IMPLEMENTATION OF SECURE COMMUNICATIONS IN A SUPPORT SYSTEM
    11.
    发明申请
    IMPLEMENTATION OF SECURE COMMUNICATIONS IN A SUPPORT SYSTEM 有权
    支持系统中安全通信的实现

    公开(公告)号:US20150347763A1

    公开(公告)日:2015-12-03

    申请号:US14714982

    申请日:2015-05-18

    Abstract: A support system negotiates secure connections on behalf of multiple guest systems using a set of credentials associated with the guest systems. The operation of the secure connection may be transparent to the guest system such that guest system may send and receive messages that are encrypted or decrypted by the support system, such as a hypervisor. As the support system is in between the guest system and a destination, the support system may act as a local endpoint to the secure connection. Messages may be altered by the support system to indicate to a guest system which communications were secured. The credentials may be managed by the support system such that the guest system does not require access to the credentials.

    Abstract translation: 支持系统使用与guest虚拟机系统相关联的一组凭据代表多个客户系统协商安全连接。 安全连接的操作对客户系统可能是透明的,使得客系统可以发送和接收由诸如管理程序之类的支持系统加密或解密的消息。 由于支持系统在客户系统和目的地之间,支持系统可以充当安全连接的本地端点。 消息可以由支持系统改变以向客系统指示哪些通信被保护。 证书可以由支持系统管理,使得客户机系统不需要访问凭证。

    Deploying Updates to an Application During Periods of Off-Peak Demand
    12.
    发明申请
    Deploying Updates to an Application During Periods of Off-Peak Demand 有权
    在非峰值需求期间部署更新到应用程序

    公开(公告)号:US20150040117A1

    公开(公告)日:2015-02-05

    申请号:US14518768

    申请日:2014-10-20

    CPC classification number: G06F8/65 G06F9/45533 H04L67/10

    Abstract: Update preferences might be utilized to specify that an update to an application should not be applied until the demand for the application falls below a certain threshold. Demand for the application is monitored. The update to the application is applied when the actual demand for the application falls below the specified threshold. The threshold might be set such that updates are deployed during the off-peak periods of demand encountered during a regular demand cycle, such as a diurnal, monthly, or yearly cycle.

    Abstract translation: 可以使用更新偏好来指定在应用程序的需求下降到特定阈值之前不应用应用程序的更新。 对应用程序的需求进行监控。 当应用程序的实际需求低于指定阈值时,应用对应用程序的更新。 可以设置阈值,使得在正常需求周期(例如昼夜,每月或每年周期)遇到的需求的非高峰期期间部署更新。

    NETWORK DATA TRANSMISSION ANALYSIS
    13.
    发明申请
    NETWORK DATA TRANSMISSION ANALYSIS 审中-公开
    网络数据传输分析

    公开(公告)号:US20140047503A1

    公开(公告)日:2014-02-13

    申请号:US14057359

    申请日:2013-10-18

    CPC classification number: G06F21/60 H04L63/0227 H04L63/20

    Abstract: Network computing systems may implement data loss prevention (DLP) techniques to reduce or prevent unauthorized use or transmission of confidential information or to implement information controls mandated by statute, regulation, or industry standard. Implementations of network data transmission analysis systems and methods are disclosed that can use contextual information in a DLP policy to monitor data transmitted via the network. The contextual information may include information based on a network user's organizational structure or services or network infrastructure. Some implementations may detect bank card information in network data transmissions. Some of the systems and methods may be implemented on a virtual network overlaid on one or more intermediate physical networks that are used as a substrate network.

