Movatterモバイル変換


[0]ホーム

URL:


US20150381362A1 - Encryption System in a Virtualized Environment - Google Patents

Encryption System in a Virtualized Environment
Download PDF

Info

Publication number
US20150381362A1
US20150381362A1US14/815,950US201514815950AUS2015381362A1US 20150381362 A1US20150381362 A1US 20150381362A1US 201514815950 AUS201514815950 AUS 201514815950AUS 2015381362 A1US2015381362 A1US 2015381362A1
Authority
US
United States
Prior art keywords
encryption
key
gvm
data
keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/815,950
Inventor
Kiran Kumar Thota
Azeem Feroz
James Christopher Wiese
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nicira Inc
Original Assignee
Nicira Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nicira IncfiledCriticalNicira Inc
Priority to US14/815,950priorityCriticalpatent/US20150381362A1/en
Publication of US20150381362A1publicationCriticalpatent/US20150381362A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections.

Description

Claims (20)

We claim:
1. A non-transitory machine readable medium for storing a program for updating a keyring with a plurality of keys, the keyring stored on a host computing device that executes a plurality of virtual machines (VMs) and used for encryption operations for data messages associated with at least one particular VM, the program for execution by at least one processing unit, the program comprising sets of instructions for:
receiving a command to (1) fetch a new key for the keyring and (2) remove a particular key from the plurality of keys in the keyring;
sending a request for the new key;
continuing to process data messages received from the particular VM by using a first set of keys in the keyring including the particular key, while processing data messages transmitted by the particular VM by using a second set of keys in the keyring excluding the particular key; and
upon receiving a new key, removing the particular key from the key ring.
2. The non-transitory machine readable medium ofclaim 1, wherein the program further comprises a set of instructions for processing received and transmitted data messages for the particular VM by using the keyring that includes the new key upon receiving the new key.
3. The non-transitory machine readable medium ofclaim 1, wherein the command is received when the particular key has been used for a certain duration of time.
4. The non-transitory machine readable medium ofclaim 1, wherein the command is received when the particular key has been used to encrypt a certain number of data messages.
5. The non-transitory machine readable medium ofclaim 1, wherein the command is received when the particular key has been used to encrypt a certain amount of data.
6. The non-transitory machine readable medium ofclaim 1, wherein the received command is sent by a controller that generates the command based on statistics that the controller collects from the host computing device regarding data that the particular key was used to encrypt.
7. The non-transitory machine readable medium ofclaim 1, wherein the program further comprises a set of instructions for receiving the new key from a key generator in response to the sent request, wherein the first and second set of keys are used because of a transit delay in receiving the new key from the key generator.
8. The non-transitory machine readable medium ofclaim 1, wherein the program further comprises a set of instructions for receiving the new key from a key generator in response to the sent request, wherein the command is received from a controller that monitors usage of keys on the host computing device.
9. The non-transitory machine readable medium ofclaim 1, wherein encryption operation are performed on data messages exchanged between the particular VM and other VMs in order to protect said data messages, said particular VM and other VMs forming a logical private network (LPN).
10. The non-transitory machine readable medium ofclaim 9, wherein at least one of the other VMs executes on a different host computing device than the particular VM
11. The non-transitory machine readable medium ofclaim 9, wherein at least one of the other VMs executes on a same host computing device as the particular VM.
12. A method for updating a keyring with a plurality of keys, the keyring stored on a host computing device that executes a plurality of virtual machines (VMs) and used for encryption operations for data messages associated with at least one particular VM, the method comprises:
receiving a command to (1) fetch a new key for the keyring and (2) remove a particular key from the plurality of keys in the keyring;
sending a request for the new key;
continuing to process data messages received from the particular VM by using a first set of keys in the keyring including the particular key, while processing data messages transmitted by the particular VM by using a second set of keys in the keyring excluding the particular key; and
upon receiving a new key, removing the particular key from the key ring.
13. The method ofclaim 12 further comprising processing received and transmitted data messages for the particular VM by using the keyring that includes the new key upon receiving the new key.
14. The method ofclaim 2, wherein the first set of keys includes the particular key and the second set of keys excludes the particular key in order to rotate out the particular key and rotate in the new key when the new key is received, wherein upon receiving the new key both the first and second sets of keys are the same.
15. The method ofclaim 12, wherein the command is received when the particular key has been used for a certain duration of time.
16. The method ofclaim 12, wherein the command is received when the particular key has been used to encrypt at least one of a certain number of data messages and a certain amount of data.
17. The method ofclaim 12, wherein the received command is sent by a controller that generates the command based on statistics that the controller collects from the host computing device regarding data that the particular key was used to encrypt.
18. The method ofclaim 12 further comprising receiving the new key from a key generator in response to the sent request, wherein the first and second set of keys are used because of a transit delay in receiving the new key from the key generator.
19. The method ofclaim 12 further comprising receiving the new key from a key generator in response to the sent request, wherein the command is received from a controller that monitors usage of keys on the host computing device.
20. The method ofclaim 12, wherein encryption operation are performed on data messages exchanged between the particular VM and other VMs in order to protect said data messages, said particular VM and other VMs forming a logical private network (LPN).
US14/815,9502014-06-302015-07-31Encryption System in a Virtualized EnvironmentAbandonedUS20150381362A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/815,950US20150381362A1 (en)2014-06-302015-07-31Encryption System in a Virtualized Environment

