VMware, Inc. patent applications on July 18th, 2024

From WikiPatents
Jump to navigation Jump to search

Patent Applications by VMware, Inc. on July 18th, 2024

VMware, Inc.: 26 patent applications

VMware, Inc. has applied for patents in the areas of H04L9/40 (8), G06F9/455 (6), G06F9/50 (4), H04L12/18 (2), G06F3/12 (1) G06F9/45558 (3), G06F9/505 (2), G06F9/5072 (2), G06F3/1243 (1), H04L43/04 (1)

With keywords such as: device, host, data, user, based, agent, network, client, resource, and request in patent application abstracts.



Patent Applications by VMware, Inc.

20240241678. ADDING A WATERMARK ON A DOCUMENT FOR PRINTING IN A VIRTUAL DESKTOP INFRASTRUCTURE (VDI) ENVIRONMENT_simplified_abstract_(vmware, inc.)

Inventor(s): Hui YUAN of Beijing (CN) for vmware, inc., Kun SHI of Beijing (CN) for vmware, inc.

IPC Code(s): G06F3/12

CPC Code(s): G06F3/1243



Abstract: example methods and systems are described to add a watermark for printing in a virtual desktop environment having an agent side and a client side. a watermark can be configured at the agent side for printing at the client side. at the agent side, a fallback font can be determined for text of the watermark, and coordinate space calculation can be performed, so that the watermark prints correctly at the client side.


20240241728. HOST AND DPU COORDINATION FOR DPU MAINTENANCE EVENTS_simplified_abstract_(vmware, inc.)

Inventor(s): Sowgandh Sunil Gadi of San Jose CA (US) for vmware, inc., Venkata Subhash Reddy Peddamallu of Sugar Hill CA (US) for vmware, inc., Andrei Evgenievich Warkentin of South Elgin IL (US) for vmware, inc.

IPC Code(s): G06F9/4401

CPC Code(s): G06F9/4403



Abstract: disclosed are various examples of host and data processing unit (dpu) coordination for dpu maintenance events. a host device can have a dpu device connected to it. a data processing unit (dpu) maintenance process executed by a host device can quiesce applications or virtual machines of the host device, and call a dpu isolation interface that isolates the dpu device to prevent host panic. a kernel process of the host device unloads a driver of the dpu device from the host device and removes the dpu device from a device manager of the host device. a dpu maintenance action is performed once the dpu device is isolated.


20240241740. CLUSTER AFFINITY OF VIRTUAL MACHINES_simplified_abstract_(vmware, inc.)

Inventor(s): Alkesh Shah of Sunnyvale CA (US) for vmware, inc., Deepak Babarjung of Palo Alto CA (US) for vmware, inc., Swapnil Dattatraya Tiwari of Santa Clara CA (US) for vmware, inc., Avinash Nagalapur Jambana Goud of Santa Clara CA (US) for vmware, inc., Snigdha Gulhati of Palo Alto CA (US) for vmware, inc., Gabriel Tarasuk-Levin of San Francisco CA (US) for vmware, inc.

IPC Code(s): G06F9/455

CPC Code(s): G06F9/45558



Abstract: the disclosure provides a method for tracking virtual machines (vms) associated with a plurality of hosts in an inventory. the method generally includes determining to remove a first host of the plurality of hosts, the first host running a first vm, wherein: the first host and a second host are associated with a first host cluster in the inventory; the first host is the associated-host and the registered-host of the first vm in the inventory; determining the first vm is associated with first host cluster based on the associated-host of the first vm being the first host and the first host being associated with the first host cluster; identifying the second host is associated with the first host cluster in the inventory; altering the associated-host of the first vm to the second host and unsetting the registered-host for the first vm in the inventory; and removing the first host.


20240241741. ASYNCHRONOUS, EFFICIENT, ACTIVE AND PASSIVE CONNECTION HEALTH MONITORING_simplified_abstract_(vmware, inc.)

Inventor(s): Petko PADEVSKI of Sofia (BG) for vmware, inc., Georgi LEKOV of Sofia (BG) for vmware, inc., Stanimir LUKANOV of Sofia (BG) for vmware, inc.

