Techniques associated with adaptive privilege adjustment are disclosed. A least privilege access role for an entity can be received from an access control system that provides the entity a plurality of privileges to access a plurality of resources in a data center. Access by the entity to one or more resources of the data center can be monitored, and based on the access by the entity, it can be determined that the entity does not access at least one resource of the plurality of resources. The least privilege access role can be updated subsequently for the entity to remove at least one privilege of the plurality of privileges for accessing the at least one resource. The least privilege access role for the entity can be applied to the access control system to remove access to the at least one resource for the entity.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

10.

SERVER AND APPLICATION AWARE NUMA-BASED LOAD-BALANCING SOLUTION

      
Numéro d'application 18373580
Statut En instance
Date de dépôt 2023-09-27
Date de la première publication 2025-01-16
Propriétaire
  • VMWARE, INC. (USA)
  • VMWARE, INC. (USA)
Inventeur(s)
  • Kempanna, Raghav
  • Priyadarshi, Tathagat
  • Ramesh, Vipin Padmam
  • Rathnavel, Kumara Parameshwaran
  • Podila, Srinivasa Srikanth
  • Sreenivasan, Rajagopal
  • Yadav, Samar

Abrégé

Some embodiments provide a novel method for processing data message flows using several non-uniform memory access (NUMA) nodes of a processing system. Each NUMA node includes a local memory and a set of processors that can access data from local memories of other NUMA nodes. A load balancing application associated with a first NUMA node receives a data message flow destined for an endpoint application. The load balancing application determines whether the first NUMA node should perform a middlebox service operation on the data message flow that is destined to the endpoint application. Based on a determination that the first NUMA node should not process the data message flow, the load balancing application directs the data message flow to a second NUMA node for performing the middlebox service operation.

Classes IPC  ?

11.

CHUNKING AND DEDUPLICATION OF DATA USING ERROR CHECKING VALUES

      
Numéro d'application 18334231
Statut En instance
Date de dépôt 2023-06-13
Date de la première publication 2024-12-19
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Jain, Abhay Kumar
  • Wang, Wenguang
  • Xiang, Enning

Abrégé

Chunks of data are identified and deduplication is performed on the chunks of data using associated cyclic redundancy check (CRC) values. A plurality of CRC values is obtained that is associated with consecutive data blocks stored in a payload data store. Cut point CRC values are identified in the plurality of CRC values and CRC chunks are identified based on those cut point CRC values, wherein each CRC chunk is bounded by two consecutive cut point CRC values. A CRC chunk hash value is generated for each CRC chunk. A pair of duplicate CRC chunks is identified using the CRC chunk hash values and a deduplication operation is performed in association with the identified pair of duplicate CRC chunks. Using existing CRC values during the identification of chunk cut points reduces the computing resource costs associated with performing that process using the data blocks.

Classes IPC  ?

  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • G06F 11/10 - Détection ou correction d'erreur par introduction de redondance dans la représentation des données, p. ex. en utilisant des codes de contrôle en ajoutant des chiffres binaires ou des symboles particuliers aux données exprimées suivant un code, p. ex. contrôle de parité, exclusion des 9 ou des 11

12.

UNIFIED DATA STREAMING FRAMEWORK IN VIRTUALIZATION MANAGEMENT SOFTWARE

      
Numéro d'application 18331050
Statut En instance
Date de dépôt 2023-06-07
Date de la première publication 2024-12-12
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Anwar, Syed
  • Sinha, Kundan
  • Dimitrov, Georgi Lyubomirov
  • Krishna, Shalini
  • Karaatanassov, Kiril

Abrégé

An example method of accessing object data managed by virtual infrastructure (VI) services of virtualization management software that manages a cluster of hosts in a data center and a virtualization layer executing in the cluster of hosts includes: receiving, from a client at a unified data service executing in the virtualization management software, a request for accessing the object data; planning, in response to the request, an operation to access the object data that targets a first VI service of the VI services; invoking, in response to the operation, an application programming interface (API) of the first VI service to access the object data, the API being exposed by a unified data library integrated with the first VI service; and forwarding, from the unified data service to the client, a result of accessing the object data.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

13.

CUSTOM RESOURCE SCHEMA MODIFICATION

      
Numéro d'application 18382117
Statut En instance
Date de dépôt 2023-10-20
Date de la première publication 2024-09-12
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Valinkova, Elina
  • Petkov, Martin
  • Spasova, Yanitsa Dimitrova
  • Kovacheva, Diana
  • Hadzhilazova, Vera
  • Vuchkov, Martin

Abrégé

Custom resource schema modification is described herein. One example method includes providing an interface for modifying a schema of a custom resource in a virtualized environment. The interface can include a first portion configured to receive modifications to summary information corresponding to the custom resource and a second portion configured to receive modifications to properties corresponding to the schema of the custom resource. The method can include validating the modified schema, and saving the modified schema of the custom resource responsive to the validation being successful.

Classes IPC  ?

  • G06F 16/21 - Conception, administration ou maintenance des bases de données

14.

ACCOUNTABLE DECENTRALIZED ANONYMOUS PAYMENTS

      
Numéro d'application 18160110
Statut En instance
Date de dépôt 2023-01-26
Date de la première publication 2024-08-08
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Tomescu, Alin
  • Bhat, Adithya
  • Abraham, Ittai
  • Gueta, Guy
  • Pinkas, Binyamin
  • Yanai, Avishay

Abrégé

Disclosed are examples of accountable decentralized anonymous payment systems and methods. One such method comprises storing, in a digital wallet, a digital coin that has been signed by a bank computing device; rerandomizing the digital coin and a coin signature to produce a new version of the digital coin that is anonymous with respect to an owner of the digital coin; sending the new version of the digital coin to a recipient computing device; computing a nullifier for the new version of the digital coin using a pseuodorandom function over a serial number of the digital coin; sending the nullifier for the new version of the digital coin to the bank computing device; and providing the bank computing device a zero knowledge proof that a value of the nullifier for the new version of the digital coin is correct and is the same as a nullifier of the digital coin.

Classes IPC  ?

  • G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
  • G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives

15.

PROVISIONING IMAGES TO DEPLOY CONTAINERIZED WORKLOADS IN A VIRTUALIZED ENVIRONMENT

      
Numéro d'application 18101939
Statut En instance
Date de dépôt 2023-01-26
Date de la première publication 2024-08-01
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Bandi, Krishna Chaitanya
  • Jagannathan, Rohith
  • Drzewiecki, Adrian
  • Srivastava, Abhishek

Abrégé

A method for provisioning images to deploy containerized workloads in a virtualized environment can include bringing up a containerized workload in a virtualized computing environment responsive to receiving a request to run a containerized workload in the virtualized computing environment. Bringing up the containerized workload can include creating a VMDK that includes a container image in shared storage of an image registry responsive to authenticating with the image registry, attaching the VMDK to a virtual computing instance, responsive to receiving a request, made by a container running in the VCI, for a file of the container image in the attached VMDK, retrieving the file from the shared storage, and bringing up the containerized workload using the file.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

16.

POPULATING ENTROPY POOL WITH ENTROPY FROM EXTERNAL SOURCES

      
Numéro d'application 18087674
Statut En instance
Date de dépôt 2022-12-22
Date de la première publication 2024-06-27
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Banerjee, Ashok
  • Banerjee, Bishakha
  • Thirumalai, Ravikiran
  • Jagannathan, Ravi

Abrégé

To populate an entropy pool with entropy from external sources, a computer system transmits, to multiple entropy sources, a request to receive entropy. At least one of the multiple entropy sources is an external source that is external and operatively connected to the computer system. The computer system receives entropy from the external source. The computer system stores the entropy received from the external source in an entropy storage medium. The computer system receives, from a client computer system, a request for entropy to be used by the client computer system to implement a random number generation algorithm. In response to receiving the request, the computer system provides a portion of the stored entropy. The portion of the stored entropy provided in response to receiving the request includes the entropy received from the external source.

Classes IPC  ?

  • G06F 7/58 - Générateurs de nombres aléatoires ou pseudo-aléatoires
  • G06F 9/4401 - Amorçage
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

17.

PROVISIONING AND DEPLOYING RAN APPLICATIONS IN A RAN SYSTEM

      
Numéro d'application US2023033374
Numéro de publication 2024/136932
Statut Délivré - en vigueur
Date de dépôt 2023-09-21
Date de publication 2024-06-27
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Vanjare, Gauresh, Dilip
  • Shivani, Abrar
  • Subramani Jayavelu, Giridhar

Abrégé

Some embodiments of the invention provide a method for providing automated admission control services for a RAN system. The method receives a trigger alert that includes an application identifier for an application, a dRIC identifier associated with a dRIC to which the application is to be deployed, and a set of configurations for the application that are in a first format. The method converts the set of configurations from the first format to a second format and sends the set configurations in the second format to an FCAPS management pod deployed to the dRIC. Upon receiving positive acknowledgment indicating successful implementation of the set of configurations from the FCAPS management pod, the method updates a configuration table stored in a database of the RAN with a set of admissions control information for the application. The method sends a notification to an API server for the RAN indicating the set of configurations have been successfully implemented for the application.

Classes IPC  ?

  • H04W 28/16 - Gestion centrale des ressourcesNégociation de ressources ou de paramètres de communication, p. ex. négociation de la bande passante ou de la qualité de service [QoS Quality of Service]
  • H04W 88/12 - Dispositifs contrôleurs de points d'accès

18.

USE OF CRDS AS DESCRIPTORS FOR APPLICATION UI IN AN O-RAN SYSTEM

      
Numéro d'application US2023033030
Numéro de publication 2024/136931
Statut Délivré - en vigueur
Date de dépôt 2023-09-18
Date de publication 2024-06-27
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Palapati, Vamseedhar, Reddy
  • Kirakosyan, Levon
  • Subramani Jayavelu, Giridhar

Abrégé

Some embodiments use one or more CRDs (custom resource definitions), and Custom Resource (CR) instances based on these CRDs, to dynamically generate a unified user interface (UI) to display information (e.g., operational metrics) regarding different applications (xApps, rApps, etc.) in the O-RAN system. Using such CRDs and CR instances, frees up the application developers from having to define the UI programs for generating the UIs for their RAN applications. It also allows the O-RAN system to provide one unified approach for generating a UI to display information about O-RAN applications developed by different application developers.

Classes IPC  ?

  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • H04L 41/0233 - Techniques orientées objet, pour la représentation des données de gestion de réseau, p. ex. l’architecture commune de répartition des requêtes d’objets [CORBA]

19.

AGGREGATING METRICS OF NETWORK ELEMENTS OF A SOFTWARE-DEFINED NETWORK FOR DIFFERENT APPLICATIONS BASED ON DIFFERENT AGGREGATION CRITERIA

      
Numéro d'application 18378148
Statut En instance
Date de dépôt 2023-10-10
Date de la première publication 2024-06-20
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Agarwal, Minjal
  • Sonawane, Shivraj Shahajirao
  • Gupta, Ashutosh
  • Rajagopalan, Ranganathan
  • Mordani, Rajiv

Abrégé

Some embodiments provide a novel method of providing operational data for network elements in a software-defined network (SDN). The method deploys a framework for collecting operational data for a set of network elements in the SDN. The framework of some embodiments includes an interface for different client applications to use in order to configure the framework to collect and aggregate the operational data based on different collection and aggregation criteria that satisfies different requirements of the different client applications. The method also deploys data collectors in the SDN that the framework configures to collect operational data from the set of network elements in the SDN.

Classes IPC  ?

  • G06F 9/445 - Chargement ou démarrage de programme

20.

WAN OPTIMIZATION IN THE PUBLIC CLOUD

      
Numéro d'application US2023033074
Numéro de publication 2024/123403
Statut Délivré - en vigueur
Date de dépôt 2023-09-18
Date de publication 2024-06-13
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Golikov, Igor
  • Bergman, Aran
  • Gal, Lior
  • Yanai, Avishay
  • Cidon, Israel
  • Markuze, Alex
  • Zohar, Eyal

Abrégé

Some embodiments of the invention provide a method for WAN (wide area network) optimization for a WAN that connects multiple sites, each of which has at least one router. At a gateway router deployed to a public cloud, the method receives from at least two routers at least two sites, multiple data streams destined for a particular centralized datacenter. The method performs a WAN optimization operation to aggregate the multiple streams into one outbound stream that is WAN optimized for forwarding to the particular centralized datacenter. The method then forwards the WAN-optimized data stream to the particular centralized datacenter.

Classes IPC  ?

  • H04L 47/41 - Commande de fluxCommande de la congestion en agissant sur des flux ou des liens agrégés
  • H04L 47/38 - Commande de fluxCommande de la congestion en adaptant le codage ou le taux de compression

21.

MULTI-TENANT NETWORK MANAGEMENT SERVICE

      
Numéro d'application US2023032963
Numéro de publication 2024/096960
Statut Délivré - en vigueur
Date de dépôt 2023-09-16
Date de publication 2024-05-10
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Makhijani, Shailesh
  • Bokare, Nikhil
  • Vigneron, Thomas, Pierre Labor
  • Wagh, Rushikesh
  • Bhandari, Vaibhav
  • Vaidya, Sachin, Mohan
  • Margarian, Pavlush
  • Dorr, Josh
  • Ivashkevich, Slava
  • Muppala, Suresh
  • Sadasivan, Ganesh
  • Kumar, Abhishek
  • Rajagopalan, Ranganathan

Abrégé

Some embodiments provide a method for deploying network management services for a plurality of tenants. The method is performed at a multi-tenant service executing in a container cluster implemented in a public cloud. For a first tenant, the method deploys a first set of network management services in the container cluster for managing a first group of datacenters of the first tenant. For a second tenant, the method deploys a second set of network management services in the container cluster for managing a second group of datacenters of the second tenant.