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201462019402P2014-06-302014-06-30
US14/320,584US9613218B2 (en)2014-06-302014-06-30Encryption system in a virtualized environment
US14/815,950US20150381362A1 (en)2014-06-302015-07-31Encryption System in a Virtualized Environment

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/320,584ContinuationUS9613218B2 (en)2014-06-302014-06-30Encryption system in a virtualized environment

Publications (1)

Publication NumberPublication Date
US20150381362A1true US20150381362A1 (en)2015-12-31

Family

ID=54930858

Family Applications (9)

Application NumberTitlePriority DateFiling Date
US14/320,578ActiveUS9792447B2 (en)2014-06-302014-06-30Method and apparatus for differently encrypting different flows
US14/320,579ActiveUS9489519B2 (en)2014-06-302014-06-30Method and apparatus for encrypting data messages after detecting infected VM
US14/320,573ActiveUS10445509B2 (en)2014-06-302014-06-30Encryption architecture
US14/320,584ActiveUS9613218B2 (en)2014-06-302014-06-30Encryption system in a virtualized environment
US14/320,581PendingUS20150379280A1 (en)2014-06-302014-06-30Method and Apparatus for Dynamically Creating Encryption Rules
US14/320,582ActiveUS11087006B2 (en)2014-06-302014-06-30Method and apparatus for encrypting messages based on encryption group association
US14/320,576ActiveUS10747888B2 (en)2014-06-302014-06-30Method and apparatus for differently encrypting data messages for different logical networks
US14/815,950AbandonedUS20150381362A1 (en)2014-06-302015-07-31Encryption System in a Virtualized Environment
US17/669,344ActiveUS12093406B2 (en)2014-06-302022-02-10Method and apparatus for dynamically creating encryption rules

Family Applications Before (7)

Application NumberTitlePriority DateFiling Date
US14/320,578ActiveUS9792447B2 (en)2014-06-302014-06-30Method and apparatus for differently encrypting different flows
US14/320,579ActiveUS9489519B2 (en)2014-06-302014-06-30Method and apparatus for encrypting data messages after detecting infected VM
US14/320,573ActiveUS10445509B2 (en)2014-06-302014-06-30Encryption architecture
US14/320,584ActiveUS9613218B2 (en)2014-06-302014-06-30Encryption system in a virtualized environment
US14/320,581PendingUS20150379280A1 (en)2014-06-302014-06-30Method and Apparatus for Dynamically Creating Encryption Rules
US14/320,582ActiveUS11087006B2 (en)2014-06-302014-06-30Method and apparatus for encrypting messages based on encryption group association
US14/320,576ActiveUS10747888B2 (en)2014-06-302014-06-30Method and apparatus for differently encrypting data messages for different logical networks

