VMware LLC

United States of America

Back to Profile

1-100 of 5,697 for VMware LLC Sort by
Query
Aggregations
IP Type
        Patent 5,505
        Trademark 192
Jurisdiction
        United States 5,574
        Europe 60
        Canada 54
        World 9
Date
New (last 4 weeks) 84
2025 February (MTD) 4
2025 January 109
2024 December 36
2024 November 27
See more
IPC Class
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines 2,042
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU] 808
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 574
H04L 29/06 - Communication control; Communication processing characterised by a protocol 525
H04L 12/24 - Arrangements for maintenance or administration 500
See more
NICE Class
09 - Scientific and electric apparatus and instruments 131
42 - Scientific, technological and industrial services, research and design 129
41 - Education, entertainment, sporting and cultural services 41
35 - Advertising and business services 10
38 - Telecommunications services 9
See more
Status
Pending 1,067
Registered / In Force 4,630
  1     2     3     ...     57        Next Page

1.

MONITORING AND CORRECTING CONFIGURATION AND CONFIGURATION DRIFT IN CLOUD ACCOUNTS

      
Application Number 18378678
Status Pending
Filing Date 2023-10-11
First Publication Date 2025-02-13
Owner VMWARE LLC (USA)
Inventor
  • Kedia, Sumit Suresh
  • Lokare, Pranali Pravin
  • Wagh, Ashitosh Dilip
  • Jain, Manoj Kumar
  • Malode, Priyanka Rajesh

Abstract

Systems, apparatus, articles of manufacture, and methods are disclosed that monitor and correct for configuration drift in cloud accounts by instantiating or executing machine-readable instructions to access target state configuration information from a first user account for a cloud account, onboard the cloud account at a first time to configure cloud resources based on the target state configuration information, detect a first drift between the target state configuration information and an in-use configuration state of the cloud account at a second time, log a corresponding change in the in-use configuration state relative to the target state configuration information, the first event record logged in a timeline of second event records representing second drifts of the cloud account relative to the target state configuration information, and after the detection of the first drift, change an in-use configuration of the cloud account based on the target state configuration information.

IPC Classes  ?

2.

VALIDATION OF CLOUD PROVIDER APPLICATION PROGRAMMING INTERFACE (API) PRIVILEGES

      
Application Number 18379202
Status Pending
Filing Date 2023-10-12
First Publication Date 2025-02-13
Owner VMware LLC (USA)
Inventor
  • Balla, Suresh
  • Meshram, Umedh

Abstract

Systems, apparatus, articles of manufacture, and methods are disclosed for template generation to enforce desired states on cloud accounts. An example apparatus disclosed herein includes programmable circuitry to access a privilege from a cloud account, the privilege associated with a resource to be deployed based on a template, validate the privilege relative to template privileges specified in the template, secure the resource before deployment of the resource by imputing a privilege access condition to the resource based on the privilege satisfying at least one of the template privileges, and deploy the resource based on the template in a secure state, the secure state corresponding to the privilege access condition.

IPC Classes  ?

3.

AGENT STATE MANAGEMENT FOR VIRTUAL COMPUTING INSTANCES

      
Application Number 18379201
Status Pending
Filing Date 2023-10-12
First Publication Date 2025-02-13
Owner VMWARE, LLC. (USA)
Inventor
  • Desai, Rushit Nilay
  • Ogale, Nakul Ranjan
  • Mankapure, Umesh Prakash

Abstract

A management node may include a storage device to store mapping information associating an identifier of a virtual computing instance deployed in a data center with an identifier of an agent that runs in the virtual computing instance. Further, the management node may an agent management module to receive an event notification indicating a state change of the virtual computing instance from an infrastructure management component residing in the data center. The event notification may include the identifier of the virtual computing instance. In response to receiving the event notification, the agent management module may determine the agent that is likely to affect due to the state change of the virtual computing instance based on mapping information and the identifier of the virtual computing instance. Further, the agent management module may manage a state of the agent based on the state change of the virtual computing instance.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

4.

THREAD POOL MANAGEMENT FOR DATA TRANSFER BETWEEN INTEGRATED PRODUCTS

      
Application Number 18380160
Status Pending
Filing Date 2023-10-14
First Publication Date 2025-02-06
Owner VMware LLC (USA)
Inventor
  • Kolkar, Amit
  • Devarakonda, Kalyan
  • Kotta, Srikant
  • Nayak, Ranjit

Abstract

An example method may include executing, using an integration plugin installed on a first integrated product running in a first management node, a first schedule job to assess the first management node for a specified period of time or for a specified number of assessments. Further, a check is made to determine, using the integration plugin, whether a thread in a thread pool of the first management node is idle after the specified period of time or the specified number of assessments. Based on the whether the thread is idle, a number of threads allocated for data transfer between a second management node executing a second integrated product and the first management node may be altered using the integration plugin. Based on the altered number of threads, the data transfer between the second management node and the first management node may be performed using the integration plugin.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 9/54 - Interprogram communication

5.

CONFIGURATION OF SERVICE PODS FOR LOGICAL ROUTER

      
Application Number 18225554
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Ying, Yu
  • Gupta, Pankaj
  • Fan, Kai-Wei
  • Tan, Stephen
  • Ravinoothala, Sreeram Kumar
  • Wang, Yong

Abstract

Some embodiments provide a method for configuring a first Pod in a container cluster to perform layer 7 (L7) services for a logical router. At a second Pod that performs logical forwarding operations for the logical router, the method receives configuration data for the logical router from a network management system that defines a logical network for which the logical router routes data messages and performs L7 services. The method provides a set of Pod definition data to a cluster controller to create the first Pod. After creation of the first Pod, the method provides to the first Pod (i) networking information to enable a connection between the first and second Pods and (ii) configuration data defining the L7 services for the first Pod to perform the L7 services on data traffic sent from the second Pod to the first Pod.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

6.

CONNECTIVITY BETWEEN LOGICAL ROUTER PODS

      
Application Number 18225559
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Ying, Yu
  • Wang, Yong
  • Gupta, Pankaj
  • Ravinoothala, Sreeram Kumar

Abstract

Some embodiments provide a method for implementing a logical router of a logical network at a first Pod executing on a first node of a Kubernetes cluster to implement data message forwarding for the logical router. The method receives a data message for processing by the logical router. The method determines that the data message requires layer 7 (L7) service processing at the logical router. The method selects a second Pod from multiple Pods that perform L7 service for the logical router. Each of the Pods executes on a different node of the cluster. The method forwards the data message to the second Pod via a layer 2 (L2) construct that connects the first and second Pods.

IPC Classes  ?

  • H04L 45/76 - Routing in software-defined topologies, e.g. routing between virtual machines
  • H04L 45/586 - Association of routers of virtual routers
  • H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering

7.

USING PNICS TO PERFORM FIREWALL OPERATIONS

      
Application Number 18229633
Status Pending
Filing Date 2023-08-02
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Rolando, Pierluigi
  • Li, Peng
  • Ang, Boon S.
  • Yang, Guolin
  • Jiang, Wenyi
  • Zhang, Yuxiao
  • Koganty, Raju
  • Manuguri, Subrahmanyam
  • Liew, Kok Pyng
  • Heo, Jin
  • Suriyanarayanan Thillaisthanam, Srinath

Abstract

Some embodiments provide a novel method for offloading firewall operations from a host computer executing a set of one or more virtual machines (VMs) to a physical network interface card (PNIC) connected to the host computer. The method configures, on the PNIC, a first firewall to determine actions to perform on flows associated with the set of VMs, and to offload processing of the flows to a flow-cache second firewall of the PNIC. The method configures, on the PNIC, the flow-cache second firewall to process a first set of flows based on a first set of actions determined by the first firewall, and to offload processing of a second set of flows to an embedded hardware switch of the PNIC. The method configures, on the PNIC, the embedded hardware switch to process the second set of flows based on a second set of actions determined by the first firewall.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

8.

MIGRATING VIRTUAL MACHINES WHILE PERFORMING MIDDLEBOX SERVICE OPERATIONS AT A PNIC

      
Application Number 18229644
Status Pending
Filing Date 2023-08-02
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Rolando, Pierluigi
  • Li, Peng
  • Ang, Boon S.
  • Yang, Guolin
  • Jiang, Wenyi
  • Zhang, Yuxiao
  • Koganty, Raju
  • Manuguri, Subrahmanyam
  • Liew, Kok Pyng
  • Heo, Jin
  • Suriyanarayanan Thillaisthanam, Srinath

Abstract

Some embodiments provide a novel method for migrating virtual machines (VMs) from a first host computer to a second host computer. The first host computer is connected to a physical network interface card (PNIC) that performs middlebox service operations for flows associated with the VMs. At the PNIC, the method receives a notification that a VM is to be migrated from the first to the second host computer. The method configures an embedded hardware switch of the PNIC to forward a set of flows associated with the VM to a firewall of the PNIC. The embedded hardware switch was initially programmed to process the set of flows instead of the firewall. The method synchronizes flow cache information regarding the set of flows from the embedded hardware switch to the firewall. The method processes the set of flows at the firewall until the VM is migrated to the second host computer.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 41/0897 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities

9.

MAINTAINING FIREWALL RULES AT A PNIC THAT PERFORMS FIREWALL OPERATIONS ON DATA MESSAGE FLOWS

      
Application Number 18229646
Status Pending
Filing Date 2023-08-02
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Rolando, Pierluigi
  • Li, Peng
  • Ang, Boon S.
  • Yang, Guolin
  • Jiang, Wenyi
  • Zhang, Yuxiao
  • Koganty, Raju
  • Manuguri, Subrahmanyam
  • Liew, Kok Pyng
  • Heo, Jin
  • Suriyanarayanan Thillaisthanam, Srinath

Abstract

Some embodiments provide a novel method for updating firewall rules for data message flows processed at a physical network interface card (PNIC) connected to a host computer. A firewall of the PNIC receives an update to a particular firewall rule. The firewall identifies a particular data message flow that is processed at an embedded hardware switch of the PNIC using the particular firewall rule. The firewall updates a flow record associated with the particular data message flow to reflect the received update to the particular firewall rule. The firewall provides the updated flow record to the embedded hardware switch for the embedded hardware switch to process the particular flow according to the received update.

IPC Classes  ?

10.

USING CONNECTION TRACKING RECORDS TO PROCESS DATA MESSAGE FLOWS AT A PNIC

      
Application Number 18229647
Status Pending
Filing Date 2023-08-02
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Rolando, Pierluigi
  • Li, Peng
  • Ang, Boon S.
  • Yang, Guolin
  • Jiang, Wenyi
  • Zhang, Yuxiao
  • Koganty, Raju
  • Manuguri, Subrahmanyam
  • Liew, Kok Pyng
  • Heo, Jin
  • Suriyanarayanan Thillaisthanam, Srinath

Abstract

Some embodiments provide a novel method for using connection tracking records to process data messages at a physical network interface card (PNIC) connected to a host computer. A first software firewall of the PNIC determines whether processing of a flow is passable to a second software firewall of the PNIC and to a third hardware firewall of the PNIC. The first software firewall creates a connection tracking record for the flow and data specifying whether processing of the flow is passable to the second software firewall and independently whether processing of the flow is passable to the third hardware firewall. The first software firewall provides the connection tracking record and said data to the second software firewall of the PNIC so that the second software firewall processes the flow or passes the connection tracking record and the data to the third hardware firewall if determination was that the flow is passable to the third hardware firewall.

IPC Classes  ?

11.

METHODS AND APPARATUS TO RESOLVE CONFLICTS BETWEEN MULTIPLE AUTOMATION SYSTEMS

      
Application Number 18357837
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Rangwala, Saifuddin Fazlehusen
  • Meena, Amit

Abstract

Systems, apparatus, articles of manufacture, and methods are disclosed to resolve conflicts between multiple automation systems. An example apparatus includes interface circuitry, machine readable instructions, and programmable circuitry to at least one of instantiate or execute the machine readable instructions to: cause storage of records indicative of configuration changes made to a computing resource; generate a time series based on the records; analyze the time series to determine if a configuration change conflict is detected; and after detection of a configuration change conflict, generate a notification of the configuration change conflict.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

12.

PASSWORD MANAGEMENT OF VIRTUAL MACHINES FOR MIGRATION SUPPORT

      
Application Number 18378158
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Sharma, Dinesh
  • Sahu, Amiya
  • Garg, Himanshu
  • Sheldon, Jeffrey W.

Abstract

Examples of the disclosure are directed to password management of virtual machines in a virtual machine environment. A password can be obtained that corresponds to a virtual machine. The password can be associated with a password identifier that is generated independent of a storage location of the files associated with the virtual machine. An operating system password vault can be utilized that stores the password and password identifier.