Classes IPC  ?

  • G06F 21/10 - Protection de programmes ou contenus distribués, p. ex. vente ou concession de licence de matériel soumis à droit de reproduction
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/08 - Sécurité d'accès
  • H04W 12/12 - Détection ou prévention de fraudes

22.

GREEN LOAD BALANCING IN GLOBAL LOAD BALANCING DEPLOYMENTS

      
Numéro d'application US2023035730
Numéro de publication 2024/097044
Statut Délivré - en vigueur
Date de dépôt 2023-10-23
Date de publication 2024-05-10
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Sreenivasan, Rajagopal
  • Iyer, Sreeram
  • Pfaff, Benjamin L.
  • Firoiu, Victor
  • Maji, Diptyaroop

Abrégé

The disclosure provides an approach for load balancing requests among data centers based on one or more environmental impact factors of the data centers. A method of load balancing requests among data centers is provided. The method includes receiving, at a load balancer from a client, a service request. The method further includes selecting, by the load balancer, a first data center of a plurality of data centers based on one or more environmental impact factors associated with each of the plurality of data centers. The method further includes causing the service request to be serviced by the selected first data center.

Classes IPC  ?

  • H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p. ex. la mémoire disponible ou la charge de travail

23.

CONTAINER ORCHESTRATION IN A CLUSTERED AND VIRTUALIZED COMPUTER SYSTEM

      
Numéro d'application 18501605
Statut En instance
Date de dépôt 2023-11-03
Date de la première publication 2024-05-02
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Rosoff, Jared Sean
  • Johnson, Mark Russell
  • Drzewiecki, Adrian

Abrégé

An example virtualized computing system includes a host cluster having a virtualization layer directly executing on hardware platforms of hosts, the virtualization layer supporting execution of virtual machines (VMs), the VMs including pod VMs, the pod VMs including container engines supporting execution of containers in the pod VMs; an orchestration control plane integrated with the virtualization layer, the orchestration control plane including a master server and pod VM controllers, the pod VM controllers executing in the virtualization layer external to the VMs, the pod VM controllers configured as agents of the master server to manage the pod VMs; pod VM agents, executing in the pod VMs, configured as agents of the pod VM controllers to manage the containers executing in the pod VMs.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 9/445 - Chargement ou démarrage de programme
  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 9/54 - Communication interprogramme

24.

METHODS FOR RESILIENT MULTI CLOUD GATEWAY INTERCONNECTS

      
Numéro d'application US2023033077
Numéro de publication 2024/091353
Statut Délivré - en vigueur
Date de dépôt 2023-09-18
Date de publication 2024-05-02
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ramaswamy, Navaneeth, Krishnan
  • Kotrabasappa, Santosh, Pallagatti

Abrégé

Some embodiments of the invention provide a method for enabling inter-gateway connectivity in an SD-WAN (software-defined wide area network) that connects multiple sites. The method deploys to the SD-WAN a floating hub gateway router that that (1) connects to multiple gateway routers each of which is deployed in a cloud and connects to at least one edge router in at least one site, and (2) does not connect to edge routers at any site. The method provides a network address associated with the floating hub gateway router to the multiple gateway routers deployed in one or more clouds for the SD-WAN. The method configures the floating hub gateway router to establish a tunnel with each gateway router in the multiple gateway routers to enable inter-gateway connectivity between the multiple gateway routers.

Classes IPC  ?

  • H04L 45/036 - Mise à jour de la topologie entre les éléments de calcul des routes, p. ex. entre les dispositifs de commande OpenFlow
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 45/24 - Routes multiples
  • H04L 45/42 - Routage centralisé
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données

25.

MANAGEMENT OF MULTI-TYPE STORAGE INCLUDING HYPERCONVERGED STORAGE

      
Numéro d'application US2023034039
Numéro de publication 2024/086010
Statut Délivré - en vigueur
Date de dépôt 2023-09-28
Date de publication 2024-04-25
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Yang, Yang
  • Wu, Yu
  • Feng, Jin
  • Xu, Hui
  • Shen, Zhuocheng
  • Venkatasubram, Rajesh

Abrégé

Described herein are systems, methods, and software to manage multi-type storage in a cluster computing environment. In one example, a host can identify health and performance information at a first time for each local data store on the host and a hyperconverged data store available to the host. The host can further identify health and performance information associated with the data stores at a second time and can compare the health and performance information at the first time and the second time to identify differences in the information. The host then communicates the differences to a second host in the computing environment.

Classes IPC  ?

  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
  • G06F 9/00 - Dispositions pour la commande par programme, p. ex. unités de commande

26.

LOW-CODE DEVELOPMENT PLATFORM FOR EXTENDING WORKLOAD PROVISIONING

      
Numéro d'application 18244079
Statut En instance
Date de dépôt 2023-09-08
Date de la première publication 2024-03-14
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Georgiev, Tony
  • Filipov, Antonio
  • Petkov, Martin
  • Valinkova, Elina
  • Mollova, Vera
  • Vuchkov, Martin

Abrégé

The present disclosure relates to extending workload provisioning using a low-code development platform. Some embodiments include a medium having instructions to provide an interface for creating a custom resource in a virtualized environment, the interface including a first portion configured to receive summary information corresponding to the custom resource, and a second portion configured to receive a schema corresponding to the custom resource. Some embodiments include creating the custom resource according to the summary information and the schema.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

27.

OPTIMIZED SYSTEM DESIGN FOR DEPLOYING AND MANAGING CONTAINERIZED WORKLOADS AT SCALE

      
Numéro d'application US2023030300
Numéro de publication 2024/049636
Statut Délivré - en vigueur
Date de dépôt 2023-08-15
Date de publication 2024-03-07
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Aygar, Erol
  • Deshpande, Nikhil
  • Corrie, Benjamin John
  • Hicken, George Gregory
  • Davis, Elliott

Abrégé

An example method of automatically deploying a containerized workload on a hypervisor based device is provided. The method generally includes booting the device running a hypervisor, in response to booting the device: automatically obtaining, by the device, one or more intended state configuration files from a server external to the device, the one or more intended state configuration files defining a control plane configuration for providing services for at least deploying and managing the containerized workload and workload configuration parameters for the containerized workload; deploying a control plane pod configured according to the control plane configuration; deploying one or more worker nodes based on the control plane configuration, and deploying one or more workloads identified by the workload configuration parameters on the one or more worker nodes.

Classes IPC  ?

  • G06F 8/60 - Déploiement de logiciel
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau

28.

SPLIT CONTROL PLANE FOR PRIVATE MOBILE NETWORK

      
Numéro d'application US2023031449
Numéro de publication 2024/049853
Statut Délivré - en vigueur
Date de dépôt 2023-08-29
Date de publication 2024-03-07
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Srinivas, Anand
  • Gao, Xiao, H.
  • Naik, Sameer

Abrégé

Some embodiments of the invention provide a method for implementing a software-defined private mobile network (SD-PMN) for an entity. At a physical location of the entity, the method deploys a first set of control plane components for the SD-PMN, the first set of control plane components including a security gateway, a user-plane function (UPF), an AMF (access and mobility management function), and an SMF (session management function). At an SD-WAN (software-defined wide area network) PoP (point of presence) belonging to a provider of the SD- PMN, the method deploys a second set of control plane components for the SD-PMN that includes a subscriber database that stores data associated with users of the SD-PMN. The method uses an SD-WAN edge router located at the physical location of the entity and a SD-WAN gateway located at the SD-WAN PoP to establish a connection from the physical location of the entity to the SD- WAN PoP.

Classes IPC  ?

  • H04W 84/04 - Réseaux à grande échelleRéseaux fortement hiérarchisés
  • H04L 41/0668 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau par sélection dynamique des éléments du réseau de récupération, p. ex. le remplacement par l’élément le plus approprié après une défaillance
  • H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
  • H04L 47/24 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/0805 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité
  • H04W 88/00 - Dispositifs spécialement adaptés aux réseaux de télécommunications sans fil, p. ex. terminaux, stations de base ou points d'accès
  • H04W 88/16 - Dispositions de passerelles

29.

DETECTING ANOMALIES IN A DISTRIBUTED APPLICATION

      
Numéro d'application 18488707
Statut En instance
Date de dépôt 2023-10-17
Date de la première publication 2024-02-08
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Dekel, Edo Yacov
  • Helman, Haim

Abrégé

Anomalies are detected in a distributed application that runs on a plurality of nodes to execute at least first and second workloads. The method of detecting anomalies includes collecting first network traffic data of the first workload and second network traffic data of the second workload during a first period of execution of the first and second workloads, collecting third network traffic data of the first workload and fourth network traffic data of the second workload during a second period of execution of the first and second workloads, and detecting an anomaly in the distributed application based on a comparison of the third network traffic data against the first network traffic data or a comparison of the fourth network traffic data against the second network traffic data. Anomalies may also be detected by comparing network traffic data of two groups of containers executing the same workload.

Classes IPC  ?

  • H04L 67/1029 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués en utilisant des données liées à l'état des serveurs par un répartiteur de charge
  • H04L 67/1031 - Commande du fonctionnement des serveurs par un répartiteur de charge, p. ex. en ajoutant ou en supprimant de serveurs qui servent des requêtes
  • H04L 43/062 - Génération de rapports liés au trafic du réseau
  • H04L 47/783 - Allocation distribuée des ressources, p. ex. courtiers en bande passante
  • H04L 43/04 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux
  • H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p. ex. la mémoire disponible ou la charge de travail

30.

OFFLOADING STATEFUL SERVICES FROM GUEST MACHINES TO HOST RESOURCES

      
Numéro d'application US2023023694
Numéro de publication 2024/025648
Statut Délivré - en vigueur
Date de dépôt 2023-05-26
Date de publication 2024-02-01
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Li, Peng
  • Yang, Guolin
  • Doshi, Ronak
  • Ang, Boon S.
  • Jiang, Wenyi

Abrégé

Some embodiments of the invention provide a method for offloading one or more data message processing services from a machine executing on a host computer. The method is performed by the machine. The method uses a set of virtual resources allocated to the machine to perform a set of services for a first set of data messages belonging to a particular data message flow. The method determines that for a second set of data messages belonging to the particular data message flow, the set of services should be performed by a virtual network interface card (VNIC) that executes on the host computer and is attached to the machine. Based on the determination, the method directs the VNIC to perform the set of services for the second set of data messages. The VNIC uses resources of the host computer to perform the set of services for the second set of data messages.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

31.

TELECOMMUNICATIONS INFRASTRUCTURE GENERATION AND PROVISIONING FOR TRANSPORT NETWORKS

      
Numéro d'application US2023023698
Numéro de publication 2024/025649
Statut Délivré - en vigueur
Date de dépôt 2023-05-26
Date de publication 2024-02-01
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Cionca, Victor
  • Pannem, Hemanth, Kumar
  • Sathyanarayan, Akshatha
  • Baweja, Archit
  • Lee, Ki, Suh
  • Hegde, Sacheth
  • O'Shea, Donna

Abrégé

Some embodiments of the invention provide a method for defining a telecommunications network deployment for a particular geographic region that includes of a set of sub-regions. The telecommunications network including an access network, an edge network, and a core network. The method is performed for each sub-region in the set of sub-regions. The method determines population density of UEs (user equipment) within the sub-region. Based on the determined population density, the method identifies an area type for the sub-region from a set of area types. The method simulates performance of the telecommunications network to explore, based on the identified area type, multiple configurations for access nodes that connect the UEs to the telecommunications network, each configuration in the multiple configurations indicating (1) a number of access nodes to be included in the telecommunications network deployment and (2) locations at which each access node is to be deployed. The method selects a particular configuration for access nodes from the multiple configurations for use in defining the telecommunications network deployment.

Classes IPC  ?

  • H04L 41/084 - Configuration en utilisant des informations préexistantes, p. ex. en utilisant des gabarits ou en copiant à partir d’autres éléments

32.

WORKLOAD PLACEMENT FOR VIRTUAL GPU ENABLED SYSTEMS

      
Numéro d'application 18483100
Statut En instance
Date de dépôt 2023-10-09
Date de la première publication 2024-02-01
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Sivaraman, Hari
  • Kurkure, Uday Pundalik
  • Vu, Lan

Abrégé

Disclosed are aspects of workload selection and placement in systems that include graphics processing units (GPUs) that are virtual GPU (vGPU) enabled. In some aspects, workloads are assigned to virtual graphics processing unit (vGPU)-enabled graphics processing units (GPUs). A number of vGPU placement neural networks are trained to maximize a composite efficiency metric based on workload data and GPU data for the plurality of vGPU placement models. A combined neural network selector is generated using the vGPU placement neural networks, and utilized to assign a workload to a vGPU-enabled GPU.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • G06F 9/54 - Communication interprogramme
  • G06F 9/30 - Dispositions pour exécuter des instructions machines, p. ex. décodage d'instructions
  • G06N 3/045 - Combinaisons de réseaux

33.