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US17/669,344ActiveUS12093406B2 (en)2014-06-302022-02-10Method and apparatus for dynamically creating encryption rules

Country Status (4)

CountryLink
US (9)US9792447B2 (en)
EP (2)EP3531332B1 (en)
CN (1)CN106575338B (en)
WO (1)WO2016003491A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9613218B2 (en)2014-06-302017-04-04Nicira, Inc.Encryption system in a virtualized environment
US9930066B2 (en)2013-02-122018-03-27Nicira, Inc.Infrastructure level LAN security
CN109166119A (en)*2018-09-052019-01-08深圳灵图慧视科技有限公司Fabric defect detection method, device, equipment and machine readable media
US10241930B2 (en)*2014-12-082019-03-26eperi GmbHStoring data in a server computer with deployable encryption/decryption infrastructure
US10798073B2 (en)2016-08-262020-10-06Nicira, Inc.Secure key management protocol for distributed network encryption
CN112637107A (en)*2019-09-242021-04-09中国电信股份有限公司Information processing method and system based on attributes
CN113454598A (en)*2019-02-222021-09-28Vm维尔股份有限公司Providing services with guest VM mobility
US11190336B2 (en)*2019-05-102021-11-30Sap SePrivacy-preserving benchmarking with interval statistics reducing leakage
WO2022072723A1 (en)*2020-09-302022-04-07Bytedance Inc.Picture partitioning in video coding
US20230080139A1 (en)*2020-05-152023-03-16Huawei Technologies Co., Ltd.Communication method and communications apparatus
US20240089097A1 (en)*2022-09-092024-03-14Renesas Electronics CorporationKey update management system and key update management method
CN119675967A (en)*2024-12-192025-03-21苏州奥米伽网络科技有限公司 A file transmission protection method, system and device based on multiple encryption algorithms
US12432077B2 (en)2020-03-112025-09-30Bytedance Inc.Indication of digital medial integrity