IPC Classes  ?

  • G06F 21/45 - Structures or tools for the administration of authentication
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

13.

METHODS AND APPARATUS TO MANAGE CONFIGURATIONS OF CLOUD RESOURCES

      
Application Number 18378163
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Rangwala, Saifuddin Fazlehusen
  • Balla, Suresh
  • Meena, Amit
  • Dengle, Nilesh Kisanrao
  • Shah, Neeraj Pramod

Abstract

Systems, apparatus, articles of manufacture, and methods are disclosed to manage configuration of a cloud resource. An example system disclosed herein to manage configuration of a cloud resource includes programmable circuitry to at least one of execute or instantiate machine-readable instructions to compare a cloud resource configuration state with a cloud resource target configuration, generate an updated cloud resource configuration specification based on a difference between the cloud resource configuration state and the cloud resource target configuration, and cause an update of a cloud resource configuration parameter in a cloud provider based on the updated cloud resource configuration specification.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

14.

NETWORK STATUS VISUALIZATION FOR MONITORING AND CONFIGURATION

      
Application Number 18378689
Status Pending
Filing Date 2023-10-11
First Publication Date 2025-01-30
Owner VMware LLC. (USA)
Inventor
  • Khadamkar, Omkar
  • Vaidyula, Pavan
  • Parashar, Shrinivas Sharad
  • Bali, Priyanka

Abstract

Example methods and systems for network status visualization are described. In one example, a computer system may obtain status information associated with a set of multiple object-attribute pairs. Each object-attribute pair may include one of multiple objects and one of multiple attributes. The computer system may generate and display a user interface (UI) view that includes an array of multiple interactive UI elements to display the status information. In response to detecting a first interaction with a first interactive UI element, the computer system may update the UI view to display and enable selection of a first action. In response to detecting a second interaction with a second interactive UI element, the computer system may update the UI view to display and enable selection of a second action.

IPC Classes  ?

  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/16 - Sound inputSound output
  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data

15.

SELECTIVE MALWARE SCANNING OF FILES ON VIRTUALIZED SNAPSHOTS

      
Application Number 18379699
Status Pending
Filing Date 2023-10-13
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Nanivadekar, Mandar
  • Soman, Leena Shuklendu
  • Weissman, Boris

Abstract

The disclosure herein describes scanning a snapshot of a virtualized computing instance (VCI) for malware. A VCI snapshot associated with a version of a malware infected VCI is scanned for malware. The malware scanning includes selecting a first file of the VCI snapshot and determining that a file, in a previously scanned VCI snapshot associated with another version of the malware infected VCI, which corresponds to the selected first file has a clean reputation indicator. Further, it is determined that the metadata of the selected first file matches metadata of the corresponding file. Based on these determinations, the malware scanning proceeds to scan the next file for malware without scanning the selected first file for malware.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

16.

VIRTUAL PROCESSING UNIT SCHEDULING IN A COMPUTING SYSTEM

      
Application Number 18380218
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Chaurasia, Avinash Kumar
  • Garg, Anshuj
  • Kurkure, Uday Pundalik
  • Sivaraman, Hari
  • Vu, Lan
  • Veeraswamy, Sairam

Abstract

An example computer system includes a hardware platform including a processing unit and software executing on the hardware platform. The software includes a workload and a scheduler, the workload including a network function chain having network functions, the scheduler configured to schedule the network functions for execution on the processing unit. A downstream network function includes a congestion monitor configured to monitor a first receive queue supplying packets to the downstream network function, the congestion monitor configured to compare occupancy of the first receive queue against a queue threshold. An upstream network function including a rate controller configured to receive a notification from the congestion monitor generated in response to the occupancy of the first receive queue exceeding the queue threshold, the rate controller configured to modify a rate of packet flow between a second receive queue and the upstream network function in response to the notification.

IPC Classes  ?

  • H04L 47/12 - Avoiding congestionRecovering from congestion
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • H04L 47/25 - Flow controlCongestion control with rate being modified by the source upon detecting a change of network conditions

17.

CONTAINERIZED MICROSERVICE ARCHITECTURE FOR MANAGEMENT APPLICATIONS

      
Application Number 18380658
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-01-30
Owner VMWARE, LLC. (USA)
Inventor
  • Rajasekar, Varun
  • Mutalik, Chandrika
  • Kodenkiri, Akash
  • Mishra, Shweta
  • Gorai, Krishnendu

Abstract

An example method for implementing a microservice architecture for a management application may include deploying a first service of the management application on a first container running on a container host. Further, the method may include employing a service-to-service communication mechanism to control communication between the first service and a second service of the management application. Furthermore, the method may include employing an inter-process communication mechanism to control communication between the first service and the container host using named pipes and employing a proxy to control communication between the first service and an external application in an external device. Further, the method may include enabling a container orchestrator to monitor and manage the first service.

IPC Classes  ?

18.

ENTITLEMENT SERVICE HIERARCHY IN A CLOUD

      
Application Number 18451624
Status Pending
Filing Date 2023-08-17
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Lin, Bo
  • Jiang, Caixia
  • Liang, Xiao
  • Zeng, Xi
  • Wu, Qi

Abstract

An example method of entitling software in a cloud includes: receiving, from an entitlement agent of the software, an entitlement request at a first entitlement proxy of an entitlement service executing in the cloud; determining, by the entitlement proxy, an entitlement of the software in response to the entitlement request based on an entitlement specification, the entitlement specification provided by an entitlement root of the entitlement service; and sending, by the entitlement proxy, the entitlement to the entitlement agent for application to the software.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

19.

CONFIGURING A VIRTUAL DESKTOP IN A VEHICLE DEVICE FOR DATA ANALYTICS

      
Application Number 18765928
Status Pending
Filing Date 2024-07-08
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor Beveridge, Daniel J.

Abstract

Some embodiments provide a novel method for analyzing data collected by a vehicle at a first location. On a first device operating in the vehicle, the method instantiates a virtual desktop first virtual machine (VM) for remote use of the first device by a remote user that uses a remote second device at a remote second location. The method instantiates a data collection second VM for local use of the first device to collect a set of data at the first location and store the set of data at the vehicle. The method facilitates interaction between the virtual desktop first VM and the remote user over a network for the remote user to access the data collection second VM to analyze the set of data without needing to forward the set of data over the network to the remote second device.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

20.

LIFECYCLE MANAGEMENT OF IN-VEHICLE HOSTED MACHINES

      
Application Number 18765918
Status Pending
Filing Date 2024-07-08
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor Beveridge, Daniel J.

Abstract

Some embodiments provide a novel method for efficiently updating software of virtual machines (VMs) executing on devices in a vehicle such that updates to the software do not interrupt operations performed by the VMs. While the vehicle operates, the method collects configuration state information of a first VM executing on a device and performing a set of operations. The method uses the configuration state information to instantiate a second VM in an isolated network environment that is isolated from the first VM. The second VM is identical to the first VM at a particular time the configuration state information was collected. The method updates the second VM, and detects a compute downtime of the vehicle. During the compute downtime, the method uses the updated second VM on the device instead of the first VM such that the updated second VM performs the set of operations once the compute downtime ends.

IPC Classes  ?

  • G06F 8/656 - Updates while running
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

21.

REMOTELY PERFORMING DATA ANALYSIS USING A VIRTUAL DESKTOP

      
Application Number 18765934
Status Pending
Filing Date 2024-07-08
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor Beveridge, Daniel J.

Abstract

Some embodiments provide a novel method for remotely performing data analysis on a set of data collected using a first device operating in a vehicle at a first location. At a remote second device used by a remote user at a remote second location, the method accesses, over a network, a first VM executing on the first device allowing remote use of a second VM executing on the first device to produce analysis results of data that is collected and stored at the vehicle. The method uses the first VM (1) to direct the second VM to analyze the set of data to produce a set of analysis results, (2) to generate a rendered image that shows the set of analysis results, and (3) to forward the rendered image through the network to the remote second device for the remote user to view the set of analysis results.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

22.

SYSTEM AND METHOD FOR MIGRATING PARTIAL TREE STRUCTURES OF VIRTUAL DISKS BETWEEN SITES USING A COMPRESSED TRIE

      
Application Number 18788008
Status Pending
Filing Date 2024-07-29
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Balachandran, Vipin
  • Pannem, Hemanth Kumar

Abstract

System and computer-implemented method for migrating partial tree structures of virtual disks for virtual computing instances between sites in a computer system uses a compressed trie, which is created from target tree structures of virtual disks at a plurality of target sites in the computer system. For a virtual computing instance selected, the compressed trie is used to find candidate target sites based on a disk chain string of the virtual computing instance. For each candidate target site, a cost value for migrating the virtual computing instance along with a partial source tree structure of virtual disks corresponding to the virtual computing instance from the source site to the candidate target site is calculated to select a target site with a lowest cost value as a migration option to reduce storage resource usage in the computer system.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

23.

RESOURCE USAGE QUOTA ENFORCEMENT FOR ON-PREMISES AND CLOUD DEPLOYMENTS

      
Application Number 18225183
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Dimitrov, Alexander
  • Shindova, Zorka
  • Dimitrov, Plamen
  • Georgieva, Simona
  • Mateeva, Adelina

Abstract

An example method may include generating a license key for a product that manages resources in a data center by encoding client product license data. The client product license data may include a first resource usage quota for an on-premises version of the product and a second resource usage quota for a cloud version of the product. Further, the method may include enabling activation of the on-premises version and the cloud version of the product using the licensed key. Furthermore, the method may include monitoring license usage data associated with the on-premises version and the cloud version. Further, the method may include analyzing the monitored license usage data to ensure compliance of the first resource usage quota and the second resource usage quota for the on-premises version and the cloud version, respectively.

IPC Classes  ?

24.

VIRTUAL INFRASTRUCTURE PROVISIONING ON GOVERNMENT CERTIFICATION COMPLIANT AND NON-COMPLIANT ENDPOINTS BASED ON CONFIGURATION

      
Application Number 18225458
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Dimitrov, Alexander
  • Delcheva, Anna
  • Pavlov, Daniel
  • Draganchev, Martin
  • Aronov, Evgeny

Abstract

The present disclosure is related to devices, systems, and methods for virtual infrastructure provisioning on government compliant and non-compliant endpoints based on configuration. One embodiment includes receiving a request made by a user to provision a catalog item in a cloud computing environment, determining that the user is assigned to a project required to comply with governmental requirements concerning virtual infrastructure, selecting a cloud zone of a cloud region in which to provision the catalog item, wherein the cloud region is configured to provide compliance with the governmental requirements, and deploying the provisioned catalog item in the selected cloud zone.

IPC Classes  ?

  • G06Q 10/10 - Office automationTime management
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 10/105 - Human resources

25.

UNDERLAY-BASED TCP SEGMENTATION OFFLOAD IN OVERLAY NETWORKS

      
Application Number 18225638
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Mathew, Subin Cyriac
  • Ang, Boon Seong
  • Jiang, Wenyi
  • Raman, Chidambareswaran
  • Catrouillet, Jerome
  • Song, Sichen

Abstract

Examples described herein include efficient data packet transmission between virtual machines (“VMs”) on different hosts. An example method includes generating a large data packet at a source VM and determining a modified maximum segment size for efficient transmission. This modified size replaces the default maximum segment size through a TSO MSS override. Segmentation occurs based on the modified size, and the data segments are transmitted to the destination VM, even if on a different host. Dynamic determination of the modified size optimizes data transmission efficiency and network performance. It accounts for network headers and enables efficient transmission with or without large receiving offload (“LRO”) support. Additionally, non-transitory computer-readable media and servers implementing the method are disclosed. These systems and methods achieve streamlined data transmission, improving network performance and reducing processing overhead.

IPC Classes  ?

  • H04L 47/122 - Avoiding congestionRecovering from congestion by diverting traffic away from congested entities
  • H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering
  • H04L 47/78 - Architectures of resource allocation

26.

INCORPORATION OF SD-WAN QUALITY OF SERVICE INTO MAPPING APPLICATION ROUTE OPTIMIZATION

      
Application Number 18225720
Status Pending
Filing Date 2023-07-25
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor Beveridge, Daniel J.

Abstract

Some embodiments provide a novel method for selecting a route for a vehicle traveling from a first location to a second location. For each of a set of two or more candidate navigation routes from the first location to the second location, the method computes (1) a first-metric route score representing a first quality of the candidate navigation route according to a first set of route navigation metrics relating to the vehicle's navigation from the first location to the second location, and (2) a second-metric route score representing a second quality of the candidate navigation route according to a second set of wireless connectivity metrics relating to connectivity of one or more wireless devices operating in the vehicle. Based on the first and second metric route scores, the method uses one navigation route to provide navigation instructions for the vehicle's navigation from the first location to the second location.