AUTOMATING SECURED DEPLOYMENT OF CONTAINERIZED WORKLOADS ON EDGE DEVICES

      
Numéro d'application US2023011563
Numéro de publication 2024/025617
Statut Délivré - en vigueur
Date de dépôt 2023-01-25
Date de publication 2024-02-01
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Aygar, Erol
  • Drew, Margaret Natasha
  • Peek, Mark
  • Beveridge, Daniel
  • Singwi, Raunak Ravindra
  • Daw, Nilanjan
  • Pareek, Pranay
  • Veeraswamy, Sairam
  • Raghunathan, Amarnath

Abrégé

Computer-implemented methods, media, and systems for automating secured deployment of containerized workloads on edge devices are disclosed. One example computer-implemented method includes receiving, by a software defined wide area network (SD-WAN) edge device and from a remote manager, resource quotas for a compute service to be enabled at the SD-WAN edge device. Pre-deployment sanity checks are performed by confirming availability of resources satisfying the resource quotas, where the resources are at the SD-WAN edge device. In response to the confirmation of the availability of resources satisfying the resource quotas, one or more security constructs are set up to isolate SD-WAN network functions at the SD-WAN edge device from the compute service at the SD-WAN edge device. The compute service is attached to a SD-WAN network by the SD-WAN edge device. An acknowledgement that the compute service is enabled at the SD-WAN edge device is sent to the remote manager.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p. ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
  • H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p. ex. entités SDN ou NFV
  • H04L 41/5051 - Service à la demande, p. ex. définition et déploiement des services en temps réel
  • H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p. ex. la mise en œuvre du service par configuration automatique des composants réseau
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

34.

PRIVATE ETHERNET OVERLAY NETWORKS OVER A SHARED ETHERNET IN A VIRTUAL ENVIRONMENT

      
Numéro d'application 18375907
Statut En instance
Date de dépôt 2023-10-02
Date de la première publication 2024-01-25
Propriétaire Nicira, Inc. (USA)
Inventeur(s) Dalal, Anupam

Abrégé

A system for private networking within a virtual infrastructure is presented. The system includes a virtual machine (VM) in a first host, the VM being associated with a first virtual network interface card (VNIC), a second VM in a second host, the second VM being associated with a second VNIC, the first and second VNICs being members of a fenced group of computers that have exclusive direct access to a private virtual network, wherein VNICs outside the fenced group do not have direct access to packets on the private virtual network, a filter in the first host that encapsulates a packet sent on the private virtual network from the first VNIC, the encapsulation adding to the packet a new header and a fence identifier for the fenced group, and a second filter in the second host that de-encapsulates the packet to extract the new header and the fence identifier.

Classes IPC  ?

  • H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 45/44 - Routage distribué
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 49/00 - Éléments de commutation de paquets

35.

METHOD TO REALIZE SCANNER REDIRECTION BETWEEN A CLIENT AND AN AGENT USING DIFFERENT SCANNING PROTOCOLS

      
Numéro d'application US2023011293
Numéro de publication 2024/019772
Statut Délivré - en vigueur
Date de dépôt 2023-01-20
Date de publication 2024-01-25
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Tu, Zhongzheng
  • Huang, Weigang
  • Huo, Huiyong
  • Zang, Mingsheng
  • Zhang, Yueting

Abrégé

A scanner redirection method includes the steps of: receiving from an application running on a host server, a request for scanner properties; acquiring properties of the physical scanner; converting the properties of the physical scanner that are described according to a first scanning protocol to properties of the physical scanner that are described according to a second scanning protocol; transmitting the properties of the physical scanner that are described according to the second scanning protocol to the application; in response to detecting a user selection made on an image of a user interface, transmitting the user selection to the application; and in response to the user selection, receiving from the application, a request for a scanned image, and transmitting a request to an image capture core to acquire the scanned image from the physical scanner.

Classes IPC  ?

  • G06F 8/76 - Adaptation d’un code de programme pour fonctionner dans un environnement différentPortage
  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06F 9/54 - Communication interprogramme
  • H04L 67/025 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP] pour la commande à distance ou la surveillance à distance des applications
  • H04L 67/04 - Protocoles spécialement adaptés aux terminaux ou aux réseaux à capacités limitéesProtocoles spécialement adaptés à la portabilité du terminal
  • H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]
  • H04N 1/04 - Dispositions de balayage
  • H04N 1/327 - Amorçage, continuation ou cessation d'une communication à mode uniqueÉchange de signaux à cet effet

36.

A GENERAL NETWORK POLICY FOR NAMESPACES

      
Numéro d'application US2023027842
Numéro de publication 2024/019947
Statut Délivré - en vigueur
Date de dépôt 2023-07-14
Date de publication 2024-01-25
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Liu, Danting
  • Sun, Qian
  • Shen, Jianjun
  • Liu, Wenfeng
  • Han, Donghai

Abrégé

Disclosed herein is a system and method for controlling network traffic among namespaces in which various entities, such as virtual machines, pod virtual machines, and a container orchestration system, such as Kubernetes, reside and operate. The entities have access to a network that includes one or more firewalls. The traffic that is permitted to flow over the network among and between the namespaces is defined by a security policy definition. The security policy definition is posted to a master node in a supervisor cluster that supports and provisions the namespaces. The master node invokes a network manager to generate a set of firewall rules and program the one or more firewalls in the network to enforce the rules.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles

37.

EFFICIENT PACKET CLASSIFICATION FOR DYNAMIC CONTAINERS

      
Numéro d'application 18372201
Statut En instance
Date de dépôt 2023-09-25
Date de la première publication 2024-01-25
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Parthasarathy, Mohan
  • Jain, Jayant
  • Hong, Xinhua
  • Sengupta, Anirban

Abrégé

A novel algorithm for packet classification that is based on a novel search structure for packet classification rules is provided. Addresses from all the containers are merged and maintained in a single Trie. Each entry in the Trie has additional information that can be traced back to the container from where the address originated. This information is used to keep the Trie in sync with the containers when the container definition dynamically changes.

Classes IPC  ?

  • H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes
  • H04L 49/00 - Éléments de commutation de paquets
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/745 - Recherche de table d'adressesFiltrage d'adresses
  • H04L 45/48 - Calcul de l'arbre de routage

38.

END USER PRIVACY MANAGEMENT OF ACCESSED DEVICE DATA

      
Numéro d'application US2023011296
Numéro de publication 2024/019773
Statut Délivré - en vigueur
Date de dépôt 2023-01-20
Date de publication 2024-01-25
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Sahani, Hemant
  • Krasko, Phillip Charles
  • Kelley, Scott Harlow

Abrégé

Disclosed are various examples for controlling and managing data access to increase user privacy and minimize intentional or inadvertent misuse of accessed information. Upon detecting a request for an administrator review of a user client device, permission for administrator access can be obtained from a user associated with the user client device. The client device identifier can be obfuscated such that the administrator accessing the data is not provided the actual device identifier. An administrator review session between the user client device and an administrator client device can be established to allow the administrator client device access to the permitted client device data.

Classes IPC  ?

39.

SHARING NETWORK MANAGER BETWEEN MULTIPLE TENANTS

      
Numéro d'application US2023022191
Numéro de publication 2024/019791
Statut Délivré - en vigueur
Date de dépôt 2023-05-14
Date de publication 2024-01-25
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Palavalli, Amarnath
  • Muppala, Suresh
  • Ghannadian, Farzad
  • Singh, Sukhdev
  • Margarian, Pavlush

Abrégé

Some embodiments provide a method for one of multiple shared API processing services in a container cluster that implements a network policy manager shared between multiple tenants. The method receives a configuration request from a particular tenant to modify a logical network configuration for the particular tenant. Configuration requests from the plurality of tenants are balanced across the plurality of shared API processing services. Based on the received configuration request, the method posts a logical network configuration change to a configuration queue in the cluster. The configuration queue is dedicated to the logical network of the particular tenant. Services are instantiated separately in the container cluster for each tenant to distribute configuration changes from the respective configuration queues for the tenants to datacenters that implement the tenant logical networks such that configuration changes for one tenant do not slow down processing of configuration changes for other tenants.

Classes IPC  ?

  • H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
  • H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles
  • H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p. ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
  • H04L 41/342 - Canaux de signalisation pour la communication dédiée à la gestion du réseau entre entités virtuelles, p. ex. orchestrateurs, SDN ou NFV
  • H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p. ex. entités SDN ou NFV

40.

METHOD FOR MODIFYING AN SD-WAN USING METRIC-BASED HEAT MAPS

      
Numéro d'application US2023025795
Numéro de publication 2024/019853
Statut Délivré - en vigueur
Date de dépôt 2023-06-21
Date de publication 2024-01-25
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ramaswamy, Navaneeth Krishnan
  • Srinivasan, Arun Kumar

Abrégé

Some embodiments provide a method for using a heat map to modify an SD-WAN (software-defined wide-area network) deployed for a set of geographic locations. From a set of managed forwarding elements (MFEs) that forward multiple data message flows through the SD- WAN to a set of destination clusters, the method collects multiple metrics associated with the multiple data message flows. Based on the collected multiple metrics, the method generates a heat map that accounts for (1) the multiple data message flows, (2) locations of the set of MFEs, and (3) locations of the one or more destination clusters. The method uses the generated heat map to identify at least one modification to make to the SD-WAN to improve forwarding of the multiple data message flows.

Classes IPC  ?

  • H04L 41/122 - Découverte ou gestion des topologies de réseau des topologies virtualisées, p. ex. les réseaux définis par logiciel [SDN] ou la virtualisation de la fonction réseau [NFV]
  • H04L 41/14 - Analyse ou conception de réseau
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
  • H04L 43/026 - Capture des données de surveillance en utilisant l’identification du flux
  • H04L 43/0888 - Débit
  • H04L 43/091 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en mesurant la contribution de chaque composant du réseau au niveau du service réel
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance

41.

CONGESTION-AWARE LOAD BALANCING IN DATA CENTER NETWORKS

      
Numéro d'application 18370861
Statut En instance
Date de dépôt 2023-09-20
Date de la première publication 2024-01-18
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Hira, Mukesh
  • Katta, Naga

Abrégé

Example methods are provided for a first switch to perform congestion-aware load balancing in a data center network. The method may comprise: receiving probe packets from multiple next-hop second switches that connect the first switch with a third switch via multiple paths. The method may also comprise: processing congestion state information in each probe packet to select a selected next-hop second switch from the multiple next-hop second switches, the selected next-hop second switch being associated with a least congested path from the first switch to the third switch. The method may further comprise: in response to receiving data packets from a fourth switch that are destined for a destination connected with the third switch, sending the data packets to the selected next-hop second switch such that the data packets travel to the third switch along the least congested path.

Classes IPC  ?

  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion
  • H04L 41/0896 - Gestion de la bande passante ou de la capacité des réseaux, c.-à-d. augmentation ou diminution automatique des capacités
  • H04L 43/10 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route

42.

PARALLELIZING DATA PROCESSING UNIT PROVISIONING

      
Numéro d'application US2023011909
Numéro de publication 2024/015124
Statut Délivré - en vigueur
Date de dépôt 2023-01-30
Date de publication 2024-01-18
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ramachandra, Karthik
  • Haryadi, Aravinda
  • He, Lingyuan

Abrégé

Disclosed are various embodiments for coordinating the rollback of installed operating systems to an earlier, consistent state. In response to determining that a data processing unit (DPU) installed on a computing device has failed to successfully boot a first time, the computing device can be power cycled for a first time. In response to determining that the DPU has successfully booted a second time, a first version of a host operating system can be booted. A DPU operating system (DPU OS) is then booted from a DPU alternate boot image. In response to determining that the first version of the host operating system fails to match an executing version of the DPU OS, the computing device can be power cycled a second time and the host operating system is then booted from a host alternate boot image.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 8/00 - Dispositions pour ingénierie logicielle
  • G06F 15/177 - Commande d'initialisation ou de configuration

43.

DETECTING FAILURE OF LAYER 2 SERVICE USING BROADCAST MESSAGES

      
Numéro d'application 18370006
Statut En instance
Date de dépôt 2023-09-19
Date de la première publication 2024-01-11
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Boutros, Sami
  • Tan, Stephen
  • Mishra, Rahul
  • Mundaragi, Kantesh
  • Jain, Jayant
  • Naveen, Akhila

Abrégé

Some embodiments provide a method for detecting a failure of a layer 2 (L2) bump-in-the-wire service at a device. In some embodiments, the device sends heartbeat signals to a second device connected to L2 service nodes in order to detect failure of the L2 service (e.g., a failure of all the service nodes). In some embodiments, the heartbeat signals are unidirectional heartbeat signals (e.g., a unidirectional bidirectional-forwarding-detection (BFD) session) sent from each device to the other. The heartbeat signals, in some embodiments, use a broadcast MAC address in order to reach the current active L2 service node in the case of a failover (i.e., an active service node failing and a standby service node becoming the new active service node). The unidirectional heartbeat signals are also used, in some embodiments, to decrease the time between a failover and data messages being forwarded to the new active service node.

Classes IPC  ?

  • H04L 43/0805 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité
  • H04L 41/0668 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau par sélection dynamique des éléments du réseau de récupération, p. ex. le remplacement par l’élément le plus approprié après une défaillance
  • H04L 43/10 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route

44.