IPC Code(s): G06F9/455

CPC Code(s): G06F9/45558



Abstract: the disclosure provides an example method for connection health monitoring and troubleshooting. the method generally includes monitoring a plurality of connections established between a first application running on a first host and a second application running on a second host; based on the monitoring, detecting two or more connections of the plurality of connections have failed within a first time period; in response to detecting the two or more connections have failed within the first time period, determining to initiate a single health check between the first host and the second host and enqueuing a single health check request in a queue to invoke performance of the single health check based on the single health check request; determining the queue comprises: a queued active health check request, or no previously-queued health check requests; enqueuing the single health check request in the queue; and performing the single health check.


20240241743. REGISTRATION AND DEPLOYMENT OF AN AGENT PLATFORM APPLIANCE IN A HYBRID ENVIRONMENT_simplified_abstract_(vmware, inc.)

Inventor(s): Prateek GUPTA of San Francisco CA (US) for vmware, inc., Fnu YASHU of Sunnyvale CA (US) for vmware, inc.

IPC Code(s): G06F9/455

CPC Code(s): G06F9/45558



Abstract: a method of registering and deploying an agent platform appliance in a hybrid environment includes the steps of: transmitting a first code to a cloud platform to create an authentication account for the agent platform appliance, wherein credentials for accessing the authentication account include the first code; transmitting a request for an access token that permits downloading images of agents from an agent repository of the cloud platform, wherein the request for the access token includes the first code for accessing the created authentication account; upon receiving the access token, transmitting a request to the agent repository, to download the images of the agents, wherein the request to download the images of the agents includes the received access token; and upon receiving the images of the agents from the agent repository, installing the agents on the agent platform appliance using the received images of the agents.


20240241759. UNIFIED RESOURCE MANAGEMENT ARCHITECTURE FOR WORKLOAD SCHEDULERS_simplified_abstract_(vmware, inc.)

Inventor(s): Sahan Bamunavita Gamage of San Jose CA (US) for vmware, inc., Prashanth Jonathan Victor of Sunnyvale CA (US) for vmware, inc., Maarten Wiggers of San Franciso CA (US) for vmware, inc.

IPC Code(s): G06F9/50, G06F9/48

CPC Code(s): G06F9/505



Abstract: various aspects are disclosed for unified resource management for multiple workload schedulers. a resource manager receives a candidate host request from a workload scheduler. the resource manager transmits a set of candidate host snapshots for candidate hosts that match the workload resource requirements. the resource manager receives a workload allocation request for a host and reserves hardware resources on the host that match the workload resource requirements. the resource manager provides, to the workload scheduler, an indication that the hardware resources are successfully reserved for execution of the workload.


20240241760. ELASTIC PROVISIONING OF CONTAINER-BASED GRAPHICS PROCESSING UNIT (GPU) NODES_simplified_abstract_(vmware, inc.)

Inventor(s): Yisan ZHAO of Beijing (CN) for vmware, inc., Xiaoyu HU of Austin TX (US) for vmware, inc., Robert RIEMER of Siegburg (DE) for vmware, inc., Aidan CULLY of Saint Augustine FL (US) for vmware, inc.

IPC Code(s): G06F9/50, G06F11/34

CPC Code(s): G06F9/505



Abstract: example methods and systems for elastic provisioning of container-based graphics processing unit (gpu) nodes are described. in one example, a computer system may monitor usage information associated with a pool of multiple container-based gpu nodes. based on the usage information, the computer system may apply rule(s) to determine whether capacity adjustment is required. in response to determination that capacity expansion is required, the computer system may configure the pool to expand by adding (a) at least one container-based gpu node to the pool, or (b) at least one container pod to one of the multiple container-based gpu nodes. otherwise, in response to determination that capacity shrinkage is required, the computer system may configure the pool to shrink by removing (a) at least one container-based gpu node, or (b) at least one container pod from the pool.