    Abstract translation: 网络计算系统可以实施数据丢失预防(DLP)技术,以减少或阻止未经授权的使用或传输机密信息或执行法规,法规或行业标准所规定的信息控制。 公开了可以使用DLP策略中的上下文信息来监视经由网络发送的数据的网络数据传输分析系统和方法的实现。 上下文信息可以包括基于网络用户的组织结构或服务或网络基础设施的信息。 一些实现可以在网络数据传输中检测银行卡信息。 一些系统和方法可以在覆盖在用作衬底网络的一个或多个中间物理网络上的虚拟网络上实现。

    Allocating identifiers with minimal fragmentation

    公开(公告)号:US10237233B2

    公开(公告)日:2019-03-19

    申请号:US15466431

    申请日:2017-03-22

    Abstract: In certain embodiments, a system includes one or more memory units and one or more processing units. The memory units store blocks that each include a number of identifiers. The memory units include executable instructions that upon execution by the processing units cause the system to receive a request to allocate an identifier to an entity. The request includes data identifying the entity. A target block of identifiers is identified. The target block includes more unallocated identifiers than any other block. The target block is split into first and second blocks. The identifiers of the second block are each higher than any identifier of the first block. The second block is assigned to the entity, and a lowest identifier of the second block is allocated to the entity.

    RESOURCE PLACEMENT TEMPLATES FOR VIRTUAL NETWORKS

    公开(公告)号:US20170353394A1

    公开(公告)日:2017-12-07

    申请号:US15583547

    申请日:2017-05-01

    Abstract: With the advent of virtualization technologies, networks and routing for those networks can now be simulated using commodity hardware. For example, virtualization technologies can be adapted to allow a single physical computing machine to be shared among multiple virtual networks by providing one or more virtual machines simulated in software by the single physical computing machine, with each virtual machine acting as a distinct logical computing system. In addition, as routing can be accomplished through software, additional network setup flexibility can be provided to the virtual network in comparison with hardware-based routing. In some implementations, virtual network setup can be abstracted through the use of resource placement templates, allowing users to create virtual networks compliant with a customer's networking policies without necessarily having knowledge of what those policies are.

    ALLOCATING IDENTIFIERS WITH MINIMAL FRAGMENTATION

    公开(公告)号:US20170195283A1

    公开(公告)日:2017-07-06

    申请号:US15466431

    申请日:2017-03-22

    Abstract: In certain embodiments, a system includes one or more memory units and one or more processing units. The memory units store blocks that each include a number of identifiers. The memory units include executable instructions that upon execution by the processing units cause the system to receive a request to allocate an identifier to an entity. The request includes data identifying the entity. A target block of identifiers is identified. The target block includes more unallocated identifiers than any other block. The target block is split into first and second blocks. The identifiers of the second block are each higher than any identifier of the first block. The second block is assigned to the entity, and a lowest identifier of the second block is allocated to the entity.

    MANAGING DELETION OF DATA IN A DATA STORAGE SYSTEM
    20.
    发明申请
    MANAGING DELETION OF DATA IN A DATA STORAGE SYSTEM 审中-公开
    管理数据存储系统中的数据删除

    公开(公告)号:US20160110375A1

    公开(公告)日:2016-04-21

    申请号:US14981700

    申请日:2015-12-28

    Abstract: In certain embodiments, a system comprises a memory and a processor communicatively coupled to the memory. The memory includes executable instructions that upon execution cause the system to generate, at a first time, a first snapshot capturing data stored in storage units of a storage device. The executable instructions upon execution cause the system to receive an indication to delete at least a portion of the data in the storage units and captured by the first snapshot, and to mark, in response to receiving the indication, the one or more storage units that store the at least a first portion of the data as available. The executable instructions upon execution cause the system to generate, at a second time subsequent to the first time, a second snapshot that omits the one or more storage units marked as available.

    Abstract translation: 在某些实施例中,系统包括通信地耦合到存储器的存储器和处理器。 存储器包括可执行指令,其在执行时导致系统在第一时间产生第一快照捕获存储在存储设备的存储单元中的数据。 执行时的可执行指令导致系统接收删除存储单元中的数据的至少一部分并由第一快照捕获的指示,并且响应于接收到指示而标记一个或多个存储单元, 将数据的至少第一部分存储为可用的。 在执行时的可执行指令导致系统在第一次之后的第二时间生成省略标记为可用的一个或多个存储单元的第二快照。

Patent Agency Ranking