IPC Classes  ?

27.

SYSTEM AND METHOD FOR ENABLING OPERATIONS FOR VIRTUAL COMPUTING INSTANCES WITH PHYSICAL PASSTHRU DEVICES

      
Application Number 18225914
Status Pending
Filing Date 2023-07-25
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Gadi, Sowgandh Sunil
  • Vandrovec, Petr
  • Ghanta, Harsha Vardhan
  • Ramanathan, Arunachalam
  • Yuan, Yijiang
  • Covelli, Doug
  • Tallapragada, Balakrishna

Abstract

System and method for enabling operations for virtual computing instances with physical passthru devices includes moving an input-output memory management unit (IOMMU) domain from a source virtual computing instance having a physical passthru device to a destination virtual computing instance, where guest operations are performed in the source virtual computing instance. After the destinating virtual computing instance is powered on, any interrupt notifications from the physical passthru device are buffered. After memory data is transferred from the source virtual computing instance to the destination virtual computing instance, posting of interrupt notifications from the physical passthru device is resumed and any buffered interrupt notifications from the physical passthru device are posted. Guest operations are performed in the destination virtual computing instance.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

28.

ADJUSTED GROUP EXECUTION FRAMEWORK FOR MONOLITHIC APPLICATIONS WITH PREDICTIVE DIAGNOSTICS

      
Application Number 18226947
Status Pending
Filing Date 2023-07-27
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Amirkhanyan, Eduard
  • Poghosyan, Arnak
  • Harutyunyan, Ashot Nshan
  • Petrosyan, Ara
  • Abrahamyan, Karlen

Abstract

The present disclosure is directed to an adjusted group execution framework (“AGEF”) that adjusts execution of a monolithic cloud application based on predictive diagnostics. The AGEF aids owners of monolithic applications with offloading existing overloaded tasks to other nodes in a cluster of server computers. The AGEF includes an executor that is responsible for running specified execution flows described in an instruction file and a built-in predictive diagnostic engine that is trained on metric data recorded in a historical time period during prior executions of the monolithic application. The predictive diagnostic system generate a performance value that reveals the state of the monolithic application in one of two categories, such as success or fail, or in multiple categories, such as high, moderator, or low performance.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

29.

PROCESSING DATA MESSAGE FLOWS AT A PNIC

      
Application Number 18229645
Status Pending
Filing Date 2023-08-02
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Rolando, Pierluigi
  • Li, Peng
  • Ang, Boon S.
  • Yang, Guolin
  • Jiang, Wenyi
  • Zhang, Yuxiao
  • Koganty, Raju
  • Manuguri, Subrahmanyam
  • Liew, Kok Pyng
  • Heo, Jin
  • Suriyanarayanan Thillaisthanam, Srinath

Abstract

Some embodiments provide a novel method for processing flows at an embedded hardware switch of a physical network interface card (PNIC) connected to a host computer. A firewall of the PNIC detects an end of a particular data message flow associated with a particular VM of the host computer. Processing of the particular data message flow was offloaded from the firewall to an embedded hardware switch of the PNIC. After detecting the end of the particular data message flow, the firewall ends offloading of the particular data message flow by deleting a first flow record stored at the embedded hardware switch for the particular data message flow. The firewall deletes a second flow record stored at the first firewall for the particular data message flow.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

30.

GENERATING INDEPENDENT ENCRYPTION KEYS FOR STORAGE OBJECTS

      
Application Number 18357390
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor
  • Jain, Abhay Kumar
  • Yang, Long
  • Wang, Wenguang
  • Gadhiraju, Chandrakanth

Abstract

Aspects of the disclosure generate independent encryption keys for objects (e.g., virtual machine disks (VMDKs)) without requiring the management of multiple keys. An encryption manager obtains a primary encryption key, an object identifier (ID) comprising a globally unique ID (GUID) for an object, a data salt comprising the object ID and a data salt string, and a metadata salt comprising the object ID and a metadata salt string. A data encryption key is generated using the primary encryption key, the data salt, and a one-way function. A metadata encryption key is generated using the primary encryption key, the metadata salt, and the one-way function. Because the data salt string and metadata salt string differ, the data encryption and metadata encryption keys differ. Object IDs for different objects differ, so each object and its metadata have globally unique keys. Key generation (other than the primary key) is deterministic, simplifying key management.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

31.

RAPID MALWARE SCANNING USING VALIDATED REPUTATION CACHE

      
Application Number 18377768
Status Pending
Filing Date 2023-10-07
First Publication Date 2025-01-30
Owner VMware LLC (USA)
Inventor Vijayvargiya, Shirish

Abstract

A computerized method of restoring a malware-infected computing device using a validated reputation cache includes creating a first virtual machine from a first backup of the infected device. First file reputation data for a plurality of files of the first virtual machine is received. The first file reputation data is stored onto a disk drive accessible by the first virtual machine. Upon detection of malware on the first virtual machine from a first malware scan performed using the first file reputation data, a second virtual machine is created from a second backup of the infected device. A second malware scan of the second virtual machine is performed using the first file reputation data from the secondary storage disk drive. Upon detection of no malware on the second virtual machine, the second backup of the infected device is used as a recovery image to restore the infected device.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

32.

SYSTEM AND METHOD FOR PROVIDING FLEXIBLE CLOUD NAMESPACES IN A CLOUD COMPUTING ENVIRONMENT

      
Application Number 18378220
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Kamat, Amita Vasudev
  • Parmar, Piyush Hasmukh
  • Saxena, Pawan

Abstract

System and method for provide a computing infrastructure as a service creates a flexible cloud namespace in a software-defined data center (SDDC) in response to a first instruction from a user and deploys virtual computing instances in the flexible cloud namespace in response to a second instruction from the user. The flexible cloud namespace comprises a logical construct with resources in the SDDC that are supported by underlying SDDC management entities, where the virtual computing instances execute in the flexible cloud namespace of the SDDC using the resources.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

33.

MULTI-SOURCE DATA CENTER OBJECT MIRRORING IN A MULTI-CLOUD COMPUTING ENVIRONMENT

      
Application Number 18379690
Status Pending
Filing Date 2023-10-13
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Patel, Vipul
  • Satteli, Ranganayakulu
  • Vora, Naishadh
  • Bandi, Manjunath
  • Deva, Yashika

Abstract

System and computer-implemented method for managing software objects in a multi-cloud computing environment uses generated sync cycles for infra managers running in at least one cloud of the multi-cloud computing environment, where at least one of the sync cycles for a particular infra manager includes initial and update state information of software objects associated with the particular infra manager. The object updates of the sync cycles are published to an entity in the multi-cloud computing environment, where the object updates are processed and persistently stored in a database for consumption by a service of the entity.

IPC Classes  ?

34.

METHODS AND SYSTEMS INCLUDING A GRAPH-BASED USER INTERFACE THAT DISPLAYS, AND THAT PROVIDES FOR GENERATING AND EDITING, CLOUD-INFRASTRUCTURE-SPECIFICATION-AND-CONFIGURATION FILES

      
Application Number 18382063
Status Pending
Filing Date 2023-10-20
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Agarwal, Priyank
  • Ramachandra, Nitin
  • Reutova, Valentina Leonidovna
  • Kumar, Praveen
  • Chauhan, Vijay

Abstract

The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system including a graph-based user interface that displays, and that provides for generating and editing, cloud-infrastructure-specification-and-configuration files. The IaC cloud-infrastructure-management service or system processes a set of infrastructure-specification-and-configuration files to identify specified resources and relationships between resources. The resources and relationships are then stored as a graph, along with various indices that can be used for quickly searching the graph for relationships and resources of interest. A graph-based user interface allows users to view portions of the graph, navigate through the graph, search for particular resources and relationships, and edit the infrastructure-specification-and-configuration files.

IPC Classes  ?

  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
  • G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
  • G06F 9/451 - Execution arrangements for user interfaces
  • G06T 11/00 - 2D [Two Dimensional] image generation

35.

DISTRIBUTED SWITCH MANAGEMENT IN A VIRTUALIZED COMPUTING SYSTEM

      
Application Number 18451532
Status Pending
Filing Date 2023-08-17
First Publication Date 2025-01-30
Owner VMWARE LLC (USA)
Inventor
  • Cui, Kejia
  • Zhang, Lele
  • Liu, Honggang
  • Wu, Qi
  • Han, Donghai

Abstract

An example computing system includes software, executing on a hardware platform, configured to manage hypervisors and a distributed switch executing in a host cluster, the software including a control plane of the distributed switch, the hypervisors providing a data plane of the distributed switch, the host cluster including hosts, the distributed switch supporting features; a host membership manager of the software configured to track which of the hosts in the host cluster are members of a group that executes the distributed switch; a feature manager of the software configured to track which of the features of the distributed switch are enabled; and a compatibility checker of the software configured with compatibility data that relates the features of the distributed switch with hypervisor version requirements.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

36.

SECURE SERVICE ACCESS WITH MULTI-CLUSTER NETWORK POLICY

      
Application Number 18235772
Status Pending
Filing Date 2023-08-18
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Ding, Yang
  • Wu, Jiahao
  • Shen, Jianjun
  • Luo, Lan
  • Katrekar, Akshay
  • Bagavath Singh Chidambaram Udhaya Singh, Guna Singh

Abstract

Techniques associated with exchanging data between clusters are disclosed. A data packet can be received from a first pod in a first cluster of a cluster set that targets a second pod or service in a second cluster of the cluster set. A label identity is determined for the first pod from a table of pods and label identities. The label identity for the first pod is added in a virtual network identifier field of a data packet header. The data packet is communicated from a first virtual switch to the second cluster through a tunnel interface and gateway node. Upon receipt of the data packet, the label identity is extracted from the data packet header, and an ingress rule associated with the label identity can be determined. Access to the second pod is controlled based on the rule.

IPC Classes  ?

37.

BLOCKCHAIN-BASED LICENSING AS A SERVICE

      
Application Number 18239766
Status Pending
Filing Date 2023-08-30
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Lin, Bo
  • Wu, Qi
  • Zeng, Xi
  • Lou, Kai
  • Chen, Dongping
  • Zeng, Yi
  • Li, Danyang
  • Shen, Dongsheng
  • Han, Donghai

Abstract

Example methods and systems for blockchain-based licensing as a service are described. In one example, a computer system may receive a first request to obtain a first license associated with a first product from a first client system. In response, the computer system may (a) select a first blockchain from multiple blockchains, and (b) generate and store a first non-fungible token (NFT) on the first blockchain to issue the first license. Further, the computer system may receive a second request to obtain a second license associated with the first product or a second product from a second client system. In response, the computer system may (a) select a second blockchain from multiple blockchains, and (b) generate and store a second NFT on the second blockchain to issue the second license.

IPC Classes  ?

  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

38.

DATA TRACKING ON A COMPUTING DEVICE USING A DISTRIBUTED LEDGER

      
Application Number 18355079
Status Pending
Filing Date 2023-07-19
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Beveridge, Daniel
  • Huntley, Sean James
  • Ott, David

Abstract

Disclosed are examples of a system that publishes metadata to a blockchain network. The metadata can contain properties of data generated by a system. The metadata can allow for other entities to validate or trust the data generated by the system. The metadata can include data attributes that profile the data.

IPC Classes  ?

  • G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually

39.

AUTOMATED SCHEDULING OF SOFTWARE DEFINED DATA CENTER (SDDC) UPGRADES AT SCALE THROUGH OPTIMIZED GRAPHICAL USER INTERFACE

      
Application Number 18355215
Status Pending
Filing Date 2023-07-19
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Umeno, Marc
  • Rao, Deepa
  • Kamabathula, Vijayakumar
  • Yang, Hsuan
  • Hassan, Ruman
  • Kohli, Vaibhav

Abstract

The disclosure provides an approach for automatically scheduling resource-aware software-defined data center (SDDC) upgrades. Embodiments include receiving, via a user interface (UI), user input indicating one or more constraints related to automatically scheduling a plurality of upgrade phases for upgrading components of a plurality of computing devices across a plurality of SDDCs. Embodiments include receiving, via the UI, a user selection of a first UI control that, when selected, initiates an automatic assignment of the plurality of upgrade phases to particular time slots based on the one or more constraints. Embodiments include displaying, via the UI, a depiction of a schedule for the plurality of upgrade phases based on the automatic assignment. Embodiments include displaying, via the UI, a second UI control that, when selected, causes the automatic assignment to be finalized and a third UI control that, when selected, initiates a new automatic assignment.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials

40.