20240241763. EXCESS CAPACITY GRID FOR ARTIFICIAL INTELLIGENCE, MACHINE LEARNING, AND LOWER PRIORITY PROCESSES_simplified_abstract_(vmware, inc.)

Inventor(s): Daniel Beveridge of Valrico FL (US) for vmware, inc.

IPC Code(s): G06F9/50, G06F9/455

CPC Code(s): G06F9/5072



Abstract: aspects of providing an excess capacity grid for artificial intelligence, machine learning, and lower-priority processes are described. a grid orchestration client is installed on a virtual machine or a physical device that performs a production workload for an enterprise. the grid orchestration client communicates with a grid orchestration server as part of an excess capacity grid that performs grid workloads. a request to execute a grid workload is received. the grid orchestration client causes the grid workload to be executed.


20240241764. AUTOMATED SYSTEM FOR COLLECTING, STORING, SEARCHING, AND CORRELATING METRICS, LOG MESSAGES AND TRACES OF A DISTRIBUTED APPLICATION_simplified_abstract_(vmware, inc.)

Inventor(s): Chandrashekhar Jha of Bangalore (IN) for vmware, inc., Akash Srivastava of Bangalore (IN) for vmware, inc., Saloni Shah of Bangalore (IN) for vmware, inc., Chaitanya Krishna Mullangi of Bangalore (IN) for vmware, inc., Siddartha Laxman Karibhimanvar of Bangalore (IN) for vmware, inc.

IPC Code(s): G06F9/50

CPC Code(s): G06F9/5072



Abstract: the present disclosure relates to a system for monitoring execution of a distributed application running in a data center. the system includes a forwarder that runs in a tenant environment of the data center. the forwarder collects metrics, log messages, and spans output from microservices of the distributed application. the system includes an ingestion engine that receives the metrics, the log messages, and the spans output from the forwarder. the ingestion engine forms a trace from the spans, and stores the metrics, the log messages, and the trace with a common identifier in a database. the includes a user interface (“ut”) that displays the metrics, the log messages, and the trace in response to a user selection to the metrics, the log messages, and the trace via the ui.


20240241779. SIGNALING HOST KERNEL CRASHES TO DPU_simplified_abstract_(vmware, inc.)

Inventor(s): Jared McNeill of Quispamsis (CA) for vmware, inc., Rohith Jagannathan of Milpitas CA (US) for vmware, inc., Andrei Evgenievich Warkentin of South Elgin IL (US) for vmware, inc., Renaud Benjamin Voltz of Grass Valley CA (US) for vmware, inc., Shruthi Muralidhara Hiriyuru of Arlington MA (US) for vmware, inc., Cyprien Laplace of Boston MA (US) for vmware, inc.

IPC Code(s): G06F11/07

CPC Code(s): G06F11/0772



Abstract: disclosed are various examples of signaling host kernel crashes to a data processing unit (dpu) management operating system (os). a host kernel crash handler is installed to a host device. a crash of a host kernel of the host device is detected. this triggers the host kernel crash handler to provide the signal to the dpu device, which executes a dpu side crash handling process based on the signal.


20240241889. FRAMEWORK FOR BUILDING CLUSTER MANAGEMENT CONTROLLERS_simplified_abstract_(vmware, inc.)

Inventor(s): Lalith Suresh of Mountain View CA (US) for vmware, inc., Xudong Sun of Urbana-Champaign IL (US) for vmware, inc., Adriana Szekeres of Seatlle WA (US) for vmware, inc.

IPC Code(s): G06F16/28

CPC Code(s): G06F16/285



Abstract: examples described herein include systems and methods for providing a framework for building and verifying cluster-management controllers. using this framework, a developer can submit only a fraction of the code otherwise required to verify safety and liveness of a controller. a verification framework is provided that can verify the implementation of a cluster-management controller down to the manner it will execute. the developer can submit a small function that runs inside the provided framework, making formal verification possible. the framework provided to the developer can incorporate the complex details regarding standard portions of cluster-management controllers, the underlying platform (such as kubernetes, as an example), platform api, platform networking, and so on. the developer's code can therefore focus on the new features but still make use of formal verification for how that code will work within an entire cluster-management system.


