METHODS AND SYSTEMS FOR RUNNING SECURE PIPELINE TASKS AND INSECURE PIPELINE TASKS IN THE SAME HARDWARE ENTITIES

    公开(公告)号:US20240354447A1

    公开(公告)日:2024-10-24

    申请号:US18136157

    申请日:2023-04-18

    CPC classification number: G06F21/74 G06F21/54 G06F21/556

    Abstract: A system includes a hardware entity that can perform tasks in a secure mode or in an insecure mode. The system's secure resources include a secure memory and a secure logical interface (LIF). The system's insecure resources include an insecure memory and a first insecure LIF. A security mode circuit in the hardware entity can set the hardware entity to secure mode or to insecure mode. Tasks submitted via the secure LIF are performed in secure mode. Tasks submitted via the insecure LIF are performed in insecure mode. The tasks are associated with security mode status indicators that are written to the hardware entities security mode indicator to thereby set the hardware entity into secure mode or insecure mode. The hardware entity cannot access secure resources while in insecure mode.

    METHODS AND SYSTEMS FOR SELECTIVELY APPLYING A TRANSFORM TO A PACKET

    公开(公告)号:US20240129080A1

    公开(公告)日:2024-04-18

    申请号:US17965368

    申请日:2022-10-13

    CPC classification number: H04L5/0044 H04L9/0618

    Abstract: Packets may be transformed cryptographically or compressively in order to secure network communications and to preserve network bandwidth. The transformations may be applied at more than one protocol layer which can result in unnecessary operations such encrypting or compressing data that is already encrypted. This wastes processing resources. A solution is to selectively apply transformations. A network appliance can receive an initial layer packet for transmission to a network destination. The initial layer header of the initial layer packet can be used to determine an initial state indicator that indicates an initial state (e.g., encrypted, compressed, etc.) of an initial layer payload of the initial layer packet. The initial layer packet can be encapsulated in a subsequent layer packet as a subsequent layer payload. Selectively applying a transform to the subsequent layer payload based on the initial state indicator can avoid the unnecessary operation.

    METHODS AND SYSTEMS FOR DISTRIBUTED MACHINE LEARNING BASED ANOMALY DETECTION IN AN ENVIRONMENT COMPOSED OF SMARTNICS

    公开(公告)号:US20240097999A1

    公开(公告)日:2024-03-21

    申请号:US17949998

    申请日:2022-09-21

    CPC classification number: H04L43/062 G06N20/20 H04L41/16 H04L43/0823

    Abstract: Edge nodes, such as SmartNICs, routers, and switches can process the network traffic of workloads running on servers. The edge node can produce measurement streams that include measurement values produced by measuring one or more network performance metric. The measurement streams can be sent to anomaly detectors that are running on the edge nodes. The anomaly detectors can detect anomalies in the measurement streams and can report the anomalies to a person or a process designated to or subscribed for receiving the anomaly reports. An anomaly in the measurement stream can indicate anomalous network traffic and an anomaly detector can use an unsupervised machine learning model to detect the anomalies. The machine learning model may have been trained by an unsupervised machine learning algorithm that adapts the machine learning model for detecting anomalies in the measurement stream.

    Methods and systems for a stripe mode cache pool

    公开(公告)号:US11709776B2

    公开(公告)日:2023-07-25

    申请号:US17216447

    申请日:2021-03-29

    Inventor: Changqi Yang

    Abstract: N-way associative cache pools can be implemented in an N-way associative cache. Different cache pools can be indicated by pool values. Different processes running on a computer can use different cache pools. An N-way associative cache circuit can be configured to have one or more stripe mode cache pools that are N-way associative. A cache control circuit can receive a physical address for a memory location and can interpret the physical address as fields including a tag field that contains a tag value and a set field that contains a set value. The physical address can also be used to determine a pool value that identifies one of the stripe mode cache pools. A set of N cache entries in the one of the stripe mode cache pools can be concurrently searched for the tag value. The set of N cache entries is determined using the set value.

    METHODS AND SYSTEMS FOR DYNAMICALLY CREATING UPGRADE SPECIFICATIONS BASED ON PER DEVICE CAPABILITIES

    公开(公告)号:US20230221940A1

    公开(公告)日:2023-07-13

    申请号:US17573512

    申请日:2022-01-11

    CPC classification number: G06F8/65

    Abstract: Upgrading a network appliance to a second firmware is dynamically specified and implemented to minimize network disruption. The installed firmware runs in a first execution domain and the second firmware runs in safe mode in a second execution domain. Upgrade planning data is produced by monitoring service executables in the second execution domain for stage failures at various execution states. The upgrade planning data is used to produce an upgrade specification for upgrading from the installed firmware to the second firmware. The upgrade planning data can indicate that there are execution state dependencies between the service executables. The upgrade specification can be adapted for the execution state dependencies and used by a finite state machine to implement the upgrade.

    METHODS AND SYSTEMS FOR ORCHESTRATING NETWORK FLOW TRACING WITHIN PACKET PROCESSING PIPELINES ACROSS MULTIPLE NETWORK APPLIANCES

    公开(公告)号:US20230064845A1

    公开(公告)日:2023-03-02

    申请号:US17463256

    申请日:2021-08-31

    Abstract: An orchestrator can send trace directives to network appliances that indicate a network flow to trace. The network appliances can include packet processing pipelines that each include numerous processing stages. The network appliances implement network rules for processing network flows by configuring the pipeline's processing stages to execute specific policies for specific network packets in accordance with the network rules. The processing stages can also be configured to produce metadata indicating the policies implemented at each stage to process certain network packets in network flows indicated by trace directives. The metadata can be used to produce a trace report that indicates a network packet of the network flow, a first network rule that was applied to the network packet by a one of the first appliance processing stages, and the one of the first appliance processing stages that applied the first network rule to the network packet.

Patent Agency Ranking