RESYNCHRONIZATION OF OBJECTS IN A VIRTUAL STORAGE SYSTEM

      
Application Number 18356125
Status Pending
Filing Date 2023-07-20
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Ramanan, Venkata
  • Knauft, Eric
  • Renauld, Pascal
  • Rangaswamy, Sandeep
  • Thokala, Sudheer

Abstract

An example method of resynchronizing a first replica of an object and a second replica of an object in an object storage system, includes: determining, by storage software in response to the second replica transitioning from failed to available, a stale sequence number for the second replica, the storage software having associated the stale sequence number with the second replica when the second replica failed; querying, by the storage software, block-level metadata for the object using the stale sequence number, the block-level metadata relating logical blocks of the object with sequence numbers for operations on the object; determining, by the software as a result of the querying, a set of the logical blocks each related to a sequence number being the same or after the stale sequence number; and copying, by the storage software, data of the set of logical blocks from the first replica to the second replica.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

41.

GARBAGE COLLECTION IN A LOG-STRUCTURED FILE SYSTEM

      
Application Number 18356129
Status Pending
Filing Date 2023-07-20
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Austruy, Maxime
  • Knauft, Eric
  • Patil, Sriram
  • Jain, Abhay Kumar
  • Wang, Wenguang

Abstract

An example method of managing a log-structured file system (LFS) on a storage device includes: receiving, at storage software executing on a host, an operation that overwrites a data block, the data block included in a segment of the LFS; determining from first metadata stored on the storage device, a change in utilization of the segment from a first utilization value to a second utilization value; modifying second metadata stored on the storage device to change a relation between the segment and a first bucket to be a relation between the segment and a second bucket, the first utilization value included in a range of the first bucket and the second utilization value included in a range of the second bucket; and executing a garbage collection process for the LFS that uses the second metadata to identify for garbage collection a set of segments in the second bucket.

IPC Classes  ?

  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 16/18 - File system types

42.

PROTECTION FOR A COMPUTER SYSTEM THAT EXECUTES CONTAINERS

      
Application Number 18356184
Status Pending
Filing Date 2023-07-20
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Tsonov, Lachezar Lyudmilov
  • Amit, Gal
  • Shurany, Yonatan

Abstract

A method of protecting a computer system from execution of container images that are not trustworthy, the method comprising: receiving a message from an application programming interface (API) server of a container orchestration system of the computer system, wherein the message indicates that a first container image has been requested for deployment; in response to receiving the message from the API server that the first container image has been requested, transmitting a request to an image evaluation service to evaluate whether the first container image is trustworthy for execution; and in response to receiving an indication from the image evaluation service that the first container image is not trustworthy, transmitting to the API server, an instruction not to deploy containers using the first container image.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/61 - Installation

43.

PROTECTION FOR A COMPUTER SYSTEM THAT EXECUTES CONTAINERS

      
Application Number 18356185
Status Pending
Filing Date 2023-07-20
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Tsonov, Lachezar Lyudmilov
  • Amit, Gal
  • Shurany, Yonatan

Abstract

A method of protecting a computer system from execution of container images that are not trustworthy, the method comprising: determining that a container runtime of the computer system has downloaded a first container image for execution by the container runtime; in response to determining that the container runtime has downloaded the first container image, transmitting a request to an image evaluation service to evaluate whether the first container image is trustworthy for execution; and in response to receiving an indication from the image evaluation service that the first container image is not trustworthy, transmitting to the container runtime, an instruction to delete the first container image.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

44.

ATTESTATION AND ENFORCEMENT OF CRYPTOGRAPHIC REQUIREMENTS ACROSS MULTIPLE HOPS

      
Application Number 18356715
Status Pending
Filing Date 2023-07-21
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Huntley, Sean
  • Beveridge, Daniel James
  • Ott, David

Abstract

The disclosure provides an approach for multi-endpoint cryptographic orchestration. Embodiments include establishing, by a first endpoint of a plurality of endpoints related to a multi-endpoint secure communication session, a metadata channel with one or more other endpoints of the plurality of endpoints. Embodiments include sending, by the first endpoint, to a second endpoint of the one or more other endpoints, via the metadata channel, an indication of a cryptographic requirement related to the multi-endpoint secure communication session. Embodiments include performing, by the second endpoint, one or more cryptographic operations related to the multi-endpoint secure communication session based on the indication of the cryptographic requirement. Embodiments include attesting, by the second endpoint, via the metadata channel, that the one or more cryptographic operations comply with the cryptographic requirement.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

45.

CRYPTOGRAPHIC AGILITY FOR DATA STORAGE

      
Application Number 18356739
Status Pending
Filing Date 2023-07-21
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Beveridge, Daniel James
  • Huntley, Sean
  • Ott, David

Abstract

The disclosure provides an approach for providing cryptographic agility for data storage. Embodiments include receiving, by a cryptographic provider component, a request to perform a cryptographic operation with respect to a storage operation for a data object, wherein the cryptographic provider component is associated with an interception point between a metadata layer of a storage system and an object storage layer of the storage system. Embodiments include determining, by the cryptographic provider component, one or more attributes related to the request based on information received from the metadata layer about the data object. Embodiments include selecting, by the cryptographic provider component, based on the one or more attributes related to the request, a cryptographic technique for handling the request from a set of possible cryptographic techniques. Embodiments include storing, at the object storage layer, an encrypted version of the data object based on the selected cryptographic technique.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

46.

SYSTEMS AND METHODS FOR NETWORK STATUS VISUALIZATION

      
Application Number 18377321
Status Pending
Filing Date 2023-10-06
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Khaparkar, Vaibhav Rupesh
  • Ganu, Nilesh Arvind
  • Parashar, Shrinivas Sharad
  • Vaidyula, Pavan Krishna

Abstract

Example methods and systems for network status visualization are described. In one example, a first computer system may generate and send a first query identifying a first-level object. Based on a first response, the first computer system may generate and display a first UI view that includes (a) a first user interface (UI) element and multiple second UI elements, (b) a first-level status indicator to indicate that the first-level object is associated with a performance issue, and (c) a second-level status indicator to indicate that the performance issue is associated with a particular second-level object. In response to detecting a user's interaction, the first computer system may generate and send a second query identifying the particular second-level object. Based on a second response, the first computer system may generate and display a second UI view to facilitate troubleshooting of the performance issue.

IPC Classes  ?

  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data

47.

ENTROPY-CONSTRAINED UNIFORM QUANTIZATION

      
Application Number 18466687
Status Pending
Filing Date 2023-09-13
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Ben-Itzhak, Yaniv
  • Vargaftik, Shay
  • Dorfman, Ron

Abstract

Embodiments of the present disclosure provide a data compression technique, referred to as entropy-constrained uniform quantization (ECUQ), that performs lossy compression of a real valued vector in a manner that ensures a size budget for the compressed vector. In one set of embodiments, ECUQ achieves this by finding “close-to-the-best” quantization values for quantizing the vector in view of the size budget via a fast and robust search procedure.

IPC Classes  ?

  • G06N 3/098 - Distributed learning, e.g. federated learning

48.

NETWORK SCHEDULER IN A DISTRIBUTED STORAGE SYSTEM

      
Application Number 18224970
Status Pending
Filing Date 2023-07-21
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Xu, Yiqi
  • Knauft, Eric
  • Xiang, Enning

Abstract

Aspects of the disclosure perform network scheduling in a distributed storage system. Example operations include: determining a network congestion condition at a first host; based on the network congestion condition, determining a packet delay time; based on a first data packet belonging to a first traffic class of a plurality of traffic classes, delaying transmitting the first data packet, from the first host across a network to a second host, by the packet delay time; and based on a second data packet belonging to a second traffic class, transmitting the second data packet from the first host to the second host without a delay. In some examples, the first traffic class comprises resync input/output operations (I/Os) and the second traffic class comprises non-resync traffic I/Os. Some examples delay packets differently, based on the destination host. Some examples adjust delays to drive the network congestion condition toward a target.

IPC Classes  ?

  • H04L 47/12 - Avoiding congestionRecovering from congestion
  • H04L 47/2408 - Traffic characterised by specific attributes, e.g. priority or QoS for supporting different services, e.g. a differentiated services [DiffServ] type of service
  • H04L 47/52 - Queue scheduling by attributing bandwidth to queues

49.

AUTOMATED DEBUGGING OF KUBERNETES APPLICATION

      
Application Number 18225027
Status Pending
Filing Date 2023-07-21
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Ying, Yu
  • Fowler, Hayden Kevin
  • Ravinoothala, Sreeram Kumar
  • Wang, Di
  • Wang, Yong

Abstract

Some embodiments provide a method for monitoring a first service that executes in a Pod on a node of a Kubernetes deployment. At a second service executing on the node, the method monitors a storage of the node that stores core dump files to detect when a core dump file pertaining to the first service is written to the storage. Upon detection of the core dump file being written to the storage, the method automatically (i) generates an image of the first service based on data in the core dump file and (ii) instantiates a new container on the node to analyze the generated image in order to debug the first service.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

50.

ASSIGNMENT OF CONTAINERIZED WORKLOADS TO VIRTUAL PRIVATE CLOUD SUBNETS IN A MULTI-TENANT NETWORK

      
Application Number 18237387
Status Pending
Filing Date 2023-08-23
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Liu, Xiaopei
  • Liu, Danting
  • Liu, Wenfeng
  • Shen, Jianjun
  • Han, Donghai

Abstract

The disclosure provides a method for assigning containerized workloads to isolated network constructs within a networking environment associated with a container-based cluster. The method generally includes receiving, at the container-based cluster, a subnet port custom resource specification to initiate creation of a subnet port object to assign a node to a subnet within the networking environment, wherein one or more containerized workloads are running on the node, in response to receiving the subnet port custom resource specification, creating the subnet port object, and modifying a state of the container-based cluster to match a first intended state of the container-based cluster at least specified in the subnet port object, wherein modifying the state comprises assigning the node to the subnet in the networking environment.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

51.

CRYPTOGRAPHIC AGILITY FOR MULTI-LEVEL PRIVACY-PRESERVING DATA AGGREGATION

      
Application Number 18355562
Status Pending
Filing Date 2023-07-20
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Huntley, Sean
  • Ott, David
  • Beveridge, Daniel James
  • Stack, Martin Patrick

Abstract

The disclosure provides an approach for cryptographic agility for multi-layer privacy-preserving data aggregation. Embodiments include receiving a request for dynamic cryptographic technique selection related to a data aggregation process involving a first aggregator device and a second aggregator device performing one or more computations on data provided from multiple endpoints. Embodiments include determining, based on contextual information, that the second aggregator device is associated with a confidential computing component and that the first aggregator device is not associated with any confidential computing component. Embodiments include selecting one or more homomorphic encryption techniques for protecting the data while in use by the first aggregator device based on the determining that the first aggregator device is not associated with any confidential computing component and selecting a confidential computing technique for protecting the data while in use by the second aggregator device.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data

52.

CRYPTOGRAPHIC AGILITY FOR A VIRTUAL STORAGE AREA NETWORK (VSAN)

      
Application Number 18356836
Status Pending
Filing Date 2023-07-21
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Beveridge, Daniel James
  • Huntley, Sean
  • Ott, David

Abstract

The disclosure provides an approach for providing cryptographic agility for virtualized data storage. Embodiments include determining, by a hypervisor running on a host machine, one or more attributes of a virtual machine (VM) running on top of the hypervisor. Embodiments include sending, by the hypervisor, to a cryptographic provider component, a request to perform cryptographic functionality with respect to one or more virtual disks associated with the VM, wherein the request comprises the one or more attributes of the VM. Embodiments include selecting, by the cryptographic provider component, based on the one or more attributes of the VM and one or more cryptographic policies, one or more cryptographic techniques for handling the request from a set of possible cryptographic techniques. Embodiments include encrypting the one or more virtual disks in a virtual storage area network (VSAN) based on the selected one or more cryptographic techniques.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

53.

MULTI-TENANT RATE LIMITING SERVICE FOR DISTRIBUTED SYSTEMS

      
Application Number 18376007
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Suresh Puthalath, Lalith
  • Khandelwal, Pooja
  • Beg, Mirza Mohsin

Abstract

The disclosure provides a method for configuring rate limiting policies for microservices in a request execution chain of a distributed system. The method generally includes receiving global rate limit(s), where each global rate limit is associated with a tag and a microservice of a plurality of microservices, and each global rate limit indicates a rate of requests tagged with the tag associated with the global rate limit allowed to be processed by the microservice associated with the global rate limit; and configuring, for each global rate limit: each of the local rate limiter(s) associated with microservice instance(s) associated with the global rate limit with a local rate limit indicating a rate of requests tagged with the tag associated with the global rate limit allowed to be processed by the microservice instance, wherein the local rate limit of each of the local rate limiter(s) is based on the global rate limit.