20240241945. SYSTEM AND METHOD FOR CORRELATING ALERTS GENERATED BY ENDPOINTS_simplified_abstract_(vmware, inc.)

Inventor(s): Lalit Prithviraj JAIN of Santa Clara CA (US) for vmware, inc., Raghav BATTA of Livermore CA (US) for vmware, inc., Jonathan James OLIVER of Kew (AU) for vmware, inc., Anjali MANGAL of Cupertino CA (US) for vmware, inc.

IPC Code(s): G06F21/55

CPC Code(s): G06F21/552



Abstract: a method of correlating alerts that are generated by a plurality of endpoints includes the steps of: collecting alert data of alerts generated by the endpoints; for each endpoint, computing alert sequences based on the collected alert data; training a sequence-based model with the computed alert sequences, to generate a vector representation for each of the alerts; for each alert in a set of alerts generated during a first time period, acquiring a vector representation corresponding thereto, which has been generated by the sequence-based model; and applying a clustering algorithm to the vector representations of the alerts in the set of alerts to generate a plurality of clusters of correlated alerts.


20240241971. TRANSFORMING A HIERARCHICAL PERMISSIONS MODEL TO A LINEAR PERMISSIONS MODEL USING A CATEGORY APPROACH_simplified_abstract_(vmware, inc.)

Inventor(s): SREETAM PARIDA of Bangalore (IN) for vmware, inc., PRAVEEN TIRUMANYAM of Bangalore (IN) for vmware, inc., NARASIMHA GOPAL GORTHI of Bangalore (IN) for vmware, inc., NARASIMHA MURTHI of Bangalore (IN) for vmware, inc., AVINASH VENKATESH BHAT of Bangalore (IN) for vmware, inc.

IPC Code(s): G06F21/60

CPC Code(s): G06F21/604



Abstract: certain embodiments described herein are generally directed to techniques for determining items of inventory of a data center to which a user has access. embodiments include receiving permission information indicating specific user permissions assigned to particular items of a plurality of items in an inventory of data center resources, wherein items of the plurality of items are organized in a hierarchical manner across nodes of a hierarchical tree. embodiments include assigning categories to the plurality of items based on the permission information, wherein each of the particular items is assigned a unique category based on the specific user permissions and each of the plurality of items that is not in the particular items and that has a parent node in the hierarchical tree is assigned a category corresponding to the parent node. embodiments include storing category information in a data store based on the assigning of the categories.


20240242159. AUTOMATED ENTERPRISE INFORMATION TECHNOLOGY ALERTING SYSTEM_simplified_abstract_(vmware, inc.)

Inventor(s): KANNAN PARTHASARATHY of Palo Alto CA (US) for vmware, inc., MOHAMMED ABDUL QAVI of Hyderabad (IN) for vmware, inc.

IPC Code(s): G06Q10/0639, G06Q10/04

CPC Code(s): G06Q10/06393



Abstract: disclosed are various examples for automatically analyzing telemetry data from managed devices in one or more organizations and alerting information technology (it) administrators as early as possible when widespread issues are detected. telemetry data can be collected from managed devices across multiple organizations and/or enterprises. the collected data can be used to identify events (e.g., system crashes, application crashes, system boot times, system shutdown times, application hangs, application foreground/usage events, device central processing unit (cpu) and memory utilization, battery performance, etc.) that may indicate a potential issue in the it infrastructure. time-series data associated with the detected events can be generated and analyzed. upon detection of a potential issue in view of an analysis of the time-series data, an alert can be generated and presented to an it administrator or other entity who can further analyze and potentially remedy the issue.


20240242182. DYNAMIC MEETING SPACE CONFIGURATION BASED ON CONTENT_simplified_abstract_(vmware, inc.)

Inventor(s): ROHIT PRADEEP SHETTY of Bangalore (IN) for vmware, inc., Ramanandan Nambannor Kunnath of Bangalore (IN) for vmware, inc.

