USING LIGHTWEIGHT MACHINE-LEARNING MODEL ON SMART NIC

    公开(公告)号:US20230342398A1

    公开(公告)日:2023-10-26

    申请号:US17727230

    申请日:2022-04-22

    Applicant: VMware, Inc.

    CPC classification number: G06F16/90335

    Abstract: Some embodiments provide a method for using a machine learning (ML) model to respond to a query, at a smart NIC of a computer. The method receives a query including an input. The method applies a first ML model to the input to generate an output and a confidence measure for the output. When the confidence measure for the output is below a threshold, the method discards the output and provides the query to the computer for the computer to apply a second ML model to the input.

    PROVIDING DNS SERVICE IN AN SD-WAN
    23.
    发明公开

    公开(公告)号:US20230239234A1

    公开(公告)日:2023-07-27

    申请号:US17966814

    申请日:2022-10-15

    Applicant: VMware, Inc.

    CPC classification number: H04L45/123 H04L61/4511

    Abstract: The method of some embodiment provides DNS service for an SD-WAN. The method receives a DNS request for a domain name (e.g., a FQDN) from one of the compute nodes connected to the SD-WAN (e.g., from a branch site or datacenter site, or a machine of a remote user). The method selects a particular network address (e.g., a particular IP address) from several network addresses (e.g., several IP addresses) of several different sets of servers that are associated with the domain name based on measurements taken by agents deployed in the SD-WAN and based on SD-WAN DNS-resolution selection criteria. The method provides the particular network address in response to the DNS request to the machine that sent the DNS request (e.g., to the branch site or datacenter that sent the DNS request, or to the machine of the remote user that sent the request).

    EFFICIENT MECHANISM FOR THE TRANSMISSION OF MULTIPATH DUPLICATE PACKETS

    公开(公告)号:US20230216804A1

    公开(公告)日:2023-07-06

    申请号:US18088555

    申请日:2022-12-24

    Applicant: VMware, Inc.

    CPC classification number: H04L47/34 H04L45/121 H04L45/42 H04L45/566

    Abstract: The method, in some embodiments, aggregates duplicate transmission control protocol (TCP) packets of a data stream duplicated and sent over disjoint routing paths. Each duplicate pair of packets includes a packet sequence number unique to that duplicate pair. The method iteratively (1) generates a window of packet sequence numbers for the data stream starting with a lowest packet sequence number, of the data stream, that has not been received, (2) receives a TCP packet sent over one of a first routing path and a second, disjoint routing path. If the packet sequence number of the received TCP packet is outside the window or is a duplicate of a previously received TCP packet, the method drops the received TCP packet. If the packet sequence number of the received TCP packet is within the window and is not a duplicate of a previously received TCP packet, the method stores the received packet.

    BYZANTINE FAULT TOLERANCE PROTOCOL FOR BACKING UP BLOCKCHAINS

    公开(公告)号:US20230195750A1

    公开(公告)日:2023-06-22

    申请号:US17555053

    申请日:2021-12-17

    Applicant: VMware, Inc.

    CPC classification number: G06F16/273 G06F11/1451 G06F2201/80

    Abstract: In some embodiments, a method sends first messages that request first information for a set of blocks of the blockchain to the N replicas. Each replica maintains a respective instance of the blockchain. Second messages is received from at least a portion of the N replicas. The second messages include the first information for the set of blocks from each respective instance of the blockchain that is maintained by the N replicas. The method analyzes the first information to determine whether a consensus on the first information is reached by a number of replicas. When consensus is reached, a request is sent to a replica for one or more blocks to back up to a backup blockchain and second information is received for the one or more blocks from the replica. The method uses the second information to back up the one or more blocks in the backup blockchain.

    TUNNEL-LESS SD-WAN
    28.
    发明公开
    TUNNEL-LESS SD-WAN 审中-公开

    公开(公告)号:US20230179521A1

    公开(公告)日:2023-06-08

    申请号:US18102689

    申请日:2023-01-28

    Applicant: VMware, Inc.

    CPC classification number: H04L45/74 H04L45/20 H04L45/38 H04L45/42

    Abstract: In a novel tunnel-less SD-WAN, when an ingress node of the SD-WAN receives a new packet flow, it identifies the path of the flow through the SD-WAN, and sends an initial prepended set of SD-WAN header values before the first packet for the flow to the next hop along this identified path, rather than encapsulating each packet of the flow with encapsulating tunnel headers that store SD-WAN next hop data for the flow. The prepended set of SD-WAN header values are then used to not only forward the first packet through the SD-WAN, but also to create records at each subsequent hop, which are then used to forward subsequent packets of the flow through the SD-WAN. Instead of identifying the entire packet flow, the first hop in the SD-WAN does not identify the entire path for the packet flow in some embodiments, but just identifies the next hop, as each subsequent hop in the SD-WAN has the task of identifying the next hop through the SD-WAN for the packet flow. Also, in some embodiments, each hop also creates records for the reverse flow in order to automatically forward reply packets along a reverse route.

    Distributed Registration and Authentication via Threshold Secret Sharing

    公开(公告)号:US20230179406A1

    公开(公告)日:2023-06-08

    申请号:US17543513

    申请日:2021-12-06

    Applicant: VMware, Inc.

    CPC classification number: H04L9/085 H04L9/0869

    Abstract: Techniques for implementing distributed registration and authentication (i.e., the collaborative processing of client registration and authentication requests by multiple nodes in a computing system) via threshold secret sharing are provided. A threshold secret sharing scheme is a cryptographic method for sharing a secret among N parties in a manner that requires at least T+1 of the N parties to cooperate in order to reconstruct/reveal the secret, where T is some threshold value less than N. By leveraging threshold secret sharing, these techniques enable a group of N nodes to efficiently implement distributed registration and authentication in a correct, secure, and privacy-preserving fashion, even if up to T of the N nodes are corrupted by an adversary.

Patent Agency Ranking