LOGICAL ROUTER WITH MULTIPLE ROUTING COMPONENTS

      
Numéro d'application 18369605
Statut En instance
Date de dépôt 2023-09-18
Date de la première publication 2024-01-04
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Zhang, Ronghua
  • Chandrashekhar, Ganesan
  • Ravinoothala, Sreeram Kumar
  • Fan, Kai-Wei

Abrégé

Some embodiments provide a method for handling failure at one of several peer centralized components of a logical router. At a first one of the peer centralized components of the logical router, the method detects that a second one of the peer centralized components has failed. In response to the detection, the method automatically identifies a network layer address of the failed second peer. The method assumes responsibility for data traffic to the failed peer by broadcasting a message on a logical switch that connects all of the peer centralized components and a distributed component of the logical router. The message instructs recipients to associate the identified network layer address with a data link layer address of the first peer centralized component.

Classes IPC  ?

  • H04L 49/25 - Routage ou recherche de route dans une matrice de commutation
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
  • H04L 69/321 - Protocoles de communication inter-couches ou définitions d'unité de données de service [SDU]Interfaces entre les couches
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 41/5041 - Gestion des services réseau, p. ex. en assurant une bonne réalisation du service conformément aux accords caractérisée par la relation temporelle entre la création et le déploiement d’un service
  • H04L 45/74 - Traitement d'adresse pour le routage
  • H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p. ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande
  • H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire
  • H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 49/00 - Éléments de commutation de paquets
  • H04L 49/90 - Dispositions de mémoires tampon
  • H04L 45/586 - Association de routeurs de routeurs virtuels
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 45/42 - Routage centralisé
  • H04L 45/44 - Routage distribué
  • H04L 41/0654 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau
  • H04L 45/122 - Évaluation de la route la plus courte en minimisant les distances, p. ex. en sélectionnant une route avec un nombre minimal de sauts
  • H04L 45/745 - Recherche de table d'adressesFiltrage d'adresses
  • H04L 61/2585 - Traversée NAT au travers de la passerelle de niveau applicatif [ALG]
  • H04L 41/14 - Analyse ou conception de réseau
  • H04L 69/326 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche transport [couche OSI 4]
  • H04L 69/329 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche application [couche OSI 7]
  • H04L 47/19 - Commande de fluxCommande de la congestion au niveau des couches au-dessus de la couche réseau
  • H04L 45/302 - Détermination de la route basée sur la qualité de service [QoS] demandée
  • H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
  • H04L 43/106 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route en utilisant des informations liées au temps dans des paquets, p. ex. en ajoutant des horodatages
  • H04L 49/354 - Interrupteurs spécialement adaptés à des applications spécifiques pour la prise en charge des réseaux locaux virtuels [VLAN]
  • H04L 67/1038 - Dispositions de répartition de charge pour éviter une seule route à travers un répartiteur de charge

45.

FLOW GENERATION FROM SECOND LEVEL CONTROLLER TO FIRST LEVEL CONTROLLER TO MANAGED SWITCHING ELEMENT

      
Numéro d'application 18244243
Statut En instance
Date de dépôt 2023-09-09
Date de la première publication 2023-12-28
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Koponen, Teemu
  • Casado, Martin
  • Thakkar, Pankaj
  • Zhang, Ronghua
  • Wendlandt, Daniel J.

Abrégé

A network system that includes a first set of network hosts in a first domain and a second set of network hosts in a second domain. Within each of the domains, the system includes several edge switching elements (SEs) that each couple to the network hosts and forward network data to and from the set of network hosts. Within the first domain, the system includes (i) an interior SE that couples to a particular edge SE in order to receive network data for forwarding from the edge SE when the edge SE does not recognize a destination location of the network data and (ii) an interconnection SE that couples to the interior SE, the edge SE, and the second domain through an external network. When the edge SE receives network data with a destination address in the second domain, it forwards the network data directly to the interconnection SE.

Classes IPC  ?

  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 41/044 - Architectures ou dispositions de gestion de réseau comprenant des structures de gestion hiérarchisées

46.

ACCELERATING DATA MESSAGE CLASSIFICATION WITH SMART NICS

      
Numéro d'application US2023022192
Numéro de publication 2023/249748
Statut Délivré - en vigueur
Date de dépôt 2023-05-14
Date de publication 2023-12-28
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Vargaftik, Shay
  • Markuze, Alex
  • Ben-Itzhak, Yaniv
  • Golikov, Igor
  • Yanai, Avishay

Abrégé

Some embodiments provide a method for performing data message processing at a smart NIC of a computer that executes a software forwarding element (SFE). The method determines whether a received data message matches an entry in a data message classification cache stored on the smart NIC based on data message classification results of the SFE. When the data message matches an entry, the method determines whether the matched entry is valid by comparing a timestamp of the entry to a set of rules stored on the smart NIC. When the matched entry is valid, the method processes the data message according to the matched entry without providing the data message to the SFE executing on the computer.

Classes IPC  ?

  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/74 - Traitement d'adresse pour le routage
  • H04L 49/90 - Dispositions de mémoires tampon

47.

VERSION CONTROL INTERFACE SUPPORTING TIME TRAVEL ACCESS OF A DATA LAKE

      
Numéro d'application US2023011484
Numéro de publication 2023/249673
Statut Délivré - en vigueur
Date de dépôt 2023-01-24
Date de publication 2023-12-28
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Gupta, Abhishek
  • Karamanolis, Christos
  • Spillane, Richard P.
  • Nozhchev, Marin

Abrégé

A version control interface provides for time travel with metadata management under a common transaction domain as the data. Examples generate a time-series of master branch snapshots for data objects stored in a data lake, with the snapshot comprising a tree data structure such as a hash tree and associated with a time indication. Readers select a master branch snapshot from the time-series, based on selection criteria (e.g., time) and use references in the selected master branch snapshot to read data objects from the data lake. This provides readers with a view of the data as of a specified time.

Classes IPC  ?

  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
  • G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
  • G06F 16/23 - Mise à jour
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/21 - Conception, administration ou maintenance des bases de données
  • G06F 16/18 - Types de systèmes de fichiers

48.

ROUTING BASED ON GEOLOCATION COSTS

      
Numéro d'application US2023022616
Numéro de publication 2023/239536
Statut Délivré - en vigueur
Date de dépôt 2023-05-18
Date de publication 2023-12-14
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Kotrabasappa, Santosh, Pallagatti
  • Goliya, Abhishek
  • Liyon, Sajan
  • Veeraswamy, Sairam
  • Mundhra, Sumit

Abrégé

Some embodiments provide a method of implementing context-aware routing for a software-defined wide-area network, at an SD-WAN edge forwarding element (FE) located at a branch network connected to the SD-WAN. The method receives, from an SD-WAN controller, geolocation route weights for each of multiple cloud datacenters across which a set of application resources is distributed. The application resources are all reachable at a same virtual network address. For each of the cloud datacenters, the method installs a route for the virtual network address between the branch network and the cloud datacenter. The routes have different total costs based at least in part on the geolocation metrics received from the SD-WAN controller. The SD-WAN edge FE selects between the routes to establish connections to the set of application resources.

Classes IPC  ?

  • H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p. ex. entités SDN ou NFV
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 45/12 - Évaluation de la route la plus courte
  • H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée

49.

AUTONOMOUS CLUSTERS IN A VIRTUALIZATION COMPUTING ENVIRONMENT

      
Numéro d'application US2023024070
Numéro de publication 2023/235438
Statut Délivré - en vigueur
Date de dépôt 2023-05-31
Date de publication 2023-12-07
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Oki, Brian Masao
  • Hicken, George Gregory
  • Hira, Mukesh
  • Livshin, Leonid
  • Loboshki, Ivaylo Vladimirov
  • Radev, Ivaylo Radoslavov
  • Shah, Alkesh
  • Shen, Jianjun
  • Srivastava, Abhishek Ajit
  • Roussos, Konstantinos
  • Lukanov, Stanimir Plamenov
  • Donchevski, Anton Valentinov
  • Dimitrov, Georgi Lyubomirov

Abrégé

Systems, apparatus, articles of manufacture, and methods are disclosed to manage a deployment of virtual machines in a cluster by, in a first host of a plurality of hosts, monitor, with first control plane services, an availability of second control plane services at a second host of the plurality of hosts, wherein the first control plane services and the second control plane services support implementation of application programming interface (API) requests in association with managing a cluster, after a determination that the second control plane services at the second host is not available, assign the first control plane services at the first host to operate in place of the second control plane services at the second host, and in the first host, assign, via the first control plane services at the first host, resources of one or more hosts in the cluster to support the API request.

Classes IPC  ?

  • G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p. ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
  • G06F 11/30 - Surveillance du fonctionnement
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

50.

DATA LAKE WITH TRANSACTIONAL SEMANTICS

      
Numéro d'application US2023011483
Numéro de publication 2023/234982
Statut Délivré - en vigueur
Date de dépôt 2023-01-24
Date de publication 2023-12-07
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Karamanolis, Christos
  • Gupta, Abhishek
  • Spillane, Richard P.
  • Nozhchev, Marin

Abrégé

A version control interface provides for accessing a data lake with transactional semantics. Examples generate a plurality of tables for data objects stored in the data lake. The tables each comprise a set of name fields and map a space of columns or rows to a set of the data objects. Transactions read and write data objects and may span a plurality of tables with properties of atomicity, consistency, isolation, durability (ACID). Performing the transaction comprises: accumulating transaction-incomplete messages, indicating that the transaction is incomplete, until a transaction-complete message is received, indicating that the transaction is complete. Upon this occurring, a master branch is updated to reference the data objects according to the transaction-incomplete messages and the transaction-complete message. Tables may be grouped into data groups that provide atomicity boundaries so that different groups may be served by different master branches, thereby improving the speed of master branch updates.

Classes IPC  ?

  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
  • G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
  • G06F 16/23 - Mise à jour
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/21 - Conception, administration ou maintenance des bases de données
  • G06F 16/18 - Types de systèmes de fichiers

51.

LOGICAL MEMORY ADDRESSING BY SMART NIC ACROSS MULTIPLE DEVICES

      
Numéro d'application US2023022193
Numéro de publication 2023/229862
Statut Délivré - en vigueur
Date de dépôt 2023-05-14
Date de publication 2023-11-30
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Markuze, Alex
  • Vargaftik, Shay
  • Golikov, Igor
  • Ben-Itzhak, Yaniv
  • Yanai, Avishay

Abrégé

Some embodiments provide a method for sending data messages at a network interface controller, NIC, (100) of a computer (135). From a network stack executing on the computer (135), the method receives (i) a header for a data message to send and (ii) a logical memory (155) address of a payload for the data message. The method translates the logical memory address into a memory address for accessing a particular one of multiple devices (115, 140, 150) connected to the computer. The method reads payload data from the memory address of the particular device (115, 140,150). The method sends the data message with the header received from the network stack and the payload data read from the particular device (115, 140, 150).

Classes IPC  ?

  • G06F 13/12 - Commande par programme pour dispositifs périphériques utilisant des matériels indépendants du processeur central, p. ex. canal ou processeur périphérique
  • G06F 13/16 - Gestion de demandes d'interconnexion ou de transfert pour l'accès au bus de mémoire
  • G06F 13/38 - Transfert d'informations, p. ex. sur un bus
  • G06F 13/40 - Structure du bus
  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 49/901 - Dispositions de mémoires tampon en utilisant un descripteur de stockage, p. ex. des pointeurs de lecture ou d'écriture
  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement

52.

Minimizing traffic drop when rekeying in a distributed security group

      
Numéro d'application 18358345
Numéro de brevet 12166874
Statut Délivré - en vigueur
Date de dépôt 2023-07-25
Date de la première publication 2023-11-30
Date d'octroi 2024-12-10
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Xu, Gang
  • Qian, Bin
  • Chandrashekhar, Ganesan
  • Zan, Bin

Abrégé

Exemplary methods, apparatuses, and systems include a central controller receiving a request to generate a new encryption key for a security group to replace a current encryption key for the security group. The security group includes a plurality of hosts that each encrypt and decrypt communications using the current encryption key. In response to receiving the request, the central controller determines that a threshold period following generation of the current encryption key has not expired. In response to determining that the threshold period has not expired, the central controller delays execution of the request until the expiration of the threshold period. In response to the expiration of the threshold period, the central controller executes the request by generating the new encryption key, storing a time of creation of the new encryption key, and transmitting the new encryption key to the plurality of hosts.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/12 - Dispositifs de chiffrement d'émission et de réception synchronisés ou initialisés d'une manière particulière
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

53.

IN-MEMORY SCANNING FOR FILELESS MALWARE ON A HOST DEVICE

      
Numéro d'application US2023011907
Numéro de publication 2023/219666
Statut Délivré - en vigueur
Date de dépôt 2023-01-30
Date de publication 2023-11-16
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Chaudhari, Kedar Bhalchandra
  • Gokhale, Pranav
  • Arve, Mandar

Abrégé

The disclosure herein describes the processing of malware scan requests from VCIs by an anti-malware scanner (AMS) on a host device. A malware scan request is received by the AMS from a VCI, the malware scan request including script data of a script from a memory buffer of the VCI. The AMS scans the script data of the malware scan request, outside of the VCI, and determines that the script includes malware. The AMS notifies the VCI that the script includes malware, whereby the VCI is configured to prevent execution of the script or take other mitigating action. The AMS provides scanning for fileless malware to VCIs on a host device without consuming or otherwise affecting resources of the VCIs.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06F 12/08 - Adressage ou affectationRéadressage dans des systèmes de mémoires hiérarchiques, p. ex. des systèmes de mémoire virtuelle

54.

