-
公开(公告)号:US11989282B2
公开(公告)日:2024-05-21
申请号:US17471533
申请日:2021-09-10
发明人: Da Li Liu , Qi Feng Huo , Yuan Yuan Wang , Lei Li , Yan Song Liu
CPC分类号: G06F21/53 , G06F9/45558 , G06F21/57 , G06F21/602 , H04L9/30 , G06F2009/45562
摘要: A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations that include generating a key pair and encrypting a data credential with a public key to make a data credential secret. The operations may further include storing the data credential secret in a cluster on a host and deploying a workload on the cluster. The operations may also include establishing an empty bundle in the host and generating a pod trusted execution environment.
-
公开(公告)号:US11893257B2
公开(公告)日:2024-02-06
申请号:US17840762
申请日:2022-06-15
发明人: Peng Hui Jiang , FengLi Wang , Qi Feng Huo , Jun Su , Hong Qing Zhou , Yan Lin Ren , Li Zhang , Ling Ling Sh Hu
IPC分类号: G06F3/06
CPC分类号: G06F3/0646 , G06F3/0604 , G06F3/064 , G06F3/0673
摘要: A system may include a memory and a processor in communication with the memory configured to perform operations. The may operations include obtaining transaction logs in blocks from nodes of a data storage system. The operations may include, for each transaction log, splitting the transaction log into log entries, grouping log entries into groups associated with a same data source, and writing the log entries of the groups to empty blocks such that log entries from different groups do not share a same block. The operations may include identifying a same sequence of log entries from the written transaction logs and uploading first blocks of a first transaction log, including the same sequence of log entries, to an object-based storage without uploading second blocks of a second transaction log including the same sequence of log entries to the object-based storage.
-
公开(公告)号:US20230412537A1
公开(公告)日:2023-12-21
申请号:US18458938
申请日:2023-08-30
发明人: Dong Jun Zong , Da Li Liu , Qi Feng Huo , Yue Wang , Jing Xing , Jian Fang Zhang
IPC分类号: H04L51/04 , H04L51/046 , G06N3/08 , G10L15/18 , G10L15/22 , G10L15/197 , H04L51/224 , G06F18/21 , G06N3/047 , G06V30/148 , G06V30/19 , G06V10/70 , G06V10/82
CPC分类号: H04L51/04 , H04L51/046 , G06N3/08 , G10L15/1815 , G10L15/22 , G10L15/197 , H04L51/224 , G06F18/21 , G06N3/047 , G06V30/153 , G06V30/19147 , G06V30/19173 , G06V10/70 , G06V10/82
摘要: Cognitive determination of whether a message is suitable for sending over a data communications network can include extracting tokens from the message prior to transmitting the message. One or more intended recipients of the message can be determined from the tokens. A machine learning classification model corresponding to the one or more recipients of the message can be selected. The machine learning classification model can be constructed based on tokens extracted from prior messages, which are combined to create a plurality of documents for training the machine learning classification model. The one or more tokens extracted from the message can be classified using the machine learning classification model. An alert message can be generated in response to determining based on the classifying that the message is unsuited for sending.
-
公开(公告)号:US11784948B2
公开(公告)日:2023-10-10
申请号:US16776063
申请日:2020-01-29
发明人: Dong Jun Zong , Da Li Liu , Qi Feng Huo , Yue Wang , Jing Xing , Jian Fang Zhang
IPC分类号: H04L51/04 , H04L51/046 , G06N3/08 , G10L15/18 , G10L15/22 , G10L15/197 , H04L51/224 , G06F18/21 , G06N3/047 , G06V30/148 , G06V30/19 , G06V10/70 , G06V10/82
CPC分类号: H04L51/04 , G06F18/21 , G06N3/047 , G06N3/08 , G06V10/70 , G06V10/82 , G06V30/153 , G06V30/19147 , G06V30/19173 , G10L15/1815 , G10L15/197 , G10L15/22 , H04L51/046 , H04L51/224
摘要: Cognitive determination of whether a message is suitable for sending over a data communications network can include extracting tokens from the message prior to transmitting the message. One or more intended recipients of the message can be determined from the tokens. A machine learning classification model corresponding to the one or more recipients of the message can be selected. The machine learning classification model can be constructed based on tokens extracted from prior messages, which are combined to create a plurality of documents for training the machine learning classification model. The one or more tokens extracted from the message can be classified using the machine learning classification model. An alert message can be generated in response to determining based on the classifying that the message is unsuited for sending.