Families Citing this family (149)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140281518A1 (en)2013-03-122014-09-18Commvault Systems, Inc.Multi-tier file restoration
US9225638B2 (en)2013-05-092015-12-29Vmware, Inc.Method and system for service switching using service tags
US10033693B2 (en)2013-10-012018-07-24Nicira, Inc.Distributed identity-based firewalls
US9298647B2 (en)*2014-08-252016-03-29HGST Netherlands B.V.Method and apparatus to generate zero content over garbage data when encryption parameters are changed
US9405928B2 (en)*2014-09-172016-08-02Commvault Systems, Inc.Deriving encryption rules based on file content
US10516568B2 (en)2014-09-302019-12-24Nicira, Inc.Controller driven reconfiguration of a multi-layered application or service model
US9755898B2 (en)2014-09-302017-09-05Nicira, Inc.Elastically managing a service node group
US9774537B2 (en)2014-09-302017-09-26Nicira, Inc.Dynamically adjusting load balancing
US10375043B2 (en)*2014-10-282019-08-06International Business Machines CorporationEnd-to-end encryption in a software defined network
US10503909B2 (en)2014-10-312019-12-10Hewlett Packard Enterprise Development LpSystem and method for vulnerability remediation verification
US10277565B2 (en)*2014-12-312019-04-30Hewlett Packard Enterprise Development LpEnterprise service bus logging
US10630686B2 (en)2015-03-122020-04-21Fornetix LlcSystems and methods for organizing devices in a policy hierarchy
US10965459B2 (en)2015-03-132021-03-30Fornetix LlcServer-client key escrow for applied key management system and process
US9531735B1 (en)*2015-03-232016-12-27Bitdefender IPR Management Ltd.Systems and methods for delivering introspection notifications from a virtual machine
US9596261B1 (en)2015-03-232017-03-14Bitdefender IPR Management Ltd.Systems and methods for delivering context-specific introspection notifications
US9536084B1 (en)*2015-03-232017-01-03Bitdefender IPR Management Ltd.Systems and methods for delivering event-filtered introspection notifications
US10594743B2 (en)2015-04-032020-03-17Nicira, Inc.Method, apparatus, and system for implementing a content switch
US10142353B2 (en)2015-06-052018-11-27Cisco Technology, Inc.System for monitoring and managing datacenters
US10536357B2 (en)2015-06-052020-01-14Cisco Technology, Inc.Late data detection in data center
US20170004182A1 (en)2015-06-302017-01-05Vmware, Inc.Allocating, configuring and maintaining cloud computing resources using social media
US9852295B2 (en)2015-07-142017-12-26Bitdefender IPR Management Ltd.Computer security systems and methods using asynchronous introspection exceptions
US10841268B2 (en)2015-08-042020-11-17Vmware, Inc.Methods and apparatus to generate virtual war rooms via social media in enterprise network environments
US10324746B2 (en)2015-11-032019-06-18Nicira, Inc.Extended context delivery for context-based authorization
US20170163607A1 (en)*2015-12-032017-06-08Microsoft Technology Licensing, LlcEstablishing a Communication Event Using Secure Signalling
US10121026B1 (en)*2015-12-312018-11-06Amazon Technologies, Inc.Secure enclosure systems in a provider network
WO2017122326A1 (en)2016-01-142017-07-20三菱電機株式会社Confidential search system, confidential search method and confidential search program
CN108475480B (en)*2016-01-152021-03-23三菱电机株式会社Encryption device, encryption method, and storage device
US10628597B2 (en)*2016-04-142020-04-21Sophos LimitedJust-in-time encryption
US10263966B2 (en)2016-04-142019-04-16Sophos LimitedPerimeter enforcement of encryption rules
US10791097B2 (en)2016-04-142020-09-29Sophos LimitedPortable encryption format
US10681078B2 (en)*2016-06-102020-06-09Sophos LimitedKey throttling to mitigate unauthorized file access
US10650154B2 (en)2016-02-122020-05-12Sophos LimitedProcess-level control of encrypted content
US9984248B2 (en)2016-02-122018-05-29Sophos LimitedBehavioral-based control of access to encrypted content by a process
US10686827B2 (en)2016-04-142020-06-16Sophos LimitedIntermediate encryption for exposed content
US11063980B2 (en)*2016-02-262021-07-13Fornetix LlcSystem and method for associating encryption key management policy with device activity
CN108028748A (en)*2016-02-272018-05-11华为技术有限公司For handling the method, equipment and system of VXLAN messages
US12339979B2 (en)*2016-03-072025-06-24Crowdstrike, Inc.Hypervisor-based interception of memory and register accesses
US10237142B2 (en)*2016-04-042019-03-19Nicira, Inc.Troubleshooting virtual network reachability