NETWORK MAPPING SYSTEM

      
Numéro d'application 18224474
Statut En instance
Date de dépôt 2023-07-20
Date de la première publication 2023-11-09
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Nagarkar, Amardeep
  • Sonawane, Shivraj Shahajirao
  • Kulkarni, Shantanu
  • Annadata, Sarat Chandra
  • Vaidya, Sachin Mohan

Abrégé

Some embodiments provide a method for generating a multi-layer network map from network configuration data. The method receives network configuration data that defines network components and connections between the network components for a network that spans one or more datacenters. Based on the received network configuration data, the method generates multiple data layers for a multi-layer interactive map of the network. Different data layers include different network components and connections. The method generates a visual representation of the network for each data layer. Each visual representation includes a map of the network at a different level of hierarchy.

Classes IPC  ?

  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
  • H04L 41/12 - Découverte ou gestion des topologies de réseau

55.

AUTHENTICATION ORCHESTRATION ACROSS REMOTE APPLIANCES

      
Numéro d'application US2023017221
Numéro de publication 2023/211636
Statut Délivré - en vigueur
Date de dépôt 2023-03-31
Date de publication 2023-11-02
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Lukanov, Stanimir
  • Mazdrashki, Kamen
  • Dimitrov, Georgi Lyubomirov
  • Raychev, Dimo
  • Lekov, Georgi

Abrégé

Bootstrapping a new remote appliance based on a request received at a main appliance based on established trust between the two appliances can be implemented as computer-implemented methods, media, and systems. A request is received at an authentication orchestrator at the main appliance to perform an operation requested by a user for execution on a remote appliance. The authentication orchestrator at the main appliance obtains an authentication token issued by an identity provider at the main appliance for the user associated with the request. The authentication orchestrator requests to exchange the authentication token issued by the identity provider at the main appliance for a new authentication token that is issued by an identity provider at the remote appliance. The authentication orchestrator at the main appliance initiates an authentication of the user at an appliance manager at the remote appliance based on providing the new authentication token.

Classes IPC  ?

  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
  • H04W 12/06 - Authentification
  • G06F 21/41 - Authentification de l’utilisateur par une seule ouverture de session qui donne accès à plusieurs ordinateurs
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

56.

ON-DEMAND REMOTE APPLICATIONS

      
Numéro d'application US2023016782
Numéro de publication 2023/204943
Statut Délivré - en vigueur
Date de dépôt 2023-03-29
Date de publication 2023-10-26
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ulatoski, Jeffrey Paul
  • Choudhary, Jairam

Abrégé

Techniques for delivering remote applications to servers in an on-demand fashion (i.e., as end-users need them) are provided. In one set of embodiments, these techniques include packaging the installed contents (e.g., executable code and configuration data) of the remote applications into containers, referred to as application packages, that are placed on shared storage and dynamically attaching (i.e., mounting) an application package to a server at a time an end-user requests access a remote application in that package, thereby enabling the server to launch the application.

Classes IPC  ?

  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06F 8/60 - Déploiement de logiciel

57.

HOSTING DPU MANAGEMENT OPERATING SYSTEM USING DPU SOFTWARE STACK

      
Numéro d'application US2023014758
Numéro de publication 2023/196074
Statut Délivré - en vigueur
Date de dépôt 2023-03-07
Date de publication 2023-10-12
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Warkentin, Andrei
  • Kotian, Sunil
  • Laplace, Cyprien
  • Hiriyuru, Shruthi
  • Duchesne, Regis
  • Li, Ye
  • Fainkichen, Alexander

Abrégé

Disclosed are various examples of hosting a data processing unit (DPU) management operating system using an operating system software stack of a preinstalled DPU operating system. The preinstalled DPU operating system of the DPU is leveraged to provide a virtual machine environment. A DPU management operating system is executed within the virtual machine environment of the preinstalled DPU operating system. A third-party DPU function or a management service function is provided using the DPU hardware resources accessed through the DPU management operating system and the virtual machine environment.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 8/60 - Déploiement de logiciel
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

58.

CONTAINERIZED EXECUTION OF UNKNOWN FILES IN A DISTRIBUTED MALWARE DETECTION SYSTEM

      
Numéro d'application US2023014762
Numéro de publication 2023/196076
Statut Délivré - en vigueur
Date de dépôt 2023-03-07
Date de publication 2023-10-12
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Patil, Rayanagouda Bheemanagouda
  • Chaudhari, Kedar Bhalchandra
  • Sharma, Shivali
  • Gunda, Laxmikant Vithal
  • Gopalakrishnan, Sriram

Abrégé

A method for opening unknown files in a malware detection system, is provided. The method generally includes receiving a request to open a file classified as an unknown file, opening the file in a container, collecting at least one of a log of events carried out by the file or observed behavior traces of the file while open in the container, transmitting, to a file analzyer, at least one of the file, the log of events, or the behavior traces for static analysis, determining, a final verdict for the file, based on at least one of the file, the log of events, or the behavior traces, wherein the final verdict for the file is based on the static analysis or dynamic analysis of the file, and taking one or more actions based on a policy configured for the first endpoint and the final verdict.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

59.

AUTOMATED DISCOVERY OF VULNERABLE ENDPOINTS IN AN APPLICATION SERVER

      
Numéro d'application US2023014760
Numéro de publication 2023/196075
Statut Délivré - en vigueur
Date de dépôt 2023-03-07
Date de publication 2023-10-12
Propriétaire VMWARE, INC. (USA)
Inventeur(s) Proynov, Dimitar

Abrégé

The disclosure provides an approach for discovering vulnerable application server endpoints. Embodiments include retrieving, from an application server, an object representing a front controller of the application server. Embodiments include extracting, from the object, values for a plurality of variables. Embodiments include constructing, based on the values for the plurality of variables, one or more universal resource locators (URLs) corresponding to one or more methods of the front controller. Embodiments include sending one or more unauthenticated requests to one or more resources indicated by the one or more URLs. Embodiments include determining, based on a given response to a given unauthenticated request of the one or more unauthenticated requests, whether a given URL of the one or more URLs is vulnerable. Embodiments include performing one or more actions based on the determining of whether the given URL is vulnerable.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04L 43/50 - Disposition de test
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]

60.

MAPPING VLAN OF CONTAINER NETWORK TO LOGICAL NETWORK IN HYPERVISOR TO SUPPORT FLEXIBLE IPAM AND ROUTING CONTAINER TRAFFIC

      
Numéro d'application CN2022081683
Numéro de publication 2023/173404
Statut Délivré - en vigueur
Date de dépôt 2022-03-18
Date de publication 2023-09-21
Propriétaire
  • VMWARE INFORMATION TECHNOLOGY (CHINA) CO., LTD. (Chine)
  • VMWARE, INC. (USA)
Inventeur(s)
  • Shen, Jianjun
  • Gu, Ran
  • Jiang, Caixia
  • Fauser, Yves

Abrégé

Some embodiments of the invention provide a method for adding routable subnets to a logical network that connects multiple machines and is implemented by a software defined network (SDN). The method receives an intent-based API that includes a request to add a routable subnet to the logical network. The method defines (i) a VLAN (virtual local area network) tag associated with the routable subnet, (ii) a first identifier associated with a first logical switch to which at least a first machine in the multiple machines that executes a set of containers belonging to the routable subnet attaches, and (iii) a second identifier associated with a second logical switch designated for the routable subnet. The method generates an API call that maps the VLAN tag and the first identifier to the second identifier. The method provides the API call to a management and control cluster of the SDN to direct the management and control cluster to implement the routable subnet.

Classes IPC  ?

  • H04L 12/00 - Réseaux de données à commutation
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 61/5084 - Allocation d'adresse en assurant la mobilité des appareils
  • H04L 41/00 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets
  • H04L 61/5007 - Adresses de protocole Internet [IP]
  • H04L 61/2514 - Traduction d'adresses de protocole Internet [IP] entre adresses IP locales et globales

61.

REMEDIATION METHOD TO TRACE AND CLEAN UP MALICIOUS FILES IN A DISTRIBUTED MALWARE DETECTION SYSTEM

      
Numéro d'application US2023014403
Numéro de publication 2023/177534
Statut Délivré - en vigueur
Date de dépôt 2023-03-02
Date de publication 2023-09-21
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Patil, Rayanagouda Bheemanagouda
  • Gopalakrishnan, Sriram
  • Gokhale, Pranav

Abrégé

A method for locating malware in a malware detection system, is provided. The method generally includes storing, at a first endpoint, a mapping of a first file hash and a first file path for a first file classified as an unknown file, opening, at the first endpoint, the first file prior to determining whether the first file is benign or malicious, determining, at the first endpoint, a first verdict for the first file, the first verdict indicating the first file is benign or malicious, locating the first file using the mapping of the first file hash and the first file path, and taking one or more actions based on a policy configured for the first endpoint and the first verdict indicating the first file is benign or malicious.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

62.

Computing environment pooling

      
Numéro d'application 15886687
Numéro de brevet 11762706
Statut Délivré - en vigueur
Date de dépôt 2018-02-01
Date de la première publication 2023-09-19
Date d'octroi 2023-09-19
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Jarvis, Michael
  • Stokan, Mark
  • Lakin, Kenneth
  • Chan, Der Wei
  • Pama, Navdeep

Abrégé

Methods, systems, and computer-readable media that manage cloud computing environments. A pool manager creates a pool of cloud computing environments according to a pool specification specifying a headroom threshold of the pool. The pool manager receives, from a requester computer, a request to claim a cloud computing environment. The pool manager determines that one or more cloud computing environments are available. In response, the pool manager provides to the requesting computer credentials for accessing the cloud computing environment. The pool manager designates the cloud computing environment as claimed and unavailable to other requester computers until receiving a notification indicating that the cloud computing environment is unclaimed. The pool manager ensures that the correct number of environments are available on a pre-determined schedule.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

63.

PROVISIONING DPU MANAGEMENT OPERATING SYSTEMS

      
Numéro d'application US2023010839
Numéro de publication 2023/141069
Statut Délivré - en vigueur
Date de dépôt 2023-01-13
Date de publication 2023-07-27
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Warkentin, Andrei
  • Haryadi, Aravinda
  • He, Lingyuan
  • Boro, Suman
  • Ramachandra, Karthik
  • Gondi, Anjaneya Prasad
  • Voltz, Renaud

Abrégé

Provisioning a data processing unit (DPU) management operating system (OS). A management hypervisor installer executed on a host device launches or causes a server component to provide a management operating system (OS)installer image at a particular URI accessible over a network internal to the host device. A baseboard management controller (BMC) transfers the DPU management OS installer image to the DPU device. A volatile memory based virtual disk is created using the DPU management OS installer image. The DPU device is booted to a DPU management OS installer on the volatile memory based virtual disk. The DPU management OS installer installs a DPU management operating system to a nonvolatile memory of the DPU device on reboot of the DPU device.

Classes IPC  ?

64.

MANAGING IP ADDRESSES FOR DPDK ENABLED NETWORK INTERFACES FOR CLOUD NATIVE PODS

      
Numéro d'application 17703844
Statut En instance
Date de dépôt 2022-03-24
Date de la première publication 2023-07-27
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Lin, Xiaojun
  • Cui, Liang
  • Srinivasan, Aravind
  • Pannem, Hemanth Kumar
  • Peng, Wenwu
  • Xu, Hailing
  • Tie, Xiaoli

Abrégé

The present disclosure provides example computer-implemented method, medium, and system for managing IP addresses for DPDK enabled network interfaces for cloud native pods. One example method includes creating a pod of one or more containers, where the pod connects to multiple networks through multiple network interfaces. A poll mode driver (PMD) is attached to a first network interface of the multiple network interfaces, where the PMD enables one or more data plane development kit (DPDK) applications inside the pod to manage the first network interface. A first container network interface (CNI) is created to handle the DPDK enabled first network interface. A first Internet protocol (IP) address is allocated to the first network interface using the first CNI. The first IP address is passed to the one or more DPDK applications using the first CNI.

Classes IPC  ?

  • H04L 61/5007 - Adresses de protocole Internet [IP]
  • H04L 101/668 - Adresses de sous-réseaux du protocole Internet [IP]
  • H04L 61/5038 - Allocation d'adresse pour une utilisation locale, p. ex. dans des réseaux LAN ou USB, ou dans un réseau de contrôle [CAN]
  • H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]

65.

PREDICTIVE SCALING OF APPLICATION BASED ON TRAFFIC AT ANOTHER APPLICATION

      
Numéro d'application US2022039025
Numéro de publication 2023/140895
Statut Délivré - en vigueur
Date de dépôt 2022-08-01
Date de publication 2023-07-27
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Biswas, Sudipta
  • Das, Monotosh
  • Shaw, Hemant, Kumar
  • Chauhan, Shubham

Abrégé

Some embodiments provide a method that identifies a first number of requests received at a first application. Based on the first number of requests received at the first application, the method determines that a second application that processes requests after processing by the first application requires additional resources to handle a second number of requests that will be received at the second application. The method increases the amount of resources available to the second application prior to the second application receiving the second number of requests.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p. ex. la mémoire disponible ou la charge de travail

66.