-
公开(公告)号:US12099863B2
公开(公告)日:2024-09-24
申请号:US17352494
申请日:2021-06-21
发明人: Qi Feng Huo , Wen Yi Gao , Si Bo Niu , Sen Wang
IPC分类号: G06F9/46 , G06F9/455 , H04L69/163
CPC分类号: G06F9/45558 , H04L69/163 , G06F2009/45587 , G06F2009/45595
摘要: Aspects include providing isolation between a plurality of containers in a pod that are each executing on a different virtual machine (VM) on a host computer. Providing the isolation includes converting a data packet into a serial format for communicating with the host computer. The converted data packet is sent to a router executing on the host computer. The router determines a destination container in the plurality of containers based at least in part on content of the converted data packet and routes the converted data packet to the destination container.
-
公开(公告)号:US20230070224A1
公开(公告)日:2023-03-09
申请号:US17467518
申请日:2021-09-07
发明人: Qi Feng Huo , XIAOJING LIU , Dan Qing Huang , Lei Li , Da Li Liu , YUAN YUAN WANG , Yan Song Liu
IPC分类号: G06F9/455
摘要: Embodiments are directed to using remote pods. An intermediary software is instantiated in a worker node virtual machine and is used to cause a pod virtual machine to be created, the pod virtual machine being remote from the worker node virtual machine. An overlay network is established between the intermediary software in the worker node virtual machine and a pod space in the pod virtual machine. The overlay network is used to cause containers to be created in the pod virtual machine, where the worker node virtual machine is configured to use the overlay network to manage communications with the pod virtual machine.
-
公开(公告)号:US11579830B2
公开(公告)日:2023-02-14
申请号:US16176845
申请日:2018-10-31
发明人: Dong Jun Zong , Da Li Liu , Yue Wang , Jing Xing , Jian Fang Zhang , Qi Feng Huo
摘要: Embodiments generally enable a mobile device to display a window of a remote desktop on a mobile device with a native layout. In some embodiments, a method includes receiving a remote desktop display request from a mobile client device, wherein the remote desktop display request includes display information of the mobile client device. The method further includes generating a copy of a window process of a remote desktop computer. The method further includes generating a virtual display based at least in part on the copy of the window process of the remote desktop computer and on the display information of the mobile client device. The method further includes sending virtual display information to the mobile client device based at least in part on the virtual display.
-
公开(公告)号:US20230032363A1
公开(公告)日:2023-02-02
申请号:US17443468
申请日:2021-07-27
发明人: Qi Feng Huo , Yan Song Liu , Da Li Liu , Lei Li , YUAN YUAN WANG
摘要: In a method for encryption of sensitive data, an encrypted user private key is received in a Trusted Execution Environment (TEE) in a worker node in a container management system, the encrypted user private key being an encrypted version of a user private key for decrypting a message from a user in the container management system. The user private key is obtained in the TEE, and the encrypted user private key being decrypted into the user private key with a provider private key that is received from an encryption manager for managing the container management system. With these embodiments, the user private key may be transmitted to the worker node safely, such that the worker node may use the user private key to decrypt messages from the user. Therefore, the security level of the container management system may be increased.
-
公开(公告)号:US11366683B2
公开(公告)日:2022-06-21
申请号:US16734279
申请日:2020-01-03
发明人: Yuan Yuan Wang , Qi Feng Huo , Da Li Liu , Cdl Lei Li , Yan Song Liu , Tian Xiaoyi , Shu Chao Wan
IPC分类号: G06F9/46 , G06F9/455 , G06N3/04 , G06F16/955
摘要: A process deployment controller creates an updated image for an intermediary engine in order to execute one or more applications on a host infrastructure. The process deployment controller generates a partial image by executing source code from a template repository. The partial image provides a structure used to create an intermediary engine used with a container, which includes an application, as well as binaries and libraries required to execute the application in an infrastructure via the intermediary engine. The process deployment controller transmits an identifier of the infrastructure to a component registry; receives a component description of the infrastructure from the component registry; and uses the component description to create an updated image of the partial image. The process deployment controller, upon receiving a request for the application to run on the infrastructure, utilizes the updated image and intermediary engine to execute the application on the infrastructure.
-
公开(公告)号:US12118380B2
公开(公告)日:2024-10-15
申请号:US17467523
申请日:2021-09-07
发明人: Qi Feng Huo , Da Li Liu , Yuan Yuan Wang , Lei Li , Yan Song Liu
IPC分类号: G06F9/455 , G06F9/445 , H04L67/1097 , H04L67/561
CPC分类号: G06F9/45558 , G06F9/44505 , H04L67/1097 , H04L67/561 , G06F2009/45583 , G06F2009/45595
摘要: Embodiments are directed to a container storage system in remote pods. A worker node virtual machine determines that a volume is available for attachment to the worker node virtual machine. An intermediary software of the worker node virtual machine causes a pod container storage interface to attach the volume to a pod virtual machine. in response to attaching the volume to the pod virtual machine, the intermediary software of the worker node virtual machine causes the pod container storage interface to mount the volume to the pod virtual machine such that the volume is available for use by the pod virtual machine.
-
-
-
-
-
-
-
-
-