REMOTE ATTESTATION OF HOST DEVICES
    21.
    发明申请

    公开(公告)号:US20190196843A1

    公开(公告)日:2019-06-27

    申请号:US16289384

    申请日:2019-02-28

    Abstract: Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network.

    PERFORMANCE TUNING OF VIRTUAL RESOURCES
    22.
    发明申请

    公开(公告)号:US20190163538A1

    公开(公告)日:2019-05-30

    申请号:US16263485

    申请日:2019-01-31

    Abstract: A set of techniques is described for enabling a user of a virtual resource to specify to the hosting system a preferred performance parameter such as throughput, latency, CPU utilization, or the like. The hosting system then dynamically tunes the underlying resources to favor the preferred performance parameter. Tuning the settings may include adjusting various batching and moderating processes that are available on the hosting device, such as enabling/disabling interrupt coalescing, enabling/disabling segmentation offload, increasing or decreasing the size of a ring buffer used to share data between several resources, batching input/output (I/O) operations and the like. For example, if the user has indicated that lower latency is preferable, the hosting system may disable interrupt coalescing; whereas if the user has indicated that higher throughput should be favored, the hosting system may enable interrupt coalescing.

    Network policy implementation with multiple interfaces

    公开(公告)号:US10162654B2

    公开(公告)日:2018-12-25

    申请号:US14968625

    申请日:2015-12-14

    Abstract: The transmission of data on computer networks according to one or more policies is disclosed. A policy may specify, among other things, various parameters which are to be followed when transmitting initiating network traffic. Multiple network interfaces may be installed on a server to enable transmission of data from the single server according a number of discrete configuration settings implicated by the various policies. The multiple network interfaces may correspond to separate physical components, with each component configured independently to implement a feature of a policy. The multiple network interfaces may also correspond to a single physical component that exposes multiple network interfaces, both to the network and to the server on which it is installed.

    Random next iteration for data update management

    公开(公告)号:US10148744B2

    公开(公告)日:2018-12-04

    申请号:US15276491

    申请日:2016-09-26

    Abstract: Host machines and other devices performing synchronized operations can be dispersed across multiple racks in a data center to provide additional buffer capacity and to reduce the likelihood of congestion. The level of dispersion can depend on factors such as the level of oversubscription, as it can be undesirable in a highly connected network to push excessive host traffic into the aggregation fabric. As oversubscription levels increase, the amount of dispersion can be reduced and two or more host machines can be clustered on a given rack, or otherwise connected through the same edge switch. By clustering a portion of the machines, some of the host traffic can be redirected by the respective edge switch without entering the aggregation fabric. When provisioning hosts for a customer, application, or synchronized operation, for example, the levels of clustering and dispersion can be balanced to minimize the likelihood for congestion throughout the network.

    AUTOMATED PROFILING OF RESOURCE USAGE
    25.
    发明申请

    公开(公告)号:US20180332107A1

    公开(公告)日:2018-11-15

    申请号:US16020477

    申请日:2018-06-27

    CPC classification number: H04L67/1008 G06F9/5044 H04L41/0806

    Abstract: Operating profiles for consumers of computing resources may be automatically determined based on an analysis of actual resource usage measurements and other operating metrics. Measurements may be taken while a consumer, such as a virtual machine instance, uses computing resources, such as those provided by a host. A profile may be dynamically determined based on those measurements. Profiles may be generalized such that groups of consumers with similar usage profiles are associated with a single profile. Assignment decisions may be made based on the profiles, and computing resources may be reallocated or oversubscribed if the profiles indicate that the consumers are unlikely to fully utilize the resources reserved for them. Oversubscribed resources may be monitored, and consumers may be transferred to different resource providers if contention for resources is too high.

    Updating processor microcode
    26.
    发明授权

    公开(公告)号:US10055593B2

    公开(公告)日:2018-08-21

    申请号:US15056826

    申请日:2016-02-29

    CPC classification number: G06F21/602 G06F21/572 H04L9/0838 H04L9/30

    Abstract: Approaches are described for updating code and/or instructions in one or more computing devices. In particular, various embodiments provide approaches for updating the microcode of one or more processors of a computing device without requiring a restart of the computing device and without disrupting the various components (e.g., applications, virtual machines, etc.) executing on the computing device. The microcode updates can be performed on host computing devices deployed in a resource center of a service provider (e.g., cloud computing service provider), where each host computing device may be executing a hypervisor hosting multiple guest virtual machines (or other guest applications) for the customers of the service provider.

    Reconfigurable backup battery unit
    27.
    发明授权

    公开(公告)号:US09891685B1

    公开(公告)日:2018-02-13

    申请号:US13865094

    申请日:2013-04-17

    CPC classification number: G06F1/30 G06F1/32

    Abstract: A backup battery unit that can be reconfigured to provide different currents and/or voltages depending upon load conditions. The backup battery unit can be reconfigured, for example, between a configuration in which battery cells for the battery unit are wired in series to a configuration where the battery cells are wired in parallel. Additional embodiments are directed to a backup battery unit that can isolate a battery cell and remove the cell from a circuit for the battery while the battery is under load or being charged. The isolated cell can then be serviced or tested.

    Remote attestation of host devices
    28.
    发明授权

    公开(公告)号:US09619238B2

    公开(公告)日:2017-04-11

    申请号:US13863296

    申请日:2013-04-15

    Abstract: Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network.

    Datacenter event handling
    29.
    发明授权
    Datacenter event handling 有权
    数据中心事件处理

    公开(公告)号:US09594721B1

    公开(公告)日:2017-03-14

    申请号:US13693793

    申请日:2012-12-04

    Abstract: Systems and methods for handling resources in a computer system differently in certain situations, such as catastrophic events, based upon an assigned layer of the resource to the system. The layer can be based, for example, on criticality of the resource to the system. Services or computing device resources can be physically segregated in accordance with layers and can be managed in accordance with the segregation. In response to receiving information about an event, the different layers can be handled in accordance with their criticality, for example by shutting some of the resources down and/or slowing some of the resources down.

    Abstract translation: 在某些情况下,例如灾难性事件,基于资源分配给系统的层,在计算机系统中处理资源的系统和方法不同。 该层可以基于例如资源对系统的关键性。 服务或计算设备资源可以根据层物理隔离,并且可以根据隔离进行管理。 响应于接收关于事件的信息,可以根据其关键性来处理不同的层,例如通过将一些资源关闭和/或将某些资源减慢下来来进行。

    Host recovery using a secure store
    30.
    发明授权
    Host recovery using a secure store 有权
    使用安全存储进行主机恢复

    公开(公告)号:US09594638B2

    公开(公告)日:2017-03-14

    申请号:US13862923

    申请日:2013-04-15

    CPC classification number: G06F11/1417 G06F21/57

    Abstract: Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network.

    Abstract translation: 描述了使主计算设备能够存储用于在主计算设备上的安全存储(诸如可信平台模块(TPM))中恢复主计算设备的状态的凭证和其他安全信息的方法。 在主机计算设备发生故障(例如断电,网络故障等)时,主机计算设备可以从安全存储中获得必要的凭证,并使用这些凭据来启动各种服务,恢复状态 的主机,并执行各种其他功能。 此外,安全存储(例如,TPM)可以将主机计算设备的引导固件测量和远程认证提供给网络上的其他设备,例如当恢复的主机需要与网络上的其他设备进行通信时。

Patent Agency Ranking