PROCESSING QUEUE ASSIGNMENT BASED ON A FLAG IN A GENEVE HEADER

      
Numéro d'application US2023011051
Numéro de publication 2023/141157
Statut Délivré - en vigueur
Date de dépôt 2023-01-18
Date de publication 2023-07-27
Propriétaire
  • VMWARE, INC. (USA)
  • WANG, Yong (USA)
Inventeur(s)
  • Yang, Guolin
  • Serra Miralles, Eduard
  • Wang, Dexiang
  • Chang, Qing

Abrégé

Described herein are systems, methods, and software to manage the identification of control packets in an encapsulation header. In one implementation, a computing system may receive a Geneve packet at a network interface and determine that the Geneve packet includes an Operations and Management (OAM) flag. Once the OAM flag is identified, the computing system can select a processing queue from a plurality of processing queues for a main processing system of the computing system based on the OAM flag and assign the Geneve packet to the processing queue.

Classes IPC  ?

  • H04L 43/10 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route

67.

DATA PROCESSING UNIT INTEGRATION

      
Numéro d'application US2023011058
Numéro de publication 2023/141164
Statut Délivré - en vigueur
Date de dépôt 2023-01-18
Date de publication 2023-07-27
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Warkentin, Andrei
  • Kotian, Sunil Kumar
  • Mcneill, Jared
  • Laplace, Cyprien
  • Hiriyuru, Shruthi Muralidhara

Abrégé

A combined data processing unit (DPU) and server solution with DPU operating system (OS) integration is described. A DPU OS is executed on a DPU or other computing device, where the DPU OS exercises secure calls provided by a DPU's trusted firmware component, that may be invoked by DPU OS components to abstract DPU vendor-specific and server vendor-specific integration details. An invocation of one of the secure calls made on the DPU to communicate with its associated server computing device is identified. In an instance in which the one of the secure calls is invoked, the secure call invoked is translated into a call or request specific to an architecture of the server computing device and the call is performed, which may include sending a signal to the server computing device in a format interpretable by the server computing device.

Classes IPC  ?

68.

PER-NAMESPACE IP ADDRESS MANAGEMENT METHOD FOR CONTAINER NETWORKS

      
Numéro d'application CN2022071987
Numéro de publication 2023/133797
Statut Délivré - en vigueur
Date de dépôt 2022-01-14
Date de publication 2023-07-20
Propriétaire
  • VMWARE INFORMATION TECHNOLOGY (CHINA) CO., LTD. (Chine)
  • VMWARE, INC. (USA)
Inventeur(s)
  • Tang, Qiang
  • Xiao, Zhaoqian

Abrégé

Some embodiments of the invention provide a method of sending data in a network that includes multiple worker nodes, each worker node executing at least one set of containers, a gateway interface, and a virtual local area network (VLAN) tunnel interface. The method configures the gateway interface of each worker node to associate the gateway interface with multiple subnets. Each subnet is associated with a namespace, a first worker node executes a first set of containers of a first namespace, and a second worker node executes a second set of containers of the first namespace and a third set of containers of a second namespace. The method sends data between the first set of containers and the second set of containers through a VLAN tunnel between the first and second worker nodes. The method sends data between the first set of containers and the third set of containers through the gateway interface.

Classes IPC  ?

69.

VIRTUAL MACHINE AS A SERVICE FOR AN AUTONOMOUS EDGE

      
Numéro d'application US2023010838
Numéro de publication 2023/137204
Statut Délivré - en vigueur
Date de dépôt 2023-01-13
Date de publication 2023-07-20
Propriétaire VMWARE, INC. (USA)
Inventeur(s) Zeng, Helen

Abrégé

Systems and methods are described for providing a virtual machine ("VM") as a service. A user device can install a VM to enable itself as an edge node. The user device can then and use a portion of its computing resources to provide the service to the endpoint device by running the VM. In an example, an edge node can directly receive a request for a service from an endpoint device. The edge node can determine that it needs assistance from another device to jointly provide the service. Then another user device which is available to operate as an edge node can join the edge team.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • H04L 67/50 - Services réseau
  • H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance

70.

METHOD OF MANAGING STORAGE SPACE BASED ON ROBUST DETERMINATIONS OF DURATIONS FOR DELETING SNAPSHOTS

      
Numéro d'application 17575403
Statut En instance
Date de dépôt 2022-01-13
Date de la première publication 2023-07-13
Propriétaire VMware, Inc. (USA)
Inventeur(s)
  • Xiang, Enning
  • Wang, Wenguang
  • Sarkar, Subhradyuti
  • Ni, Fan

Abrégé

A method of managing storage space of a storage device, wherein the storage device includes a plurality of snapshots of a file, includes the steps of: in response to a request to delete a first snapshot, determining a first amount of time that elapsed between a creation of the first snapshot and a creation of a second snapshot that is a child snapshot of the first snapshot: and after determining the first amount of time, executing a first process to delete the first snapshot over a first time interval, wherein the first time interval is based on the first amount of time.

Classes IPC  ?

  • G06F 16/11 - Administration des systèmes de fichiers, p. ex. détails de l’archivage ou d’instantanés
  • G06F 16/17 - Détails d’autres fonctions de systèmes de fichiers

71.

TRAFFIC REDUNDANCY DEDUPLICATION FOR BLOCKCHAIN RECOVERY

      
Numéro d'application US2022050805
Numéro de publication 2023/129309
Statut Délivré - en vigueur
Date de dépôt 2022-11-22
Date de publication 2023-07-06
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Golikov, Igor
  • Markuze, Alex
  • Yanai, Avishay
  • Gueta, Guy
  • Cidon, Israel
  • Zohar, Eyal

Abrégé

In some embodiments, a method receives data for a block in a blockchain during a recovery process in which a recovering replica is recovering the block for a first instance of the blockchain being maintained by the recovering replica. The block is received from a second instance of the blockchain being maintained by a source replica. The method splits the data for the block into a plurality of chunks. Each chunk includes a portion of the data for the block; It is determined whether the recovering replica can recover a chunk in the plurality of chunks using a representation of the chunk. In response to determining that the recovering replica can recover the chunk, sending the representation of the chunk to the recovering replica. In response to determining that the recovering replica cannot recover the chunk, sending the data for the chunk to the recovering replica.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité

72.

VERSION CONTROL INTERFACE FOR ACCESSING DATA LAKES

      
Numéro d'application US2022050808
Numéro de publication 2023/129310
Statut Délivré - en vigueur
Date de dépôt 2022-11-22
Date de publication 2023-07-06
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Gupta, Abhishek
  • Spillane, Richard P.
  • Karamanolis, Christos
  • Nozhchev, Marin

Abrégé

A version control interface for data provides a layer of abstraction that permits multiple readers and writers to access data lakes concurrently. An overlay file system, based on a data structure such as a tree, is used on top of one or more underlying storage instances to implement the interface. Each tree node tree is identified and accessed by means of any universally unique identifiers. Copy-on-write with the tree data structure implements snapshots of the overlay file system. The snapshots support a long-lived master branch, with point-in-time snapshots of its history, and one or more short-lived private branches. As data objects are written to the data lake, the private branch corresponding to a writer is updated. The private branches are merged back into the master branch using any merging logic, and conflict resolution policies are implemented. Readers read from the updated master branch or from any of the private branches.

Classes IPC  ?

  • G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données

73.

TEAMING OF SMART NICS

      
Numéro d'application US2022039016
Numéro de publication 2023/121720
Statut Délivré - en vigueur
Date de dépôt 2022-08-01
Date de publication 2023-06-29
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ang, Boon, S.
  • Jiang, Wenyi
  • Yang, Guolin
  • Heo, Jin

Abrégé

Some embodiments provide a method for a first smart NIC of multiple smart NICs of a host computer. Each of the smart NICs executes a smart NIC operating system that performs virtual networking operations for a set of data compute machines executing on the host computer. The method receives a data message sent by one of the data compute machines executing on the host computer. The method performs virtual networking operations on the data message to determine that the data message is to be transmitted from a port of a second smart NIC of the multiple smart NICs. The method passes the data message to the second smart NIC via a private communication channel connecting the plurality of smart NICs.

Classes IPC  ?

  • H04L 41/0668 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau par sélection dynamique des éléments du réseau de récupération, p. ex. le remplacement par l’élément le plus approprié après une défaillance
  • H04L 45/58 - Association de routeurs

74.

DESIRED STATE MANAGEMENT OF SOFTWARE-DEFINED DATA CENTER

      
Numéro d'application US2022050628
Numéro de publication 2023/113976
Statut Délivré - en vigueur
Date de dépôt 2022-11-21
Date de publication 2023-06-22
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Raj, Saurabh
  • Kabiraj, Pinaki Sankar
  • Radev, Ivaylo Radoslavov
  • Tirumanyam, Praveen

Abrégé

A method of managing configurations of a plurality of data centers that are each managed by one or more management servers, includes the steps of: in response to a change made to the configurations of one of the data centers, updating a desired state document that specifies a desired state of each of the data centers, the updated desired state document including the change; and instructing each of the data centers to update the configurations thereof according to the desired state specified in the updated desired state document. The management servers include a virtual infrastructure management server and a virtual network management server and the configurations include configurations of software running in the virtual infrastructure management server and the virtual network management server, and configurations of the data center managed by the virtual infrastructure management server and the virtual network management server.

Classes IPC  ?

  • H04L 41/0266 - Échange ou transport d’informations de gestion de réseau en utilisant l’InternetIntégration de serveurs de gestion du Web dans des éléments de réseauProtocoles basés sur les services du Web en utilisant des métadonnées, des objets ou des commandes pour formater l’information de gestion, p. ex. en utilisant un langage de balisage eXtensible [XML]
  • H04L 41/082 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant des mises à jour ou des mises à niveau des fonctionnalités réseau
  • H04L 41/085 - Récupération de la configuration du réseauSuivi de l’historique de configuration du réseau
  • H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p. ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
  • H04L 41/00 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets
  • H04L 41/044 - Architectures ou dispositions de gestion de réseau comprenant des structures de gestion hiérarchisées
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet

75.

OPTIMIZED PROCESSING OF MULTICAST DATA MESSAGES IN A HOST

      
Numéro d'application US2022049330
Numéro de publication 2023/091336
Statut Délivré - en vigueur
Date de dépôt 2022-11-08
Date de publication 2023-05-25
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Karunakaran, Senthilkumar
  • Mathew, Subin, Cyriac
  • Raman, Chidambareswaran

Abrégé

Some embodiments provide a method for forwarding multicast data messages at a forwarding element on a host computer. The method receives a multicast data message from a routing element executing on the host computer along with metadata appended to the multicast data message by the routing element. Based on a destination address of the multicast data message, the method identifies a set of recipient ports for a multicast group with which the multicast data message is associated. For each recipient port, the method uses the metadata appended to the multicast data message by the routing element to determine whether to deliver a copy of the multicast data message to the recipient port.

Classes IPC  ?

  • H04L 45/16 - Routage multipoint
  • H04L 45/76 - Routage dans des topologies définies par logiciel, p. ex. l’acheminement entre des machines virtuelles
  • H04L 49/201 - Opération de multidiffusionOpération de diffusion
  • H04L 49/00 - Éléments de commutation de paquets

76.

EDGE NODE CLUSTER NETWORK REDUNDANCY AND FAST CONVERGENCE USING AN UNDERLAY ANYCAST VTEP IP

      
Numéro d'application 18088597
Statut En instance
Date de dépôt 2022-12-25
Date de la première publication 2023-04-27
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Boutros, Sami
  • Basler, Benjamin C
  • Zhang, Ronghua
  • Catrouillet, Jerome

Abrégé

Some embodiments provide a method for providing redundancy and fast convergence for modules operating in a network. The method configures modules to use a same anycast inner IP address, anycast MAC address, and to associate with a same anycast VTEP IP address. In some embodiments, the modules are operating in an active-active mode and all nodes running modules advertise the anycast VTEP IP addresses with equal local preference. In some embodiments, modules are operating in active-standby mode and the node running the active module advertises the anycast VTEP IP address with higher local preference.

Classes IPC  ?

  • H04L 41/0668 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau par sélection dynamique des éléments du réseau de récupération, p. ex. le remplacement par l’élément le plus approprié après une défaillance
  • H04L 45/586 - Association de routeurs de routeurs virtuels
  • H04L 45/28 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données en utilisant la reprise sur incident de routes
  • H04L 69/40 - Dispositions, protocoles ou services de réseau indépendants de la charge utile de l'application et non couverts dans un des autres groupes de la présente sous-classe pour se remettre d'une défaillance d'une instance de protocole ou d'une entité, p. ex. protocoles de redondance de service, état de redondance de protocole ou redirection de service de protocole
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 45/16 - Routage multipoint
  • H04L 61/2592 - Traduction d'adresses de protocole Internet [IP] en utilisant la tunnelisation ou l'encapsulation

77.

EXPAND AND CONTRACT FRAMEWORK FOR REDUCED DOWNTIME DURING UPGRADE OF AN APPLICATION HOSTED IN A DATA CENTER

      
Numéro d'application US2022045567
Numéro de publication 2023/059563
Statut Délivré - en vigueur
Date de dépôt 2022-10-03
Date de publication 2023-04-13
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Petrov, Roman Romanov
  • Daskalov, George

Abrégé

A method of upgrading an application executing in a software-defined data center (SDDC) includes: expanding a database of a first version of the application, while services of the first version of the application are active, to generate an expanded database, the expanded database supporting both the services of the first version of the application and services of a second version of the application; replicating the database of the first version to a database of the second version of the application while the services of the second version are inactive; and contracting, in response to activation of the services of the second version and deactivation of the services of the first version, the database of the second version, while the services of the second version re active, to generate a contracted database, the contracted database supporting the services of the second version.