US10728106B1 (en)*2016-04-292020-07-28Architecture Technology CorporationMulti-domain cloud computing
US10250596B2 (en)*2016-06-292019-04-02International Business Machines CorporationMonitoring encrypted communication sessions
GB2551983B (en)2016-06-302020-03-04Sophos LtdPerimeter encryption
US10462173B1 (en)2016-06-302019-10-29Fireeye, Inc.Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US10140448B2 (en)2016-07-012018-11-27Bitdefender IPR Management Ltd.Systems and methods of asynchronous analysis of event notifications for computer security applications
WO2018028359A1 (en)*2016-08-082018-02-15腾讯科技(深圳)有限公司Service processing method and device, and storage medium and electronic device
US10938837B2 (en)2016-08-302021-03-02Nicira, Inc.Isolated network stack to manage security for virtual machines
US11824863B2 (en)*2016-11-032023-11-21Nicira, Inc.Performing services on a host
WO2018106612A1 (en)2016-12-062018-06-14Nicira, Inc.Performing context-rich attribute-based services on a host
US10951591B1 (en)*2016-12-202021-03-16Wells Fargo Bank, N.A.SSL encryption with reduced bandwidth
CA3130844C (en)*2016-12-222023-11-28Nicira, Inc.Collecting and processing context attributes on a host
US10503536B2 (en)2016-12-222019-12-10Nicira, Inc.Collecting and storing threat level indicators for service rule processing
US10803173B2 (en)2016-12-222020-10-13Nicira, Inc.Performing context-rich attribute-based process control services on a host
US10812451B2 (en)2016-12-222020-10-20Nicira, Inc.Performing appID based firewall services on a host
US10805332B2 (en)2017-07-252020-10-13Nicira, Inc.Context engine model
US11032246B2 (en)2016-12-222021-06-08Nicira, Inc.Context based firewall services for data message flows for multiple concurrent users on one machine
US11139952B2 (en)*2017-01-182021-10-05Mitsubishi Electric CorporationHomomorphic computation device, encryption system, and computer readable medium
US10686765B2 (en)2017-04-192020-06-16International Business Machines CorporationData access levels
JP6584723B2 (en)*2017-04-252019-10-02三菱電機株式会社 SEARCH DEVICE, SEARCH SYSTEM, SEARCH METHOD, AND SEARCH PROGRAM
US11321493B2 (en)*2017-05-312022-05-03Crypto4A Technologies Inc.Hardware security module, and trusted hardware network interconnection device and resources
US11310198B2 (en)2017-05-312022-04-19Crypto4A Technologies Inc.Integrated multi-level or cross-domain network security management appliance, platform and system, and remote management method and system therefor
WO2018231765A1 (en)*2017-06-122018-12-20Daniel Maurice LernerExecutable coded cipher keys
US10154015B1 (en)2017-06-122018-12-11Ironclad Encryption CorporationExecutable coded cipher keys
US10567359B2 (en)*2017-07-182020-02-18International Business Machines CorporationCluster of secure execution platforms
US10476850B2 (en)*2017-07-192019-11-12Nicira, Inc.Supporting unknown unicast traffic using policy-based encryption virtualized networks
US10951656B2 (en)2017-08-162021-03-16Nicira, Inc.Methods, apparatus and systems to use artificial intelligence to define encryption and security policies in a software defined data center
US10903985B2 (en)2017-08-252021-01-26Keysight Technologies Singapore (Sales) Pte. Ltd.Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques
US10652281B1 (en)2017-08-312020-05-12Vmware, Inc.Network policy implementation in a tag-based policy architecture
US10594735B2 (en)*2017-09-282020-03-17At&T Intellectual Property I, L.P.Tag-based security policy creation in a distributed computing environment
US10116671B1 (en)*2017-09-282018-10-30International Business Machines CorporationDistributed denial-of-service attack detection based on shared network flow information
CN107682225B (en)*2017-10-122020-05-22西安交通大学 A method for automatically generating fine-grained network program function traffic fingerprints
US10805181B2 (en)2017-10-292020-10-13Nicira, Inc.Service operation chaining
US10778651B2 (en)*2017-11-152020-09-15Nicira, Inc.Performing context-rich attribute-based encryption on a host
CN114884738A (en)*2017-11-172022-08-09华为技术有限公司Method and device for identifying encrypted data stream
US11036532B2 (en)*2017-11-292021-06-15Microsoft Technology Licensing, LlcFast join and leave virtual network
US11245674B2 (en)*2017-12-142022-02-08Nicira, Inc.Secure communication protocol processing
US10802893B2 (en)2018-01-262020-10-13Nicira, Inc.Performing process control services on endpoint machines