IPC Code(s): G06Q10/109, H04L9/40

CPC Code(s): G06Q10/109



Abstract: the present disclosure relates to dynamic meeting space configuration based on content. a client device can detect an entry of a user into a meeting space and notify a management service of the entry of the user into the meeting space. the client device can receive an access token from the management service and provide an access request for an enterprise resource to an enterprise resource service, where the access request comprises the access token. the client device can receive the enterprise resource from the enterprise resource service. the client device can provide data regarding the security classification of the enterprise resource to an edge device located within the meeting space. the client device can receive, from the edge device, a confirmation that a plurality of internet of things (iot) devices located within the meeting space have been configured according to the security classification of the enterprise resource. the client device can provide the enterprise resource to at least one of the iot devices for exhibition within the meeting space.


20240243941. SYSTEMS AND METHODS FOR MANAGED MEETING ROOMS_simplified_abstract_(vmware, inc.)

Inventor(s): RAMANANDAN NAMBANNOR KUNNATH of Bangalore (IN) for vmware, inc., ROHIT PRADEEP SHETTY of Bangalore (IN) for vmware, inc.

IPC Code(s): H04L12/18

CPC Code(s): H04L12/1831



Abstract: disclosed are various embodiments for preventing unauthorized access to materials presented in a meeting room. in one example, a system comprises a computing device that is configured to identify a list of invited users for a meeting occurring in a meeting room and to detect a client device of an uninvited user that has entered the meeting room. an uninvited user notification is transmitted to a remote computing device. a suspension command is received for the meeting room from the remote computing device based on the uninvited user notification. the computing device is configured to enforce a suspension action on a meeting room device located in the meeting room based on the suspension command.


20240243942. MULTICAST GROUP MEMBERSHIP CONTROL FOR A CONTAINER ENVIRONMENT_simplified_abstract_(vmware, inc.)

Inventor(s): Bin Liu of Beijing (CN) for vmware, inc., Wenying Dong of Beijing (CN) for vmware, inc., Ruochen Shen of Beijing (CN) for vmware, inc., Quan Tian of Beijing (CN) for vmware, inc., Jianjun Shen of Redwood City CA (US) for vmware, inc.

IPC Code(s): H04L12/18, H04L45/16

CPC Code(s): H04L12/185



Abstract: the disclosure provides approaches for managing multicast group membership at a node. an approach includes policing whether a pod can join a multicast group based on one or more rules. the approach further includes updating forwarding tables of a virtual switch based on whether the pod is allowed to join the multicast group.


20240243982. DETECTING NETWORK CONDITIONS FOR ENTERPRISE USERS_simplified_abstract_(vmware, inc.)

Inventor(s): Kannan Parthasarathy of Palo Alto CA (US) for vmware, inc.

IPC Code(s): H04L43/04, H04L43/02

CPC Code(s): H04L43/04



Abstract: disclosed are various examples for automatically analyzing telemetry data from managed devices in one or more organizations and categorizing devices and/or user accounts as home users, hybrid users, or office users. the categorization can be performed based upon an analysis of a wireless network connection of a client device that is managed by a management service.


20240243991. GROUPING ROUTE-BASED VIRTUAL PRIVATE NETWORK INTERFACES IN A VIRTUALIZED COMPUTING SYSTEM_simplified_abstract_(vmware, inc.)

Inventor(s): GAURAV JINDAL of Pune (IN) for vmware, inc., NEERAJ MANTRI of Pune (IN) for vmware, inc.

IPC Code(s): H04L45/24, H04L12/46, H04L45/586

CPC Code(s): H04L45/24



Abstract: an example method of identifying an equal cost multipath (ecmp)-enabled route-based virtual private networks (rbvpn) in a virtualized computing system, comprises: obtaining, at a telemetry agent executing in an edge server of a data center, learned routes; identifying, by the telemetry agent from the routes, a destination network and a plurality of next hops associated therewith and a plurality of virtual tunnel interfaces (vtis); identifying, by the telemetry agent for each of the plurality of vtis, an associated vpn session; grouping, by the telemetry agent, the vpn sessions identified as associated with the plurality of vtis into an ecmp-enabled rbvpn; adding, by the telemetry agent, a description of the ecmp-enabled rbvpn to telemetry data; and sending, by the telemetry agent, the telemetry data to a telemetry service.