Classes IPC  ?

  • G06F 8/656 - Mises à jour pendant le fonctionnement
  • G06F 8/71 - Gestion de versions Gestion de configuration
  • G06F 16/21 - Conception, administration ou maintenance des bases de données

78.

POLICY-GOVERNED CRYPTOGRAPHIC SELECTION SYSTEM

      
Numéro d'application US2022045578
Numéro de publication 2023/059570
Statut Délivré - en vigueur
Date de dépôt 2022-10-03
Date de publication 2023-04-13
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Benson, Mark
  • Beveridge, Daniel James
  • Brotherson, Marc Wayne
  • Huntley, Sean James
  • Jenkins, Akeem Lamar
  • Moreau, Dennis
  • Ott, David

Abrégé

This disclosure relates generally to configuring an application or service with reconfigurable cryptographic features taking the form of cryptographic algorithms, protocols or functions. The application or service can be configured with a cryptographic provider configured to receive abstracted cryptographic API calls and retrieve specific cryptographic features based on established cryptographic policies. This configuration allows for rapid updates to the cryptographic framework and for the cryptographic framework to be managed remotely in enterprise environments.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

79.

CONTEXT AWARE CIPHER SOLUTIONS IN SECURE COMMUNICATIONS

      
Numéro d'application US2022045588
Numéro de publication 2023/059573
Statut Délivré - en vigueur
Date de dépôt 2022-10-03
Date de publication 2023-04-13
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ott, David
  • Benson, Mark
  • Beveridge, Daniel James
  • Brotherson, Marc Wayne
  • Huntley, Sean James
  • Jenkins, Akeem Lamar
  • Moreau, Dennis

Abrégé

This relates generally to configuring and automatically selecting a cipher solution for secure communication. An example method includes, at an electronic device, receiving a request initiated by a requestor for one or more cryptographic operations, determining contextual information associated with the requestor, selecting a cipher solution for processing the request based on the contextual information and a policy engine, and processing the request for the one or more cryptographic operations by executing one or more cryptographic algorithms in accordance with the selected cipher solution.

Classes IPC  ?

80.

DYNAMIC CRYPTOGRAPHIC ALGORITHM SELECTION

      
Numéro d'application US2022038345
Numéro de publication 2023/027852
Statut Délivré - en vigueur
Date de dépôt 2022-07-26
Date de publication 2023-03-02
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Huntley, Sean James
  • Jenkins, Akeem
  • Brotherson, Marc Wayne
  • Ott, David

Abrégé

The disclosure provides an approach for cryptographic agility. Embodiments include receiving, by a cryptographic agility system associated with an application, a request to establish a. secure communication session. Embodiments include, prior to establishing the secure communication session, selecting, by the cryptographic agility system, a first cryptographic technique and a second cryptographic technique for the secure communication session. Embodiments include, during the secure communication session, utilizing the first encryption technique for securely communicating a first set of data. Embodiments include determining that a condition has been met for switching from the first encryption technique to the second encryption technique. Embodiments include, based on the determining that the condition has been met, utilizing the second encryption technique for securely communication a second set of data.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04W 72/04 - Affectation de ressources sans fil

81.

NETWORK MANAGEMENT SERVICES IN A POINT-OF-PRESENCE

      
Numéro d'application US2021065171
Numéro de publication 2023/009159
Statut Délivré - en vigueur
Date de dépôt 2021-12-24
Date de publication 2023-02-02
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Rolando, Pierluigi
  • Jain, Jayant
  • Koganty, Raju
  • Shah, Shadab
  • Goliya, Abhishek
  • Narasimhan, Chandran, Anjur
  • Belur, Gurudutt, Maiya
  • Kamath, Vikas

Abrégé

A software-defined wide area network (SD-WAN) environment that leverages network virtualization management deployment is provided. Edge security services managed by the network virtualization management deployment are made available in the SD-WAN environment. Cloud gateways forward SD-WAN traffic to managed service nodes to apply security services. Network traffic is encapsulated with corresponding metadata to ensure that services can be performed according to the desired policy. Point-to-point tunnels are established between cloud gateways and the managed service nodes to transport the metadata to the managed service nodes using an overlay logical network. Virtual network identifiers (VNIs) in the metadata are used by the managed service nodes to identify tenants/policies. A managed service node receiving a packet uses provider service routers (T0-SR) and tenant service routers (T1-SRs) based on the VNI to apply the prescribed services for the tenant, and the resulting traffic is returned to the cloud gateway that originated the traffic.

Classes IPC  ?

  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p. ex. des commutateurs d'étiquette multi protocole [MPLS]
  • H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
  • H04L 45/74 - Traitement d'adresse pour le routage

82.

MANAGING REPLAY WINDOWS IN MULTIPATH CONNECTIONS BETWEEN GATEWAYS

      
Numéro d'application US2022022399
Numéro de publication 2023/287463
Statut Délivré - en vigueur
Date de dépôt 2022-03-29
Date de publication 2023-01-19
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Sharma, Awan Kumar
  • Wang, Yong
  • Bhattacharya, Sourabh
  • Solanki, Deepika Kunal
  • Ray, Sarthak
  • Behrens, Jochen

Abrégé

Described herein are systems, methods, and software to manage replay windows in multipath connections between gateways. In one implementation, a first gateway may receive a packet directed toward a second gateway and identify a path from a plurality of paths to the second gateway. Once identified, the first gateway may increment a sequence number associated with the path and encapsulate the packet with a unique identifier for the path in the header with the incremented sequence number. The first gateway the communicates the encapsulated packet to the second gateway.

Classes IPC  ?

83.

METHOD AND APPARATUS FOR DEPLOYING TENANT DEPLOYABLE ELEMENTS ACROSS PUBLIC CLOUDS BASED ON HARVESTED PERFORMANCE METRICS

      
Numéro d'application US2022011729
Numéro de publication 2022/265681
Statut Délivré - en vigueur
Date de dépôt 2022-01-07
Date de publication 2022-12-22
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Kempanna, Raghav
  • Sreenivasan, Rajagopal
  • Kandachar, Sridhara Rao, Sudarshana
  • Parameshwaran, Kumara
  • Ramesh, Vipin, Padman

Abrégé

Some embodiments of the invention provide a method for evaluating multiple candidate resource elements that are candidates for deploying a set of one or more tenant deployable elements in a public cloud. For each particular tenant deployable element, the method deploys in the public cloud at least one instance of each of a set of one or more candidate resource elements and at least one agent to execute on the deployed resource element instance. The method communicates with each deployed agent to collect metrics for quantifying performance of the agent's respective resource element instance. The method then aggregates the collected metrics in order to generate a report that quantifies performance of each candidate resource element in the set of candidate resource elements for deploying the particular tenant deployable element in the public cloud.

Classes IPC  ?

  • H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
  • H04L 43/06 - Génération de rapports
  • H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux

84.

MULTI-UPLINK PATH QUALITY AWARE IPSEC

      
Numéro d'application US2022011726
Numéro de publication 2022/260711
Statut Délivré - en vigueur
Date de dépôt 2022-01-07
Date de publication 2022-12-15
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Wang, Yong
  • Sharma, Awan Kumar
  • Bhattacharya, Sourabh
  • Solanki, Deepika
  • Ray, Sarthak

Abrégé

Some embodiments provide a method that collects metrics for one or more paths of a first tunnel implementing a first security association (SA) and for one or more paths of a second tunnel implementing a second SA. The method selects a path based on the collected metrics of the paths of the first and second tunnels. When the selected path belongs to the first tunnel, the method encrypts data transmitted as encrypted payload of the first SA and transmits the encrypted payload in the first tunnel. When the selected path belongs to the second tunnel, the method encrypts data to be transmitted as encrypted payload of the second SA and transmits the encrypted payload in the second tunnel.

Classes IPC  ?

85.

METHOD AND APPARATUS FOR IMPLEMENTING AND MANAGING VIRTUAL SWITCHES

      
Numéro d'application 17892110
Statut En instance
Date de dépôt 2022-08-21
Date de la première publication 2022-12-15
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Casado, Martin
  • Ingram, Paul
  • Amidon, Keith E.
  • Balland, Iii, Peter J.
  • Koponen, Teemu
  • Pfaff, Benjamin L.
  • Pettit, Justin
  • Gross, Iv, Jesse E.
  • Wendlandt, Daniel J.

Abrégé

In general, the present invention relates to a virtual platform in which one or more distributed virtual switches can be created for use in virtual networking. According to some aspects, the distributed virtual switch according to the invention provides the ability for virtual and physical machines to more readily, securely, and efficiently communicate with each other even if they are not located on the same physical host and/or in the same subnet or VLAN. According other aspects, the distributed virtual switches of the invention can support integration with traditional IP networks and support sophisticated IP technologies including NAT functionality, stateful firewalling, and notifying the IP network of workload migration. According to further aspects, the virtual platform of the invention creates one or more distributed virtual switches which may be allocated to a tenant, application, or other entity requiring isolation and/or independent configuration state. According to still further aspects, the virtual platform of the invention manages and/or uses VLAN or tunnels (e.g, GRE) to create a distributed virtual switch for a network while working with existing switches and routers in the network. The present invention finds utility in both enterprise networks, datacenters and other facilities.

Classes IPC  ?

  • H04L 49/25 - Routage ou recherche de route dans une matrice de commutation
  • H04L 49/00 - Éléments de commutation de paquets
  • H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/0896 - Gestion de la bande passante ou de la capacité des réseaux, c.-à-d. augmentation ou diminution automatique des capacités
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 49/15 - Interconnexion de modules de commutation
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 61/256 - Traversée NAT

86.

TWO-ROUND BYZANTINE FAULT TOLERANT (BFT) STATE MACHINE REPLICATION (SMR) PROTOCOL WITH LINEAR AUTHENTICATOR COMPLEXITY AND OPTIMISTIC RESPONSIVENESS

      
Numéro d'application US2022014038
Numéro de publication 2022/256057
Statut Délivré - en vigueur
Date de dépôt 2022-01-27
Date de publication 2022-12-08
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Abraham, Ittai
  • Tomescu Nicolescu, Ioan Alin
  • Gueta, Guy Golan
  • Giridharan, Neil
  • Howard, Heidi

Abrégé

The present disclosure is directed to a leader-based partially synchronous BFT SMR protocol that improves upon existing protocols by exhibiting two rounds of communication latency, linear authenticator complexity, and optimistic responsiveness. This is achieved through the novel use of an aggregate signature scheme as part of the protocol's view-change procedure.

Classes IPC  ?

  • G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p. ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
  • G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

87.

ALLOCATING ADDITIONAL BANDWIDTH TO RESOURCES IN A DATACENTER THROUGH DEPLOYMENT OF DEDICATED GATEWAYS

      
Numéro d'application US2021065169
Numéro de publication 2022/250735
Statut Délivré - en vigueur
Date de dépôt 2021-12-24
Date de publication 2022-12-01
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Sadasivan, Ganesh
  • Raman, Chidambareswaran
  • Devireddy, Dileep, K.
  • Zhu, Hongwei
  • Duvvuri, Sreenivas

Abrégé

Some embodiments provide policy-driven methods for deploying edge forwarding elements in a public or private SDDC for tenants or applications. For instance, the method of some embodiments allows administrators to create different traffic groups for different applications and/or tenants, deploys edge forwarding elemnts for the different traffic groups, and configures forwarding elements in the SDDC to direct data message flows of the applications and/or tenants through the edge forwarding elements deployed for them. The policy-driven method of some embodiments also dynamically deploys edge forwarding elements in the SDDC for applications and/or tenants after detecting the need for the edge forwarding elements based on monitored traffic flow conditions.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
  • H04L 45/586 - Association de routeurs de routeurs virtuels
  • H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion

88.

ON-DEMAND LIVENESS UPDATES BY SERVERS SHARING A FILE SYSTEM

      
Numéro d'application 17372643
Statut En instance
Date de dépôt 2021-07-12
Date de la première publication 2022-11-24
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Gupta, Siddhant
  • Shantharam, Srinivasa
  • Singha, Zubraj

Abrégé

A method of managing liveness information of a first server of a plurality of servers sharing a file system includes: periodically reading an alarm bit of the first server from a region in the file system allocated for storing liveness information of the first server; after each read, determining a value of the alarm bit; and upon determining that the value of the alarm is a first value, changing the alarm bit to a second value, and writing the alarm bit having the second value in the region. The second value indicates to other servers of the plurality of servers that the first server is alive.

Classes IPC  ?

  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 16/182 - Systèmes de fichiers distribués

89.

DISTRIBUTED TUNNELING FOR VPN

      
Numéro d'application 17867559
Statut En instance
Date de dépôt 2022-07-18
Date de la première publication 2022-11-10
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Sawant, Sandesh
  • Chopra, Amit
  • Naik, Vinayak Shashikant
  • Jain, Jayant
  • Sengupta, Anirban
  • Masurekar, Uday

Abrégé

A novel method of providing virtual private access to a software defined data center (SDDC) is provided. The SDDC uses distributed VPN tunneling to allow external access to application services hosted in the SDDC. The SDDC includes host machines for providing computing and networking resources and a VPN gateway for providing external access to those resources. The host machines that host the VMs running the applications that VPN clients are interested in connecting performs the VPN encryption and decryption. The VPN gateway does not perform any encryption and decryption operations. The packet structure is such that the VPN gateway can read the IP address of the VM without decrypting the packet.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 9/08 - Répartition de clés
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

90.