US10862773B2 (en)2018-01-262020-12-08Nicira, Inc.Performing services on data messages associated with endpoint machines
US10805192B2 (en)2018-03-272020-10-13Nicira, Inc.Detecting failure of layer 2 service using broadcast messages
CN109726564B (en)*2018-05-142020-09-18网联清算有限公司Information processing method and information processing system applied to encryption machine
US11425559B1 (en)*2018-05-152022-08-23Know 2Solutions, LLCData transmission network device
CN108848071A (en)*2018-05-302018-11-20深圳市元征科技股份有限公司A kind of data transmission method, system and equipment and storage medium
US10942788B2 (en)2018-06-152021-03-09Vmware, Inc.Policy constraint framework for an sddc
US10812337B2 (en)2018-06-152020-10-20Vmware, Inc.Hierarchical API for a SDDC
CN109067709B (en)*2018-07-062021-08-06北京知道创宇信息技术股份有限公司Vulnerability management method and device, electronic equipment and storage medium
WO2020015877A1 (en)*2018-07-192020-01-23British Telecommunications Public Limited CompanyDynamic data encryption
CN108900539A (en)*2018-08-092018-11-27深圳伊泉净品科技有限公司Ensure the method and computer readable storage medium of batch jobs host cryptographic safety
US10893030B2 (en)2018-08-102021-01-12Keysight Technologies, Inc.Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element
CN109150882B (en)*2018-08-232021-02-12深圳市安盾网络技术有限公司Data leakage prevention method based on encryption by utilizing route
US10628144B2 (en)*2018-08-242020-04-21Vmware, Inc.Hierarchical API for defining a multi-segmented application in an SDDC
US11086700B2 (en)2018-08-242021-08-10Vmware, Inc.Template driven approach to deploy a multi-segmented application in an SDDC
US11595250B2 (en)2018-09-022023-02-28Vmware, Inc.Service insertion at logical network gateway
CN109150520B (en)*2018-09-212021-06-01中国软件与技术服务股份有限公司Data exchange system between logic isolation application servers
US10708247B2 (en)*2018-09-272020-07-07Intel CorporationTechnologies for providing secure utilization of tenant keys
CN109525477A (en)*2018-09-302019-03-26华为技术有限公司Communication means, device and system in data center between virtual machine
US11176281B2 (en)2018-10-082021-11-16Micron Technology, Inc.Security managers and methods for implementing security protocols in a reconfigurable fabric
US11044238B2 (en)*2018-10-192021-06-22International Business Machines CorporationSecure communications among tenant virtual machines in a cloud networking environment
CN109714151A (en)*2019-01-142019-05-03盛科网络(苏州)有限公司Chip data processing method and system based on AES-GCM
US11016825B2 (en)*2019-01-142021-05-25Vmware, Inc.Flexible analytics framework selection
WO2020193336A1 (en)2019-03-272020-10-01British Telecommunications Public Limited CompanyReactive secure communications
US11184236B2 (en)*2019-04-302021-11-23Intel CorporationMethods and apparatus to control processing of telemetry data at an edge platform
US10944550B2 (en)*2019-07-122021-03-09Providence Interests, LlcOver-the-top end-to-end information security in a data center operating environment
US11743135B2 (en)2019-07-232023-08-29Vmware, Inc.Presenting data regarding grouped flows
US11436075B2 (en)2019-07-232022-09-06Vmware, Inc.Offloading anomaly detection from server to host
US11340931B2 (en)2019-07-232022-05-24Vmware, Inc.Recommendation generation based on selection of selectable elements of visual representation
US11349876B2 (en)*2019-07-232022-05-31Vmware, Inc.Security policy recommendation generation
US11398987B2 (en)2019-07-232022-07-26Vmware, Inc.Host-based flow aggregation
US11288399B2 (en)*2019-08-052022-03-29Visa International Service AssociationCryptographically secure dynamic third party resources
US20200136921A1 (en)2019-09-282020-04-30Intel CorporationMethods, system, articles of manufacture, and apparatus to manage telemetry data in an edge environment
US11706162B2 (en)*2019-10-212023-07-18Sap SeDynamic, distributed, and scalable single endpoint solution for a service in cloud platform
US11140218B2 (en)2019-10-302021-10-05Vmware, Inc.Distributed service chain across multiple clouds
US11502994B2 (en)2019-11-292022-11-15Sri Ram Kishore VemulpaliIntelligent service layer for separating application from physical networks and extending service layer intelligence over IP across the internet, cloud, and edge networks
US11641275B2 (en)*2019-12-112023-05-02LendingClub Bank, National AssociationEncryption key rotation framework
US11539718B2 (en)2020-01-102022-12-27Vmware, Inc.Efficiently performing intrusion detection