IPC Classes  ?

54.

SECURITY ORCHESTRATION FOR ON-PREMISES INFRASTRUCTURE

      
Application Number 18376452
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Burle, Siddharth
  • Meena, Amit
  • Kumar, Sanjay
  • Rangwala, Saifuddin

Abstract

Techniques associated with security orchestration for on-premises infrastructure are disclosed. A policy definition associated with on-premises infrastructure that defines a desired state can be received. From the policy definition, a target of the on-premises infrastructure can be identified. A management service associated with the target can be determined, and a plugin for the management service can be identified. The policy definition can be communicated to the management service through the plugin, and the management service sets the state of the target to the desired state. The state of the target can be monitored. If the state differs from the desired state, a remediation workflow is initiated to set the state to the desired state specified by the policy definition.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/445 - Program loading or initiating

55.

METHODS AND APPARATUS TO TAG CLOUD RESOURCES

      
Application Number 18376456
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Jain, Manish
  • Gupta, Vishal
  • Lokare, Pranali
  • Burle, Siddharth
  • Meena, Amit

Abstract

Systems, apparatus, articles of manufacture, and methods are disclosed to tag cloud resources. An example apparatus includes interface circuitry, machine readable instructions, and programmable circuitry to at least one of instantiate or execute the machine readable instructions to obtain first accesses of a cloud resource, the first accesses defining a first usage pattern associated with the cloud resource, associate the cloud resource with a business environment based on the first accesses, compare the first usage pattern to a second usage pattern corresponding to historical accesses of reference cloud resources associated with the business environment, and when the first usage pattern is different from the second usage pattern, limit second accesses of the cloud resource based on the second usage pattern.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

56.

TEMPORARY BREAK GLASS ACCOUNT-BASED DATA CENTER OPERATIONS

      
Application Number 18377773
Status Pending
Filing Date 2023-10-07
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Reddy, Amarnath
  • Chelur, Raj Shekar
  • Lal, Naren
  • Angamuthu, Srinivasan

Abstract

An example method may include receiving a request to create a temporary break glass account from a user associated with a user account. The request may include a time period for accessing a data center resource. In response to receiving the request, the temporary break glass account may be created. Further, credentials associated with the temporary break glass account may be notified to the user. Furthermore, an operation may be enabled on the data center resource via the temporary break glass account using the credentials. Further, the temporary break glass account may be deleted in response to an expiration of a timer. The timer may be configured based on the time period.

IPC Classes  ?

57.

AUTOMATED QUERY LANGUAGE PERFORMANCE METRICS

      
Application Number 18377774
Status Pending
Filing Date 2023-10-07
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Agrawal, Ashish
  • Meena, Amit
  • Gokhale, Geeta
  • Burle, Siddharth

Abstract

Systems, apparatus, articles of manufacture, and methods are disclosed to test an automated query language by interfacing with a query endpoint, generating a first test suite based on a plurality of combinations of a plurality of attributes corresponding to an API specification, transmitting the first test suite to be executed on the query endpoint, the first test suite to include instructions to cause the query endpoint to access data stored in a database accessible to a plurality of secondary endpoints, obtaining a response time corresponding to the access of the data, comparing the response time corresponding to the access of the data with a service level agreement required response time, and in response to the response time corresponding to the access of the data being longer than the service level agreement required response time, notifying a developer of the plurality of secondary endpoints.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

58.

CRYPTOGRAPHY AS A SERVICE

      
Application Number 18377836
Status Pending
Filing Date 2023-10-09
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Huntley, Sean James
  • Beveridge, Daniel James
  • Ott, David E
  • Sharma, Shivali
  • Dhanasekar, Vasantha Kumar

Abstract

The disclosure provides an approach for providing cryptography as a service. Embodiments include receiving, by a cryptographic provider component, policy information. Embodiments include receiving, by the cryptographic provider component, requests from a plurality of applications to perform cryptographic operations, wherein the plurality of applications comprise separate processes from the cryptographic provider component. Embodiments include selecting, by a cryptographic router of the cryptographic provider component, based on the policy information and information associated with the requests, one or more cryptographic implementation components for servicing each request of the requests.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

59.

METHODS AND APPARATUS FOR GENERATING AND MONITORING A SECURITY INFRASTRUCTURE

      
Application Number 18378168
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Jain, Manish
  • Gupta, Vishal
  • Balla, Suresh
  • Singh, Prashant Rajpal
  • Jain, Varun

Abstract

Systems, apparatus, articles of manufacture, and methods are disclosed to generate and monitor security infrastructure. An example apparatus comprises programmable circuitry to at least one of instantiate or execute the machine readable instructions to: provision the security infrastructure based on a security infrastructure generation request; detect a global infrastructure template based on the security infrastructure generation request; and generate the security infrastructure based on the provisioned security infrastructure, the global infrastructure template, and an identified security infrastructure generation authorization, the security infrastructure generation authorization to indicate whether the generation of the security infrastructure is permitted.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

60.

METHODS AND APPARATUS TO MANAGE SINGLE-COMPLIANCE DESIGNS FOR CLOUD, ON-PREMISES AND DARK SITE DEPLOYMENTS

      
Application Number 18380273
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Kamble, Nilesh Vishwas
  • Lal, Naren
  • Anand, Akshay
  • Chelur, Raj Shekar
  • Bhasin, Yogendra Baldev

Abstract

An example disclosed system includes programmable circuitry to at least one of instantiate or execute instructions to update a compliance rule based on a target compliance definition to generate a target compliance rule, the compliance rule corresponding to a resource in a software defined data center, and output configuration update information based on a comparison of the target compliance rule with a current resource configuration, the current resource configuration corresponding to the resource in the software defined data center.

IPC Classes  ?

61.

PRE-DEPLOYMENT APPLICATION EVALUATION

      
Application Number 18381659
Status Pending
Filing Date 2023-10-19
First Publication Date 2025-01-23
Owner VMWARE LLC (USA)
Inventor
  • Imre, István
  • Nèmeth, Dènes
  • Sathyanarayan, Akshatha
  • Kotha, Venu Gopala Rao
  • Khan, Mohamed Wahab

Abstract

The disclosure provides for pre-deployment evaluation of a plurality of resource definitions of a plurality of resources for deployment, comprising: determining, for each of one or more resource types, one or more attributes of the resource type including a kind of the resource type; determining, for each of the plurality of resources, an associated resource type of the one or more resource types, based on a match between the kind of the associated resource type and a kind of the resource as defined in a corresponding resource definition of the plurality of resource definitions; generating, for each of the plurality of resources, a role-based access control (RBAC) rule based on the one or more attributes of the associated resource type of the resource and the corresponding resource definition of the resource; generating a collection of RBAC rules including the generated RBAC rule for each of the plurality of resources.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

62.

DATA LOSS PREVENTION

      
Application Number 18381702
Status Pending
Filing Date 2023-10-19
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Sinha, Sharadendu Prakash
  • Burle, Siddharth Sukumar
  • Jain, Manish
  • Kothari, Nitin
  • Mahajan, Sachin

Abstract

Systems, apparatus, articles of manufacture, and methods are disclosed to prevent data loss, including determining a multi-layered security protocol from a plurality of security protocols stored in a database, after a determination that the multi-layered security protocol includes at least one security protocol corresponding to each unique type, causing the multi-layered security protocol to be enabled, after a breach of the multi-layered security protocol, performing an enforcement, the enforcement to include using a third-party integration and notifying a developer.

IPC Classes  ?

63.

STATE-BASED TIMESLOTS AND SYSTEMS FOR DATA USAGE RECORDING AND PUBLISHING

      
Application Number 18477052
Status Pending
Filing Date 2023-09-28
First Publication Date 2025-01-23
Owner VMware LLC (USA)
Inventor
  • Lin, Bo
  • Lou, Kai
  • Chen, Chuntao
  • Jiang, Caixia
  • Zeng, Xi
  • Qi, Wu
  • Li, Danyang
  • Liang, Xiao

Abstract

Data usage by networking and data processing services is measured using a timeslot system. The timeslots have multiple states for collecting, collecting with processing, and expired timeslots. Data from upstream components is reported to local manager clusters and placed into timeslots corresponding to a timestamp of the data. Data can be reported from local managers to an entitlement service and/or a cloud service portal. Timing inconsistencies due to latency or processing time can be resolved by accounting for a timestamp difference using a timestamp difference value between the timeslot time and the reporting time. Data can be deduplicated, cleaned, and/or compacted. Data can be also be version controlled, with timeslots maintaining a version number. Complete and accurate tracking of data usage and associated costs is improved by reporting and collecting usage data using state-based timeslots.

IPC Classes  ?

  • H04L 67/75 - Indicating network or usage conditions on the user display

64.

OPTIMIZED ASSIGNMENT OF REPLICATION-MULTICAST IP ADDRESSES TO OVERLAY-MULTICAST GROUPS

      
Application Number 18220291
Status Pending
Filing Date 2023-07-11
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Raman, Chidambareswaran
  • Karunakaran, Senthilkumar
  • Mathew, Subin Cyriac

Abstract

Some embodiments provide a novel method for efficiently assigning replication-multicast network addresses to overlay-multicast groups of machines executing on host computers of a software-defined network (SDN). For a source machine that is a source of one or more multicast flows, an SDN controller receives from the source machine an overlay-multicast group network address of an overlay-multicast group for which the source machine is the source, and an overlay-multicast source network address associated with the source machine. The SDN controller uses the overlay-multicast group and source network addresses to determine a replication-multicast network address for the overlay-multicast group. The replication-multicast group network address is determined using both the overlay-multicast group and source network address to avoid different overlay-multicast groups being assigned a same replication-multicast network address. The source machine uses the replication-multicast group network address to forward the multicast flows to destination machines that are members of the overlay-multicast group.

IPC Classes  ?

  • H04L 45/16 - Multipoint routing
  • H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer

65.

LIVE WORKLOAD MIGRATION FOR HARDWARE OFFLOAD CAPABLE NICS USING RDMA

      
Application Number 18236321
Status Pending
Filing Date 2023-08-21
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Jiang, Wenyi
  • Jiang, Jingchun Jason
  • Sharma, Ankur Kumar

Abstract

Some embodiments of the invention provide a method of migrating a VM from a first host computer to a second host computer, the first host computer having a first PNIC that performs at least one of network forwarding operations and middlebox service operations for the VM. At an RDMA client executing on a set of one or more processors of the first host computer, the method directs an RDMA server executing on the first PNIC to provide networking state data associated with at least one of network forwarding operations and middlebox service operations that the first PNIC performs for the VM. The provided networking state data resides in a memory of the first PNIC that is accessible to the RDMA server. At the RDMA client, the method provides the obtained networking state data to the second host computer as part of a data migration that is performed to migrate the VM from the first host computer to the second host computer.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

66.

METHOD FOR EFFICIENT LOW-LATENCY INTEGRATION OF WEBASSEMBLY CONTAINERS

      
Application Number 18350504
Status Pending
Filing Date 2023-07-11
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Atanasov, Rusko
  • Uskova, Antonina
  • Manev, Gancho
  • Arnaudov, Vesselin

Abstract

A system and method for reducing the startup times of applications are described. A plugin extension to a worker node of an orchestration system is established. The plugin extension, once started, is not stopped. The plugin extension comprises one or more lightning containers and a pool of threads/fibers. Each lightning container comprises a virtual machine, such as a WebAssembly virtual machine, to which a thread or fiber from the pool is assigned to run the application. Multiple applications run concurrently as long as threads/fibers are available from the pool. When an application is completed, the thread assigned to it is returned to the thread/fiber pool for re-use.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

67.

CRYPTOGRAPHIC AGILITY FOR PRIVACY-PRESERVING FEDERATED LEARNING

      
Application Number 18351528
Status Pending
Filing Date 2023-07-13
First Publication Date 2025-01-16
Owner VMware, LLC (USA)
Inventor
  • Ott, David
  • Stack, Martin Patrick
  • Beveridge, Daniel James
  • Huntley, Sean

Abstract

The disclosure provides an approach for cryptographic agility for privacy-preserving federated learning. Embodiments include receiving a request from an application for dynamic cryptographic technique selection related to a federated learning process, wherein the request indicates one or more types of mathematical operations that are to be performed by an aggregator device on data that is to be provided from multiple endpoints during the federated learning process. Embodiments include selecting, based on the one or more types of mathematical operations that are to be performed by the aggregator device, a cryptographic technique from a plurality of cryptographic techniques. Embodiments include providing a response to the application based on the selecting of the cryptographic technique, wherein the cryptographic technique is used to perform one or more cryptographic operations related to the federated learning process.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06N 3/098 - Distributed learning, e.g. federated learning

68.