20240244036. FLOW BASED BREAKOUT OF FIREWALL USAGE BASED ON TRUST_simplified_abstract_(vmware, inc.)

Inventor(s): SARAVANAN KANDASAMY of Bangalore (IN) for vmware, inc., Santosh Pallagatti Kotrabasappa of Bangalore (IN) for vmware, inc., Moses Devadason of Chennai (IN) for vmware, inc., Hari Narayan Gopalan of Chennai (IN) for vmware, inc., Praveen Kumar Rajendran of Chennai (IN) for vmware, inc., Sivakumar Seenivasan of Chennai (IN) for vmware, inc., Jayaprakash Harikrishnan of Chennai (IN) for vmware, inc.

IPC Code(s): H04L9/40

CPC Code(s): H04L63/0263



Abstract: a method for flow based breakout of firewall usage based on trust is provided. some embodiments include receiving flow data for one or more flows associated with an endpoint external to a data center, the flow data indicating the one or more flows meet one or more good flow criteria, the one or more flows corresponding to flows of data communicated via a firewall and determining, based on the flow data meeting one or more trusted endpoint criteria, the endpoint is trusted. some embodiments of the method include generating one or more policies that flows associated with the endpoint can bypass the firewall and configuring an edge services gateway with the one or more policies to cause the edge services gateway to apply the one or more policies without applying the firewall.


20240244037. CROSS CLUSTER CONNECTIVITY_simplified_abstract_(vmware, inc.)

Inventor(s): Lan Luo of Beijing (CN) for vmware, inc., Jianjun Shen of Redwood City CA (US) for vmware, inc., Jiajing Hu of Beijing (CN) for vmware, inc., Wenfeng Liu of Beijing (CN) for vmware, inc., Donghai Han of Beijing (CN) for vmware, inc.

IPC Code(s): H04L9/40, G06F9/455

CPC Code(s): H04L63/029



Abstract: systems and methods for exchanging network information between member clusters include configuring a gateway pool of a member cluster, the gateway pool comprising a plurality of gateway nodes, the member cluster comprising the plurality of gateway nodes and one or more nodes, configuring a gateway node of the plurality of gateway nodes as an active gateway node for the member cluster, writing member cluster information to a storage, the member cluster information indicating address information of the gateway node, reading second member cluster information from the storage, the second member cluster information indicating address information of a gateway node of a second member cluster, establishing a tunnel between the gateway node and the second gateway node based on the second member cluster information, and communicating network traffic from at least one node of the member cluster to at least one node of the second member cluster via the tunnel.


20240244053. PACKET CAPTURE IN A CONTAINER ORCHESTRATION SYSTEM_simplified_abstract_(vmware, inc.)

Inventor(s): Quan TIAN of Beijing (CN) for vmware, inc., Wenfeng LIU of Beijing (CN) for vmware, inc., Jianjun SHEN of Redwood City CA (US) for vmware, inc., Donghai HAN of Beijing (CN) for vmware, inc.

IPC Code(s): H04L9/40

CPC Code(s): H04L63/0892



Abstract: an example method of packet capture in a container orchestration (co) system includes: receiving, from a user interface executing on a client device, a packet capture request from a user at a packet capture agent executing in a node of the co system; authenticating and authorizing, by the packet capture agent in cooperation with an application programming interface (api) server executing in a master server of the co system, the user specified in the packet capture request; capturing, by the packet capture agent, packets from at least one network interface based on the packet capture request; and returning information based on the packets as captured from the packet capture agent to the user interface.


20240244055. EXTENDED PRELAUNCH FOR LOCAL OR REMOTE PHYSICAL AND VIRTUAL SYSTEMS_simplified_abstract_(vmware, inc.)

Inventor(s): Alex DANILYCHEV of Irvine CA (US) for vmware, inc.