US11223494B2 (en)2020-01-132022-01-11Vmware, Inc.Service insertion for multicast traffic at boundary
US11321213B2 (en)2020-01-162022-05-03Vmware, Inc.Correlation key used to correlate flow and con text data
US11659061B2 (en)2020-01-202023-05-23Vmware, Inc.Method of adjusting service function chains to improve network performance
US11190417B2 (en)*2020-02-042021-11-30Keysight Technologies, Inc.Methods, systems, and computer readable media for processing network flow metadata at a network packet broker
US11658944B2 (en)*2020-03-132023-05-23Arm Ip LimitedMethods and apparatus for encrypted communication
CN115380514B (en)2020-04-012024-03-01威睿有限责任公司Automatic deployment of network elements for heterogeneous computing elements
US11792112B2 (en)2020-04-062023-10-17Vmware, Inc.Using service planes to perform services at the edge of a network
US11886899B2 (en)*2020-04-302024-01-30Red Hat, Inc.Privacy preserving introspection for trusted execution environments
US11483141B2 (en)*2020-06-032022-10-25Capital One Services, LlcKey broker for a network monitoring device, and applications thereof
US11108728B1 (en)2020-07-242021-08-31Vmware, Inc.Fast distribution of port identifiers for rule processing
US11803408B2 (en)2020-07-292023-10-31Vmware, Inc.Distributed network plugin agents for container networking
US11863352B2 (en)2020-07-302024-01-02Vmware, Inc.Hierarchical networking for nested container clusters
US11611625B2 (en)2020-12-152023-03-21Vmware, Inc.Providing stateful services in a scalable manner for machines executing on host computers
US11734043B2 (en)2020-12-152023-08-22Vmware, Inc.Providing stateful services in a scalable manner for machines executing on host computers
US11785032B2 (en)2021-01-222023-10-10Vmware, Inc.Security threat detection based on network flow analysis
US11991187B2 (en)2021-01-222024-05-21VMware LLCSecurity threat detection based on network flow analysis
US11606254B2 (en)2021-06-112023-03-14Vmware, Inc.Automatic configuring of VLAN and overlay logical switches for container secondary interfaces
CN113468563B (en)*2021-06-242022-11-18曙光信息产业股份有限公司Virtual machine data encryption method and device, computer equipment and storage medium
US11997120B2 (en)2021-07-092024-05-28VMware LLCDetecting threats to datacenter based on analysis of anomalous events
US11831667B2 (en)2021-07-092023-11-28Vmware, Inc.Identification of time-ordered sets of connections to identify threats to a datacenter
US20230013489A1 (en)*2021-07-162023-01-19Vmware, Inc.Managing l4 ports
EP4384906A1 (en)*2021-08-112024-06-19Battelle Memorial InstituteVirtual controller architecture and systems and methods implementing same
CN113965372A (en)*2021-10-192022-01-21南京工业大学Safe communication mechanism based on attribute encryption
US11792151B2 (en)2021-10-212023-10-17Vmware, Inc.Detection of threats based on responses to name resolution requests
KR20230063508A (en)*2021-11-022023-05-09삼성전자주식회사Storage device supporting multi tenancy and operating method thereof
US20230156018A1 (en)*2021-11-172023-05-18Vmware, Inc.Data criticality-based network policy creation and consumption
US12015591B2 (en)2021-12-062024-06-18VMware LLCReuse of groups in security policy
US11863514B2 (en)*2022-01-142024-01-02Vmware, Inc.Performance improvement of IPsec traffic using SA-groups and mixed-mode SAs
US11902245B2 (en)2022-01-142024-02-13VMware LLCPer-namespace IP address management method for container networks
EP4494314A1 (en)2022-03-182025-01-22VMware LLCMapping vlan of container network to logical network in hypervisor to support flexible ipam and routing container traffic
US20240080186A1 (en)*2022-09-072024-03-07Google LlcRandom Trigger for Automatic Key Rotation
US12177124B2 (en)2022-10-042024-12-24VMware LLCUsing CRDs to create externally routable addresses and route records for pods
US11848910B1 (en)2022-11-112023-12-19Vmware, Inc.Assigning stateful pods fixed IP addresses depending on unique pod identity
US12199833B2 (en)2022-11-292025-01-14VMware LLCNetwork controller as a service (NCaaS) to define network policies for third-party container clusters
US12267212B2 (en)2022-11-292025-04-01VMware LLCImplementing defined service policies in a third-party container cluster
US11831511B1 (en)2023-01-172023-11-28Vmware, Inc.Enforcing network policies in heterogeneous systems
WO2024254734A1 (en)2023-06-122024-12-19Vmware Information Technology (China) Co., Ltd.Layer 7 network security for container workloads