CRYPTOGRAPHIC AGILITY FOR PRIVACY PRESERVATION OF DATA IN USE WITHIN AGGREGATION FUNCTIONS

      
Application Number 18351535
Status Pending
Filing Date 2023-07-13
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Beveridge, Daniel James
  • Ott, David
  • Stack, Martin Patrick
  • Huntley, Sean

Abstract

The disclosure provides an approach for cryptographic agility for privacy-preserving data aggregation. Embodiments include receiving a request for dynamic cryptographic technique selection related to a data aggregation process, wherein the data aggregation process is to involve an aggregator device performing one or more computations on data that is to be provided from multiple endpoints. Embodiments include selecting a cryptographic technique based on contextual information related the request, wherein the contextual information comprises one or more of: one or more types of mathematical operations that are to be performed by the aggregator device on the data that is to be provided from the multiple endpoints during the data aggregation process; or an indication of whether the aggregator device is associated with a confidential computing component. Embodiments include providing a response based on the selecting of the cryptographic technique.

IPC Classes  ?

69.

SECURE MULTI-ENDPOINT CIPHER NEGOTIATION

      
Application Number 18351538
Status Pending
Filing Date 2023-07-13
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Beveridge, Daniel James
  • Ott, David
  • Huntley, Sean
  • Stack, Martin Patrick

Abstract

The disclosure provides an approach for multi-endpoint cipher negotiation. Embodiments include determining, by one or more first endpoints of a plurality of endpoints involved in a multi-party data aggregation process, a privacy-preserving version of an underlying function to be evaluated for cryptographic technique selection. Embodiments include sending, by the one or more first endpoints, to a second endpoint of the plurality of endpoints, the privacy-preserving version of the underlying function and encrypted input values related to attributes of the one or more first endpoints. Embodiments include evaluating, by the second endpoint, the privacy-preserving version of the function based on the encrypted input values and one or more additional encrypted input values. Embodiments include determining, based on the evaluating of the privacy-preserving version of the function, one or more cryptographic techniques to be used for the multi-party data aggregation process.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

70.

PREDICTIVE PRIORITIZATION AND ADAPTIVE SECURITY OF INFRASTRUCTURE

      
Application Number 18371469
Status Pending
Filing Date 2023-09-22
First Publication Date 2025-01-16
Owner VMWARE LLC (USA)
Inventor
  • Burle, Siddharth
  • Meena, Amit
  • Gokhale, Geeta

Abstract

Techniques associated with adaptive infrastructure security are disclosed. Information regarding a plurality of threat events from one or more source systems is received. For each of the plurality of threat events, a probability of a target system being exploited can be computed. A threat event can be selected at a first time from the plurality of threat events associated with a first probability that meets a threshold. Remedial actions performed to address the threat event at a respective source system can be received, and a guardrail to apply to the target system can be determined based on the remedial actions. The guardrail can then be applied to the target system.

IPC Classes  ?

71.

SECURELY PERSISTING INFORMATION ACROSS SYSTEM REBOOTS

      
Application Number 18376838
Status Pending
Filing Date 2023-10-05
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Parekh, Manisha Sameer Gambhir
  • Chaudhari, Kedar Bhalchandra
  • Phadnaviss, Naranjan
  • Barve, Mandar

Abstract

Securely persisting transient data between virtual machine restarts or VM migrations involves terminating, by a first virtual machine (VM) during a shutdown process for the first VM, execution of user-space processes on the first VM, writing, by a first agent executing on the first VM, protected data from transient memory of the first VM to a virtual disk accessible by the first VM and shutting down the first VM. The process also involves initiating a startup process of a second VM, the second VM mounting the virtual disk; and executing, at the second VM and prior to execution of user-space processes, a second agent, the second agent being configured to: read the protected data from the virtual disk into transient memory of the second VM; and delete the protected data from the virtual disk.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

72.

METHODS AND SYSTEMS THAT AUTOMATICALLY TRANSFER MANAGEMENT OF CLOUD INFRASTRUCTURE FROM A FIRST MANAGER TO A SECOND MANAGER

      
Application Number 18380662
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-01-16
Owner VMWARE LLC (USA)
Inventor
  • Agarwal, Priyank
  • Kumar, Praveen
  • Reutova, Valentina Leonidovna
  • Chauhan, Vijay
  • Pandey, Ashmantak

Abstract

The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that automatically generates a parameterized cloud template that represents an already deployed cloud-based infrastructure managed by a different cloud-infrastructure-management service or system and that uses the parameterized cloud template to assume management of the already deployed cloud-based infrastructure. The IaC cloud-infrastructure-management service or system uses an infrastructure-discovery service as well as data representations of the already deployed cloud-based infrastructure generated by the different cloud-infrastructure-management service or system to generate the parameterized cloud template and to detect drift in the already deployed cloud-based infrastructure.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

73.

METHODS AND SYSTEMS THAT AUTOMATICALLY BIND ATTRIBUTE VALUES TO RESOURCE IDENTIFIERS

      
Application Number 18381663
Status Pending
Filing Date 2023-10-19
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Agarwal, Priyank
  • Kumar, Praveen
  • Ramachandra, Nitin
  • Das, Aakash
  • Kumar, Vivek

Abstract

The current document is directed to methods and systems that automatically bind an attribute value, within a resource descriptor in a cloud-infrastructure-specification-and-configuration file, that references a parent resource descriptor via a resource identifier to the resource identifier in the parent resource descriptor. One implementation of attribute-value binding is employed in an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that automatically generates parameterized cloud templates that represent already deployed cloud-based infrastructure, including virtual networks, virtual machines, load balancers, and connection topologies. The IaC cloud-infrastructure manager provides an infrastructure-discovery service that accesses a cloud-computing facility to obtain information about already deployed cloud infrastructure and that generates a textual description of the deployed infrastructure, which the IaC cloud-infrastructure-manager then transforms into a set of parameterized cloud-infrastructure-specification-and-configuration files, a resource_ids file, and a parameters file that together comprise a parameterized cloud template.

IPC Classes  ?

  • H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
  • H04L 41/08 - Configuration management of networks or network elements
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play

74.

OPTIMIZED REPLICATION OF OVERLAY-MULTICAST DATA MESSAGE FLOWS ACROSS TRANSPORT NODES

      
Application Number 18220292
Status Pending
Filing Date 2023-07-11
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Raman, Chidambareswaran
  • Karunakaran, Senthilkumar
  • Mathew, Subin Cyriac

Abstract

Some embodiments provide a novel method for optimizing replication of multicast flows to overlay-multicast groups of machines executing on host computers of an SDN. A Layer-2 switch receives, from a particular destination machine that is a member of an overlay-multicast group, a registration to receive multicast flows from a source machine. The registration specifies a replication-multicast network address associated with the overlay-multicast group, a source identifier (ID) associated with the source machine, and a destination ID associated with the destination machine. The switch stores in a local data store, a record specifying the replication-multicast network address, overlay-multicast source network address, and destination ID. The switch receives, from the source machine, a multicast flow specifying the replication-multicast network address as its destination and the source ID as its source. Based on the stored record, the switch forwards the multicast flow to the destination machine.

IPC Classes  ?

  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/74 - Address processing for routing

75.

CSS LIBRARY ISOLATION

      
Application Number 18221705
Status Pending
Filing Date 2023-07-13
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor Vladimirov Iliev, Nikola

Abstract

Cascading style sheets (CSS) library isolation can include replacing instances of a definition of a base root element font size from CSS code of a user interface (UI) plugin to a hosting application with a CSS variable as the CSS code is compiled to a CSS file, reading a definition of a quantity of pixels per one root element font size from the UI plugin, calculating a ratio between the base root element font size of the UI plugin and a base root element font size of the hosting application in pixels, and defining the CSS variable as the ratio at runtime.

IPC Classes  ?

  • G06F 8/658 - Incremental updatesDifferential updates

76.

JAVASCRIPT LIBRARY ISOLATION

      
Application Number 18221734
Status Pending
Filing Date 2023-07-13
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor Vladimirov Iliev, Nikola

Abstract

JavaScript library isolation can include replacing instances of a read/write call to a particular object from JavaScript code of a user interface (UI) plugin to a hosting application with a proxy as the JavaScript code is compiled to a JavaScript file, defining a function by which the proxy operates, directing a first subset of read/write calls to the particular object in runtime according to the function, and redirecting a second subset of read/write calls to a different object in runtime according to the function.

IPC Classes  ?

77.

LOCK ON READ TECHNIQUES FOR IMPROVED FILE SYSTEM PERFORMANCE

      
Application Number 18221811
Status Pending
Filing Date 2023-07-13
First Publication Date 2025-01-16
Owner VMWARE LLC (USA)
Inventor
  • Dillon, David
  • Georgiev, Kostadin

Abstract

The disclosure provides a method for storing data in a datastore. The method generally includes storing first data from a first data producer in a first file maintained in the datastore, receiving a read input/output (I/O) request to read the first data stored in the first file, in response to receiving the read I/O request, locking data in the first file to prevent further data from being stored in the first file, processing the read I/O request, and creating a second file for storing at least second data from the first data producer.

IPC Classes  ?

  • G06F 16/176 - Support for shared access to filesFile sharing support
  • G06F 16/17 - Details of further file system functions

78.

LIVE WORKLOAD MIGRATION FOR HARDWARE OFFLOAD CAPABLE NICS USING RDMA

      
Application Number 18236311
Status Pending
Filing Date 2023-08-21
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Jiang, Wenyi
  • Jiang, Jingchun Jason
  • Sharma, Ankur Kumar

Abstract

Some embodiments of the invention provide a method of migrating a virtual machine (VM) from a first host computer to a second host computer, the first host computer having a first PNIC, the second host computer having a second PNIC, the first and second PNICs for performing at least one of network forwarding operations and middlebox service operations for the VM. At an RDMA client executing on a set of one or more processors of the second PNIC, the method receives a notification from the second host computer indicating a data migration that is performed to migrate the particular VM from the first host computer to the second host computer has started. Based on the notification, at the RDMA client, the method directs an RDMA server executing on the first PNIC to provide networking state data associated with at least one of network forwarding operations and middlebox service operations that the first PNIC performs for the VM. The provided networking state data resides in a memory of the first PNIC that is accessible to the RDMA server.

IPC Classes  ?

  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

79.

SINGLE ADAPTER INSTANCE CONFIGURATION FOR MONITORING MULTIPLE VIRTUAL INFRASTRUCTURES

      
Application Number 18243106
Status Pending
Filing Date 2023-09-07
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Saraf, Rohit
  • Totappanavar, Vineeth
  • Srivastava, Akansha
  • Kaki, Venkata Padma
  • Ramabhadran, Aswathy
  • Bhaduri, Atreyee

Abstract

An example method may include generating, during a first boot of a collector appliance, an adapter instance on the collector appliance. Further, the method may include receiving a request to bootstrap a first VCI running in a first virtual infrastructure managed by a first VIM and a second VCI running in a second virtual infrastructure managed by a second VIM. Furthermore, the method may include performing, using the adapter instance, a bootstrapping process of the first VCI to map the adapter instance to the first virtual infrastructure and to install a first monitoring agent, and the second VCI to map the adapter instance to the second virtual infrastructure and to install a second monitoring agent. Further, the method may include collecting, using the adapter instance, performance metrics associated with the first VCI and the second VCI from the first monitoring agent and the second monitoring agent, respectively.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/4401 - Bootstrapping

80.

USER INTERFACE FOR TRANSITIONING A CLUSTER TO DESIRED STATE CONFIGURATION MANAGEMENT

      
Application Number 18352641
Status Pending
Filing Date 2023-07-14
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Abadzhimarinov, Branislav
  • Hristozov, Georgi
  • Ivanov, Mihail
  • Vasilev, Atanas
  • Radeva, Petia
  • Jootoo Ramesh Bapu, Harshath
  • Bhosle, Mayur

Abstract

Disclosed herein are a system and method for transitioning a cluster of host computer systems from being configured imperatively to being configured declaratively according to a configuration profile. First, the eligibility of the cluster to be transitioned is determined. Next, a transition wizard is started, which guides the administrator through the steps of the transition. The steps include obtaining the configuration profile, validating the configuration, viewing compliance to the configuration by the cluster, performing a pre-check, and then applying the configuration to the cluster when the validation and pre-check are successful. In this manner, all of the hosts in the cluster are properly configured according to the declarative profile, and error-prone manual configuration is eliminated.