IPC Code(s): H04L9/40, G06F9/451, G06F9/455

CPC Code(s): H04L63/102



Abstract: prior to a user login event associated with a first user identity, a prelaunch manager determines an occurrence of a primary window prelaunch trigger condition. a primary window station is prelaunched for a first user identity at a user endpoint. based on an occurrence of a user login event associated with the first user identity, a user session associated with the first user identity is connected with the primary window station. in some examples, the user endpoint is located remotely across a computer network from the prelaunch manager and does not require local capacity for prelaunch. in some examples, further window stations are prelaunched, nested within the primary window station, with the nested window station being associated with user identity having different privileges than the first user identity.


20240244070. MACHINE LEARNING BASED NETWORK ANOMALY DETECTION SYSTEM_simplified_abstract_(vmware, inc.)

Inventor(s): SHUBHRAJYOTI MOHAPATRA of Mayurbhanj (IN) for vmware, inc., Madan Singhal of Pune (IN) for vmware, inc., Deepak Gangwar of Bareilly (IN) for vmware, inc., Satyandra Guthula of Thane (IN) for vmware, inc.

IPC Code(s): H04L9/40, H04L41/16

CPC Code(s): H04L63/1425



Abstract: the disclosure provides an approach for detecting anomalous behavior of network traffic within a network environment. embodiments include receiving, by a risk analyzer operating on a server, network traffic flow records for one or more traffic flows in a network environment. embodiments also include serializing flow entries within the network traffic flow records into a plurality of temporal buckets. embodiments includes analyzing the network traffic flow records by a machine learning model configured to detect anomalous behavior based on (i) spatial patterns between at least a first set of features of flow entries and (ii) temporal patterns between the flow entries. further embodiments include initiating a network action in response to detecting anomalous behavior in at least one of the network traffic flow records.


20240244081. Protocol Switching and Secure Sockets Layer (SSL) Cross-Wiring to Enable Inter-Network Resource Connectivity_simplified_abstract_(vmware, inc.)

Inventor(s): John Kilroy of Portsmouth NH (US) for vmware, inc., Patrick Peralta of Arlington MA (US) for vmware, inc., Glenn Bruce McElhoe of Arlington MA (US) for vmware, inc.

IPC Code(s): H04L9/40

CPC Code(s): H04L63/166



Abstract: aspects of protocol switching and cross-wiring to enable inter-network connectivity are described. for example, a transporter system including a transporter server and a transporter client can securely connect applications to resources in differing networked environments (e.g., clouds and/or data centers). the transporter client may establish data channels as secure socket layer (ssl) connections (e.g., secure websockets (wss)) between a resource in one networked environment and a transporter server that is in communication via a proxy channel with an initiator device in another networked environment. upon completing the build of a data path between the initiator device and the resource, the handling protocol of the data channels that are established as ssl connections can be modified to a basic socket-level channel (e.g., transmission control protocol, user datagram protocol, etc.) to permit socket-level data stream communications without restrictions.


20240244082. SECURITY POSTURE VISUALIZATION_simplified_abstract_(vmware, inc.)

Inventor(s): SHRINIVAS SHARAD PARASHAR of Pune (IN) for vmware, inc., Kalpesh PATEL of Pune (IN) for vmware, inc., Tarang KHANDELWAL of Pune (IN) for vmware, inc., Priyanka BALI of Pune (IN) for vmware, inc., Krishna Pavan VAIDYULA of Pune (IN) for vmware, inc.

IPC Code(s): H04L9/40

CPC Code(s): H04L63/20



Abstract: the disclosure provides an approach for visualizing a security posture of a network entity. embodiments include a method including displaying, on a display of a computing device, a security posture summary screen of a network entity. the method further includes receiving a first input on a first connection depicted in the security posture summary screen, the first connection between the network entity and a first entity of one or more source entities or one or more destination entities. the method further includes in response to the first input, displaying, on the display, a drill down view screen of first security rules applicable to communication between the network entity and the first entity.


VMware, Inc. patent applications on July 18th, 2024