ON DEMAND ROUTING MESH FOR ROUTING PACKETS THROUGH SD-WAN EDGE FORWARDING NODES IN AN SD-WAN

      
Numéro d'application US2021065168
Numéro de publication 2022/235303
Statut Délivré - en vigueur
Date de dépôt 2021-12-24
Date de publication 2022-11-10
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ramaswamy, Navaneeth, Krishnan
  • Kumar, Gopa

Abrégé

Some embodiments of the invention provide a method of facilitating routing through a software-defined wide area network (SD-WAN) defined for an entity. A first edge forwarding node located at a first multi -machine site of the entity, the first multi-machine site at a first physical location and including a first set of machines, serves as an edge forwarding node for the first set of machines by forwarding packets between the first set of machines and other machines associated with the entity via other forwarding nodes in the SD-WAN. The first edge forwarding node receives configuration data specifying for the first edge forwarding node to serve as a hub forwarding node for forwarding a set of packets from a second set of machines associated with the entity and operating at a second multi-machine site at a second physical location to a third set of machines associated with the entity and operating at a third multi-machine site at a third physical location. The first edge forwarding node serves as a hub forwarding node to forward the set of packets from the second set of machines to the third set of machines.

Classes IPC  ?

  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
  • H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
  • H04L 47/70 - Contrôle d'admissionAllocation des ressources

91.

METHODS FOR MICRO-SEGMENTATION IN SD-WAN FOR VIRTUAL NETWORKS

      
Numéro d'application US2022011730
Numéro de publication 2022/231668
Statut Délivré - en vigueur
Date de dépôt 2022-01-07
Date de publication 2022-11-03
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ramaswamy, Navaneeth Krishnan
  • Kulkarni, Vaibhav

Abrégé

Some embodiments of the invention provide a method for micro-segmenting traffic flows in a software defined wide area network (SD-WAN). At a first edge forwarding node of a first multi-machine site in the SD-WAN, the method receives, from a particular forwarding element, a first packet of a packet flow originating from a second multi-machine site that is external to the SD-WAN, the packet flow destined for a particular machine at the first multi-machine site. The method uses deep packet inspection (DPI) on the first packet to identify contextual information not provided by the particular forwarding element about the first packet and the packet flow. Based on the identified contextual information, the method applies one or more policies to the first packet before forwarding the first packet to the particular machine.

Classes IPC  ?

  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 45/30 - Routage de trafic multi-classes
  • H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p. ex. des commutateurs d'étiquette multi protocole [MPLS]

92.

EFFICIENT TROUBLE SHOOTING ON CONTAINER NETWORK BY CORRELATING KUBERNETES RESOURCES AND UNDERLYING RESOURCES

      
Numéro d'application CN2021083961
Numéro de publication 2022/204941
Statut Délivré - en vigueur
Date de dépôt 2021-03-30
Date de publication 2022-10-06
Propriétaire
  • VMWARE INFORMATION TECHNOLOGY (CHINA) CO., LTD. (Chine)
  • VMWARE, INC. (USA)
Inventeur(s)
  • Liu, Wenfeng
  • Shen, Jianjun
  • Gu, Ran
  • Cao, Rui
  • Han, Donghai

Abrégé

Some embodiments provide a method of tracking errors in a container cluster network overlaying a software defined network (SDN), sometimes referred to as a virtual network. The method sends a request to instantiate a container cluster network object to an SDN manager of the SDN. The method then receives an identifier of a network resource of the SDN for instantiating the container cluster network object. The method associates the identified network resource with the container cluster network object. The method then receives an error message regarding the network resource from the SDN manager. The method identifies the error message as applying to the container cluster network object. The error message, in some embodiments, indicates a failure to initialize the network resource. The container cluster network object may be a namespace, a pod of containers, or a service.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

93.

RIC SDK

      
Numéro d'application US2022013427
Numéro de publication 2022/186912
Statut Délivré - en vigueur
Date de dépôt 2022-01-21
Date de publication 2022-09-09
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Singh, Amit
  • Misra, Rakesh
  • Gudipati, Aditya
  • Subramani Jayavelu, Giridhar

Abrégé

To provide a low latency near RT RIC, some embodiments separate the RIC's functions into several different components that operate on different machines (e.g., execute on VMs or Pods) operating on the same host computer or different host computers. Some embodiments also provide high speed interfaces between these machines. Some or all of these interfaces operate in non-blocking, lockless manner in order to ensure that critical near RT RIC operations (e.g., datapath processes) are not delayed due to multiple requests causing one or more components to stall. In addition, each of these RIC components also has an internal architecture that is designed to operate in a non-blocking manner so that no one process of a component can block the operation of another process of the component. All of these low latency features allow the near RT RIC to serve as a high speed IO between the E2 nodes and the xApps.

Classes IPC  ?

  • H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
  • H04W 72/04 - Affectation de ressources sans fil

94.

TECHNIQUES FOR NON-DISRUPTIVE SYSTEM UPGRADE

      
Numéro d'application US2022014024
Numéro de publication 2022/186922
Statut Délivré - en vigueur
Date de dépôt 2022-01-27
Date de publication 2022-09-09
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Stumpf, Tobias Franz Rolf
  • Kaila, Ashish
  • Drzewiecki, Adrian
  • Sekhar, Vishnu Mohan
  • Zhang, Stanley

Abrégé

The disclosure provides an approach for a non-disruptive system upgrade. Embodiments include installing an upgraded version of an operating system (OS) on a computing system while a current version of the OS continues to run. Embodiments include entering a maintenance mode on the computing system, including preventing the addition of new applications and modifying the handling of storage operations on the computing system for the duration of the maintenance mode. Embodiments include, during the maintenance mode, configuring the upgraded version of the OS. Embodiments include, after configuring the upgraded version of the OS, suspending a subset of applications running on the computing system, transferring control over resources of the computing system to the upgraded version of the OS, and resuming the subset of the applications running on the computing system. Embodiments include exiting the maintenance mode on the computing system.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 8/61 - Installation
  • G06F 8/65 - Mises à jour
  • G06F 8/71 - Gestion de versions Gestion de configuration
  • G06F 8/76 - Adaptation d’un code de programme pour fonctionner dans un environnement différentPortage

95.

CLOUDIFIED MAC SCHEDULER

      
Numéro d'application US2021065172
Numéro de publication 2022/186883
Statut Délivré - en vigueur
Date de dépôt 2021-12-24
Date de publication 2022-09-09
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Yang, Yang
  • Misra, Rakesh

Abrégé

Some embodiments provide a method for performing radio access network (RAN) functions in a cloud at a medium access control (MAC) scheduler application that executes on a machine deployed on a host computer in the cloud. The method receives data, via a RAN intelligent controller (RIC), from a first RAN component. The method uses the received data to generate a MAC scheduling output. The method provides the MAC scheduling output to a second RAN component via the RIC.

Classes IPC  ?

  • H04W 72/04 - Affectation de ressources sans fil
  • H04W 72/12 - Planification du trafic sans fil
  • H04B 7/0452 - Systèmes MIMO à plusieurs utilisateurs
  • H04B 7/06 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission

96.

COLLECTING AND PROCESSING CONTEXT ATTRIBUTES ON A HOST

      
Numéro d'application 17739534
Statut En instance
Date de dépôt 2022-05-09
Date de la première publication 2022-08-18
Propriétaire Nicira, Inc. (USA)
Inventeur(s)
  • Gunda, Laxmikant Vithal
  • Vaidya, Sachin Mohan

Abrégé

Some embodiments of the invention provide a novel architecture for capturing contextual attributes on host computers that execute one or more machines, and for consuming the captured contextual attributes to perform services on the host computers. The machines are virtual machines (VMs) in some embodiments, containers in other embodiments, or a mix of VMs and containers in still other embodiments. Some embodiments execute a guest-introspection (GI) agent on each machine from which contextual attributes need to be captured. In addition to executing one or more machines on each host computer, these embodiments also execute a context engine and one or more attribute-based service engines on each host computer. Through the GI agents of the machines on a host, the context engine of that host in some embodiments collects contextual attributes associated with network events and/or process events on the machines. The context engine then provides the contextual attributes to the service engines, which, in turn, use these contextual attributes to identify service rules for processing.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/06 - Dispositions pour la commande par programme, p. ex. unités de commande utilisant des programmes stockés, c.-à-d. utilisant un moyen de stockage interne à l'équipement de traitement de données pour recevoir ou conserver les programmes
  • H04L 51/214 - Surveillance ou traitement des messages en utilisant le transfert sélectif
  • G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

97.

MANAGING INTERNET PROTOCOL (IP) ADDRESS ALLOCATION TO TENANTS IN A COMPUTING ENVIRONMENT

      
Numéro d'application US2022012996
Numéro de publication 2022/159503
Statut Délivré - en vigueur
Date de dépôt 2022-01-19
Date de publication 2022-07-28
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Devireddy, Dileep K.
  • Parmar, Ankit
  • Patel, Hiteshkumar Rameshchandra

Abrégé

Described herein are systems, methods, and software to manage internet protocol (IP) address allocation for tenants in a computing environment. In one implementation, a logical router associated with a tenant in the computing environment requests a public IP address for a new segment instance from a controller. In response to the request, the controller may select a public IP address from a pool of available IP addresses and update networking address translation (NAT) on the logical router to associate the public IP address with a private IP address allocated to the new segment instance.

Classes IPC  ?

  • H04L 61/2514 - Traduction d'adresses de protocole Internet [IP] entre adresses IP locales et globales
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 61/2521 - Architectures de traduction autres que les serveurs de traduction d’adresses de réseau [NAT] pour réseau unique

98.

PROACTIVE OPTIMIZATION ACROSS NETWORK SEGMENTS TO MAINTAIN END-TO-END PERFORMANCE

      
Numéro d'application US2021056644
Numéro de publication 2022/159156
Statut Délivré - en vigueur
Date de dépôt 2021-10-26
Date de publication 2022-07-28
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Vijayakumar, Goutham
  • Srinivas, Anand
  • Zafer, Murtaza

Abrégé

Some embodiments of the invention provide a method for proactively optimizing network performance for a software-defined wide area network (SD-WAN), which connects multiple devices operating in multiple network segments, during an active network flow. The method monitors the SD-WAN for network events related to the active network flow. The method detects a particular network event at a first device in a first segment in the SD-WAN traversed by the active network flow. Based on the particular network event, the method performs a proactive action on at least a second device in a second network segment in the SD-WAN that will be traversed by the active network flows in order to mitigate a potential negative impact of the particular network event on the performance of the SD-WAN to improve overall network performance.

Classes IPC  ?

  • H04L 41/5025 - Pratiques de respect de l’accord du niveau de service en réagissant de manière proactive aux changements de qualité du service, p. ex. par reconfiguration après dégradation ou mise à niveau de la qualité du service
  • H04L 41/083 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p. ex. l’optimisation de la configuration pour améliorer la fiabilité pour augmenter la vitesse du réseau
  • H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p. ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
  • H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p. ex. entités SDN ou NFV

99.

NETWORK-AWARE LOAD BALANCING

      
Numéro d'application US2021057794
Numéro de publication 2022/154850
Statut Délivré - en vigueur
Date de dépôt 2021-11-02
Date de publication 2022-07-21
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Ramaswamy, Navaneeth Krishnan
  • Kumar, Gopa

Abrégé

Some embodiments of the invention provide a method for network-aware load balancing for data messages traversing a software-defined wide area network (SD-WAN) (e.g., a virtual network) including multiple connection links between different elements of the SD-WAN. The method includes receiving, at a load balancer in a multi-machine site, link state data relating to a set of SD-WAN datapaths including connection links of the multiple connection links. The load balancer, in some embodiments, provides load balancing for data messages sent from a machine in the multi-machine site to a set of destination machines (e.g., web servers, database servers, etc.) connected to the load balancer over the set of SD-WAN datapaths. The load balancer selects, for the data message, a particular destination machine (e.g., a frontend machine for a set of backend servers) in the set of destination machines by performing a load balancing operation based on the received link state data.

Classes IPC  ?

  • H04L 45/12 - Évaluation de la route la plus courte
  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
  • H04L 67/1004 - Sélection du serveur pour la répartition de charge
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
  • H04L 41/5019 - Pratiques de respect de l’accord du niveau de service

100.

COMPRESSION OF ROUTE TABLES USING KEY VALUES

      
Numéro d'application US2021013482
Numéro de publication 2022/150052
Statut Délivré - en vigueur
Date de dépôt 2021-01-14
Date de publication 2022-07-14
Propriétaire VMWARE, INC. (USA)
Inventeur(s)
  • Singhal, Ravi
  • Malik, Manish
  • Wagle, Ganesh Jayvant
  • Batterywala, Yusuf

Abrégé

Described herein are systems, methods, and software to manage the compression of route tables for communication between networking elements. In one implementation, a network device identifies network keys for a route table by replacing attributes in the tables with values. The network device further generates a compressed route table using the route keys and associating each of the route keys with one or more additional attributes. The network device also generates a dictionary to associate each of the values for the route keys to a corresponding attribute of the attributes.

Classes IPC  ?

  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 12/743 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance par des techniques de hachage
  1     2     3     ...     5        Prochaine page