IPC Classes  ?

81.

SIMULATED EVENT ORCHESTRATION FOR A DISTRIBUTED CONTAINER-BASED SYSTEM

      
Application Number 18376008
Status Pending
Filing Date 2023-10-03
First Publication Date 2025-01-16
Owner VMWARE LLC (USA)
Inventor
  • Gopireddy, Gurivi Reddy
  • Chandrasekaran, Aakash
  • Bhaskar, Priyanka
  • Sadana, Hemant
  • Kotha, Venu Gopala Rao
  • Shaikh, Umar

Abstract

The disclosure provides a method for orchestrating simulated events in a distributed container-based system. The method generally includes monitoring, by a chaos controller deployed in a management cluster of the container-based system, for new objects generated at the management cluster, wherein the management cluster is configured to manage a plurality of simulated workload clusters in a simulation system, based on the monitoring, discovering, by the chaos controller, a new object generated at the management cluster providing information about events intended to be simulated for one or more simulated workload clusters of the plurality of simulated workload clusters, determining a plan for orchestrating a simulation of the events in the one or more simulated workload clusters based on the information provided in the new object, and triggering the simulation of the events in accordance with the plan.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

82.

METHODS AND SYSTEMS THAT AUTOMATICALLY GENERATE PARAMETERIZED CLOUD-INFRASTRUCTURE TEMPLATES

      
Application Number 18380661
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-01-16
Owner VMWARE, LLC (USA)
Inventor
  • Agarwal, Priyank
  • Kumar, Praveen
  • Reutova, Valentina Leonidovna
  • Hatch, Thomas
  • Mcmarrow, Charles
  • Sampangiramaiah, Murali

Abstract

The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that automatically generates parameterized cloud templates that represent already deployed cloud-based infrastructure, including virtual networks, virtual machines, load balancers, and connection topologies. The IaC cloud-infrastructure manager provides an infrastructure-discovery service that accesses a cloud-computing facility to obtain information about already deployed cloud infrastructure and that generates a textual description of the deployed infrastructure, which the IaC cloud-infrastructure-manager then transforms into a set of parameterized cloud-infrastructure-specification-and-configuration files, a resource_ids file, and a parameters file that together comprise a parameterized cloud template.

IPC Classes  ?

  • H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
  • H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability

83.

METHODS AND SYSTEMS THAT AUTOMATICALLY SEGREGATE INFRASTRUCTURE-AS-CODE DATA INTO CATEGORY-ASSOCIATED FILES

      
Application Number 18381662
Status Pending
Filing Date 2023-10-19
First Publication Date 2025-01-16
Owner VMWARE, LLC (USA)
Inventor
  • Agarwal, Priyank
  • Goyal, Deepansha
  • Kumar, Praveen
  • Shet, Suchitha
  • Chauhan, Vijay

Abstract

The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that automatically segregates resource descriptors into category-associated files. In a first mode of operation, an automatic segregator receives one or more raw specification-and-configuration files and partitions the resources specified in the one or more raw specification-and-configuration files into category-associated resource groups. The specifications for the resources that are then stored in category-associated files that may, in turn, be stored in category-associated subdirectories of a file-system directory. In a second mode of operation, the automatic segregator transforms a first type of specification-and-configuration files within a first file-system directory into a second type of equivalent specification-and-configuration files within a second file-system directory.

IPC Classes  ?

  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor

84.

METHODS AND SYSTEMS THAT AUTOMATICALLY COMPACT, AND ENHANCE THE MANAGEABILITY OF, CLOUD-INFRASTRUCTURE-MANAGEMENT CODE

      
Application Number 18381665
Status Pending
Filing Date 2023-10-19
First Publication Date 2025-01-16
Owner VMware LLC (USA)
Inventor
  • Chauhan, Vijay
  • Agarwal, Priyank
  • Kumar, Praveen
  • Ramachandra, Nitin
  • Das, Aakash

Abstract

The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that automatically compacts, and enhances the manageability of, IaC specification-and-configuration files. In a disclosed implementation, specification-and-configuration files used by a first cloud-infrastructure-management service or system to deploy cloud-based infrastructure in a cloud-computing facility are used by a different cloud-infrastructure-management service or system to compact and enhance a parameterized cloud template generated by the different cloud-infrastructure-management service or system to represent the already deployed cloud-based infrastructure. Compaction and manageability enhancement are implemented using control structures and constructs of a template language introduced into the parameterized cloud template.

IPC Classes  ?

85.

VMWARE

      
Application Number 237387000
Status Pending
Filing Date 2025-01-10
Owner VMware LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer software for managing, testing, and using multiple operating systems, and instructional manuals therefor sold as a unit; computer software for automation of IT processes; computer software for the management and deployment of computing resources across computer networks; downloadable software for creating and managing a cloud-based software-defined datacenter of compute, storage and network capabilities; computer software for automation of IT processes; computer software for the management and deployment of computing resources across computer networks; downloadable software for creating and managing a cloud-based software-defined datacenter of compute, storage and network capabilities; operating system software used across servers, storage and networks to aggregate hardware resources and provide built-in services to applications for operating, developing, and managing software and hardware resources; operating system software for managing and automating information technology network management processes; computer software for managing, testing, and using multiple operating systems, and instructional manuals therefor sold as a unit. (1) Building, executing, securing and managing computer applications and application components; deploying, managing, securing and operating containerized applications across different environments; Platform as a service (PaaS) featuring computer software platforms for deploying, managing, securing and operating containerized applications across different environments; technical consulting and research services in the fields of computer software, and computer networks; consulting services in the field of design, selection, implementation and use of computer hardware and software systems; computer programming services; design, development, deployment, implementation, analysis, integration, and management of computer software for others; installation, modification, maintenance, and repair of computer software; customization and configuration of computer software; consulting services related to virtual infrastructure, storage and networking; managed information technology services and operations for others, namely, management of virtual infrastructure, networking and storage services; service provider, namely, hosting, managing and administering computer software for others; leasing and rental of computer software; technical support services, namely, trouble shooting of computer software; technical support services, namely, trouble shooting in the nature of computer hardware diagnosis; technical support services, namely, trouble shooting in the nature of diagnosing computer hardware problems; platform as a Service (PaaS) for creating and managing a cloud-based software-defined data center of compute, storage and network capabilities; software as a Service (SaaS) which monitors endpoints of a data center for known-good behavior and provides inputs upon detecting divergence from the known-good behavior; software as a service (SAAS) services featuring software to provide platform mobility for software applications; software as a service for the management of storage and network resources; software as a service for the automation of IT processes; software as a service for the management and deployment of computing resources across computer networks; enterprise computing services, namely, providing temporary use of non- downloadable software for use in computer program license management and for use in account and permissions administration; providing temporary use of non-downloadable software for data manipulation, validation and reporting of customer specific information and customer identity; computer services, namely, designing, programming, managing, and developing virtual desktop infrastructure platforms; designing, programming, managing, and developing software applications for use on virtual desktop infrastructure platforms; computer services, namely, creation and management of computer services for operating system software used across servers, storage and networks to aggregate software and hardware resources; computer services, namely, designing, developing, implementing, managing applications, infrastructure, computer software and hardware, development platforms, networks and databases; computer services, namely, maintaining applications, infrastructure, computer software, development platforms, networks and databases; creation, management and delivery of computer applications and IT services via the Internet and web/intranet/phone/mobile networks, namely, computer software development; computer time-sharing services; leasing computer facilities; computer services in the nature of web/intranet/phone/mobile network-based access to and manipulation of user defined information, personal profiles, and information in the nature of an application service provider, namely, providing, hosting, managing, developing, and maintaining applications, software, web sites, and databases of others in the fields of business productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops, desktops, servers and mobile electronic devices; computer services, namely, the management of computing resources and the delivery of computer applications and IT services by means of global computer information networks and intranet/phone/mobile networks, namely, design, creation and maintenance of web sites for others; providing temporary use of on-line non- downloadable software for management of computing resources and the delivery of computer applications and IT services; consultation services related to all of the foregoing.

86.

ARCHITECTURE FOR MONITORING METRICS OF NETWORK MANAGEMENT SYSTEM

      
Application Number 18231756
Status Pending
Filing Date 2023-08-08
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor
  • Wang, Ziyou
  • Zhang, Wenyu
  • Agarwal, Minjal
  • Wang, Qiong
  • Wang, Yuanhui
  • Han, Donghai

Abstract

Some embodiments provide a method for monitoring a multi-tenant network management system deployed in a cloud to manage groups of datacenters. The network management system includes multiple groups of service instances. For each respective group of service instances deployed in the cloud to manage a respective datacenter group, the method deploys a metrics collection agent within each service instance of the group of service instances to collect metrics from services of the service instance and provide the collected metrics to a metric monitoring service instance of the group of service instances. For each respective group of service instances, the method deploys a metrics collection manager within the metric monitoring service instance of the group of service instances. The metrics collection manager is for configuring each of the metrics collection agents deployed within the service instances of the group of service instances.

IPC Classes  ?

  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation
  • H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor

87.

ARCHITECTURE FOR MONITORING METRICS OF NETWORK MANAGEMENT SYSTEM

      
Application Number 18231757
Status Pending
Filing Date 2023-08-08
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor
  • Wang, Ziyou
  • Zhang, Wenyu
  • Agarwal, Minjal
  • Wang, Qiong
  • Wang, Yuanhui
  • Han, Donghai

Abstract

Some embodiments provide a method for monitoring a multi-tenant network management system deployed in a public cloud to manage groups of datacenters. Each respective datacenter group includes one or more datacenters of a respective tenant that defines the datacenter group. For each datacenter group of a set of datacenter groups managed by the multi-network management system, the method deploys a set of network management service instances in the cloud specified by the tenant for the datacenter group. Each of the network management service instances provides a specified service to the datacenters of the datacenter group. For each datacenter group, the method deploys a metric monitoring service instance in the cloud for the datacenter group. The metric monitoring service instance is for collecting and analyzing metrics from services belonging to each of the network management service instances deployed for the datacenter group.

IPC Classes  ?

  • H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

88.

CERTIFICATE MANAGEMENT IN REMOTE COLLECTORS WITH HIGH AVAILABILITY

      
Application Number 18244323
Status Pending
Filing Date 2023-09-11
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor
  • Kaki, Venkata Padma
  • Singh, Rahul
  • D, Vinothkumar
  • Totappanavar, Vineeth
  • Ramabhadran, Aswathy

Abstract

The system includes a first endpoint and a second endpoint executing a remote collector to receive metrics from the first endpoint using a first CA certificate of the remote collector. Further, the system includes a storage device to store a second CA certificate for a collector group that shares responsibility for a monitoring function to support high availability and a management node including a certificate management module. The certificate management module may add the second endpoint to the collector group in response to receiving a request. Further, the certificate management module may retrieve the second CA certificate from the storage device and replace the first CA certificate of the remote collector with the second CA certificate of the collector group. Furthermore, the certificate management module may enable the collector group to validate a request to accept the metrics from the first endpoint based on the second CA certificate.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 11/30 - Monitoring
  • H04L 41/0663 - Performing the actions predefined by failover planning, e.g. switching to standby network elements
  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload
  • H04L 67/56 - Provisioning of proxy services

89.

DISTRIBUTED COMPRESSIVE SENSING OF MULTI-DOMAIN SPARSE SIGNALS IN DISTRIBUTED EDGE SYSTEMS

      
Application Number 18348145
Status Pending
Filing Date 2023-07-06
First Publication Date 2025-01-09
Owner VMWARE LLC (USA)
Inventor Dehghan, Hoda

Abstract

An example receiver in a distributed edge system includes sensors configured to receive radio frequency (RF) signals from a channel in an environment. The sensors include front-end circuits configured to convert the RF signals into mixed signals at baseband having a discrete-time basis. Each of the mixed signals includes a mixture of source signals, which are compressively sampled and transmitted by sources in the distributed edge system over the channel. The receiver includes a processor, coupled to the sensors, configured to use measurements of the mixed signals with an implementation of convolutive blind source separation (CBSS) in multiple domains to separate estimated source signals from the mixed signals and determine estimated channel coefficients for the channels. The processor is configured to send, to the sources, information to adjust sampling rates in response to a relation between the measurements, the estimated source signals, and the estimated channel coefficients.

IPC Classes  ?

  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • G16Y 10/75 - Information technologyCommunication

90.

EMPIRICAL CHARACTERIZATION OF USER EXPERIENCE WITH ARBITRARY WORKLOADS IN VDI ENVIRONMENTS

      
Application Number 18348184
Status Pending
Filing Date 2023-07-06
First Publication Date 2025-01-09
Owner VMWARE LLC (USA)
Inventor
  • Sivaraman, Hari
  • Hossain, Mohammad Zahangir

Abstract

The disclosure provides an approach for verifying and improving the visual experience on client machines located on a virtual desktop infrastructure (VDI) system in response to measuring various metrics of the visual display. The metrics include frame rate, smoothness, and image quality. The metrics are obtained by using an arbitrary workload. Obtaining the metrics involves running screenshots of the arbitrary workload through convolutional neural nets to measure blemishes and blurriness.

IPC Classes  ?

91.

DYNAMICALLY ASSIGNING MACHINES TO TRAFFIC GROUPS BASED ON EDGE CAPACITY AND MACHINE PRIORITY

      
Application Number 18373589
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor Ghosh, Chandan

Abstract

Some embodiments provide a novel method for associating machines of a first network with gateways that connect the machines to an external second network. The method assigns first and second sets of machines to first and second traffic groups that are associated with first and second gateways. Based on statistics regarding data message load on the first gateway, the method identifies a first machine to reassign from a first traffic group to the second traffic group. The method reassigns the first machine to the second traffic group to reduce data message load on the first gateway.

IPC Classes  ?

  • H04L 47/80 - Actions related to the user profile or the type of traffic
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering

92.

ALLOCATION OF THREAD LOCAL STORAGE WHEN A THREAD SWITCHES BETWEEN LINK DOMAINS SHARING A COMMON ADDRESS SPACE

      
Application Number 18763532
Status Pending
Filing Date 2024-07-03
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor
  • Cully, Aidan
  • Veljko, Dušan

Abstract

Thread local storage is allocated to a thread that is executed in different link domains that share a memory address space by initially allocating a thread local storage having a first base address in the shared memory address space to the thread and a thread local storage having a second base address in the shared memory address space to a second thread that is created as a watcher thread of the first thread. When it is determined that the first thread has made a transition from executing code from the first link domain to executing code from the second link domain, the thread local storage having the second base address is allocated to the first thread. Thereafter, when it is determined that the first thread has resumed executing code from the first link domain, the thread local storage having the first base address is allocated to the first thread.

IPC Classes  ?

  • G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

93.

VMWARE

      
Serial Number 98948548
Status Pending
Filing Date 2025-01-09
Owner VMware LLC ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software for managing, testing, and using multiple operating systems, and instructional manuals therefor sold as a unit; computer software for automation of IT processes; computer software for the management and deployment of computing resources across computer networks; downloadable software for creating and managing a cloud-based software-defined data center of compute, storage and network capabilities; computer software for automation of IT processes; computer software for the management and deployment of computing resources across computer networks; downloadable software for creating and managing a cloud-based software-defined data center of compute, storage and network capabilities; operating system software used across servers, storage and networks to aggregate hardware resources and provide built-in services to applications for operating, developing, and managing software and hardware resources; operating system software for managing and automating information technology network management processes; computer software for managing, testing, and using multiple operating systems, and instructional manuals therefor sold as a unit. Building, executing, securing and managing computer applications and application components; deploying, managing, securing and operating containerized applications across different environments; Platform as a service (PaaS) featuring computer software platforms for deploying, managing, securing and operating containerized applications across different environments; technical consulting and research services in the fields of computer software, and computer networks; consulting services in the field of design, selection, implementation and use of computer hardware and software systems; computer programming services; design, development, deployment, implementation, analysis, integration, and management of computer software for others; installation, modification, maintenance, and repair of computer software; customization and configuration of computer software; consulting services related to virtual infrastructure, storage and networking; managed information technology services and operations for others, namely, management of virtual infrastructure, networking and storage services; service provider, namely, hosting, managing and administering computer software for others; leasing and rental of computer software; technical support services, namely, trouble shooting of computer software; technical support services, namely, trouble shooting in the nature of computer hardware diagnosis; technical support services, namely, trouble shooting in the nature of diagnosing computer hardware problems; platform as a Service (PaaS) for creating and managing a cloud-based software-defined data center of compute, storage and network capabilities; software as a Service (SaaS) which monitors endpoints of a data center for known-good behavior and provides inputs upon detecting divergence from the known-good behavior; software as a service (SAAS) services featuring software to provide platform mobility for software applications; software as a service for the management of storage and network resources; software as a service for the automation of IT processes; software as a service for the management and deployment of computing resources across computer networks; enterprise computing services, namely, providing temporary use of non- downloadable software for use in computer program license management and for use in account and permissions administration; providing temporary use of non-downloadable software for data manipulation, validation and reporting of customer specific information and customer identity; computer services, namely, designing, programming, managing, and developing virtual desktop infrastructure platforms; designing, programming, managing, and developing software applications for use on virtual desktop infrastructure platforms; computer services, namely, creation and management of computer services for operating system software used across servers, storage and networks to aggregate software and hardware resources; computer services, namely, designing, developing, implementing, managing applications, infrastructure, computer software and hardware, development platforms, networks and databases; computer services, namely, maintaining applications, infrastructure, computer software, development platforms, networks and databases; creation, management and delivery of computer applications and IT services via the Internet and web/intranet/phone/mobile networks, namely, computer software development; computer time-sharing services; leasing computer facilities; computer services in the nature of web/intranet/phone/mobile network-based access to and manipulation of user defined information, personal profiles, and information in the nature of an application service provider, namely, providing, hosting, managing, developing, and maintaining applications, software, web sites, and databases of others in the fields of business productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops, desktops, servers and mobile electronic devices; computer services, namely, the management of computing resources and the delivery of computer applications and IT services by means of global computer information networks and intranet/phone/mobile networks, namely, design, creation and maintenance of web sites for others; providing temporary use of on-line non- downloadable software for management of computing resources and the delivery of computer applications and IT services; consultation services related to all of the foregoing.

94.

PACKET FRAGMENTATION USING OUTER HEADER

      
Application Number 18828975
Status Pending
Filing Date 2024-09-09
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor
  • Yu, Jia
  • Wang, Yong
  • Hong, Xinhua
  • Jiang, Wenyi
  • Yang, Guolin
  • Wang, Dexiang

Abstract

In some embodiments, a method fragments a first packet into a plurality of fragments when a length of an encapsulated first packet is larger than a maximum transmission unit size. For each fragment in the plurality of fragments, fragmentation information is generated. The method encapsulates each fragment in the plurality of fragments with an outer header to form a plurality of encapsulated packets. The respective fragmentation information for each fragment is inserted in a portion of the outer header that is processed by endpoints of an overlay tunnel and not processed by a device along a path of the overlay tunnel. The plurality of encapsulated packets are sent via the overlay tunnel.

IPC Classes  ?

  • H04L 49/9057 - Arrangements for supporting packet reassembly or resequencing
  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
  • H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
  • H04L 69/166 - IP fragmentationTCP segmentation
  • H04L 69/22 - Parsing or analysis of headers

95.

DEPLOYMENT OF CLOUD INFRASTRUCTURES USING A CLOUD MANAGEMENT PLATFORM

      
Application Number 18227825
Status Pending
Filing Date 2023-07-28
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor
  • Holzman, Danny
  • Duddukuri, Rambabu
  • Singh, Kiran Krishna
  • Mcdonough, Kathleen

Abstract

This disclosure relates generally to creating and managing cloud infrastructure, and more specifically, integrating one or more cloud infrastructure tools for building cloud infrastructures. An example method includes, receiving a request to deploy a cloud infrastructure on a cloud service provider based on a cloud template of the cloud management platform; transmitting configuration instructions to a container orchestration platform for execution on one or more containers running on the container orchestration platform, the configuration instructions directing the one or more containers to deploy the cloud infrastructure; receiving a deployment state of the cloud infrastructure on the cloud service provider from the container orchestration platform following execution of the configuration instructions; and reporting a status of the cloud infrastructure based on the deployment state.

IPC Classes  ?

96.

ADAPTIVE MIGRATION ESTIMATION FOR A GROUP OF VIRTUAL COMPUTING INSTANCES

      
Application Number 18236969
Status Pending
Filing Date 2023-08-23
First Publication Date 2025-01-09
Owner VMWARE LLC (USA)
Inventor
  • Sharma, Bhavesh
  • Kumar, Sumit
  • Patel, Vipul
  • Murty, Vemana

Abstract

System and computer-implemented method for predicting durations for virtual computing instance migrations between computing environments calculates initial estimated migration durations for virtual computing instances of a group based on the total available resources and the number of active virtual computing instances being migrated. Revised estimated migration durations are then calculated for at least one of the virtual computing instances of the group selected for migration based on the total available resources and the number of current active virtual computing instances being migrated when migration of at least one of the virtual computing instances of the group is predicted to complete before other virtual computing instances of the group. The revised migration durations are associated with a duration migration prediction for the group of virtual computing instances from a source computing environment to a destination computer environment.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

97.

REMOTE COLLECTOR-BASED UPDATING OF MONITORED ENDPOINTS

      
Application Number 18243115
Status Pending
Filing Date 2023-09-07
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor
  • Singh, Rahul
  • Totappanavar, Vineeth
  • Kaki, Venkata Padma
  • Addanki, Bhuvaneswari
  • Bhaduri, Atreyee

Abstract

The system includes a first endpoint executing a configuration agent and a second endpoint executing a remote collector. The remote collector may use a first service to receive metrics of the first endpoint based on a first client certificate. The remote collector includes a detection unit to detect whether the second endpoint has been added to or removed from a collector group that shares responsibility for monitoring functions to support high availability. The remote collector includes a certificate generation unit to generate a second client certificate for the first endpoint based on whether the second endpoint has been added to or removed from the collector group. Further, the remote collector includes a configuration master to update the first endpoint to replace the first client certificate with the second client certificate and cause the first endpoint to post metrics to a second service at the remote collector.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality

98.

FEDERATED QUERY PROCESSING FOR DISTRIBUTED DATABASES

      
Application Number 18243628
Status Pending
Filing Date 2023-09-07
First Publication Date 2025-01-09
Owner VMWARE LLC (USA)
Inventor
  • Li, Xiaoliang
  • Lin, Wen
  • Liu, Huiliang
  • Chen, Mulong
  • Wang, Xiaoran
  • Zhao, Xuejing
  • Guo, Jian

Abstract

The disclosure provides a method for querying data across a plurality of distributed databases. The method includes receiving a query at a local coordinator of a local database cluster. The method further includes sending the query to a remote coordinator of a remote database cluster. The method further includes retrieving, by each local segment of a plurality of local segments of the local database cluster, data responsive to the query from corresponding one or more remote segments of the remote database cluster associated with the local segment. The method further includes sending a response to the query based on the data responsive to the query from each of the corresponding one or more remote segments.

IPC Classes  ?

  • G06F 16/248 - Presentation of query results
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/2453 - Query optimisation
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

99.

REMOTE ATTESTATION OF WORKLOADS RUNNING IN VIRTUAL MACHINES

      
Application Number 18464866
Status Pending
Filing Date 2023-09-11
First Publication Date 2025-01-09
Owner VMware LLC (USA)
Inventor
  • Gerganov, Radoslav Vladimirov
  • Bankov, Dentcho Ludmilov

Abstract

In one set of embodiments, a computer system executing a virtual machine (VM) packaging tool can receive a reference to a container comprising one or more applications of a workload and a reference to an operating system (OS) kernel to be included in the workload. The computer system can inject an agent into the container that is configured to request execution of a hardware VM attestation function, combine contents of the container and the OS kernel into an image file, and compute a hash of the image file. The computer system can then generate a firmware for the workload that includes the hash.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

100.

SCALING DATAPATH PODS OF A RIC IN A RAN

      
Application Number 18215773
Status Pending
Filing Date 2023-06-28
First Publication Date 2025-01-02
Owner VMWARE LLC (USA)
Inventor Singh, Amit

Abstract

Some embodiments of the invention provide a method for increasing system capacity of a RIC in a RAN, the RIC including a first datapath pod for forwarding communications between a first set of RAN applications connected to the RIC and a first set of base station components connected to the RIC. The method uses the first datapath pod to forward communications between the first set of RAN applications and the first set of base station components. The method determines that the first datapath pod has insufficient resources for forwarding traffic between the first set of base station components and the first set of RAN applications. Based on said determination, the method configures a second datapath pod on the RIC for forwarding traffic between the first set of base station components and the first set of RAN applications. The method assigns a first subset of the first set base station components to the first datapath pod and a second subset of the first set of base station components to the second datapath pod.

IPC Classes  ?

  • H04W 24/02 - Arrangements for optimising operational condition
  1     2     3     ...     57        Next Page