Citations (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020114453A1 (en)*2001-02-212002-08-22Bartholet Thomas G.System and method for secure cryptographic data transport and storage
US20030065941A1 (en)*2001-09-052003-04-03Ballard Clinton L.Message handling with format translation and key management
US20030149781A1 (en)*2001-12-042003-08-07Peter YaredDistributed network identity
US20040105549A1 (en)*2002-11-152004-06-03Nec CorporationKey mangement system and multicast delivery system using the same
US20080170689A1 (en)*2006-08-072008-07-17David BoubionSystems and methods for conducting secure wired and wireless networked telephony
US20100303241A1 (en)*2009-06-022010-12-02Oliver BreyelAutomatic change of symmetrical encryption key
US20110295708A1 (en)*2010-05-252011-12-01beonSoft Inc.Systems and methods for providing software rental services to devices connected to a network
US20120045059A1 (en)*2009-05-142012-02-23Makoto FujinamiCommunication apparatus and secret information sharing method
US8295492B2 (en)*2005-06-272012-10-23Wells Fargo Bank, N.A.Automated key management system
US8321925B1 (en)*2009-02-172012-11-27Amazon Technologies, Inc.Distributed encryption key management
US8340300B2 (en)*2002-09-172012-12-25Foundry Networks, LlcNon-disruptive authentication administration
US8584216B1 (en)*2012-03-152013-11-12Symantec CorporationSystems and methods for efficiently deploying updates within a cryptographic-key management system
US20150078550A1 (en)*2013-09-132015-03-19Microsoft CorporationSecurity processing unit with configurable access control
US20150242594A1 (en)*2014-02-212015-08-27Venafi, Inc.Trust Map Management and User Interface
US9178698B1 (en)*2011-12-212015-11-03Google Inc.Dynamic key management
US9317316B2 (en)*2011-12-282016-04-19Huawei Technologies Co., Ltd.Host virtual machine assisting booting of a fully-encrypted user virtual machine on a cloud environment

Family Cites Families (166)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5793763A (en)1995-11-031998-08-11Cisco Technology, Inc.Security system for network address translation systems
US6101543A (en)1996-10-252000-08-08Digital Equipment CorporationPseudo network adapter for frame capture, encapsulation and encryption
US8255680B1 (en)1997-06-262012-08-28Oracle America, Inc.Layer-independent security for communication channels
US6484261B1 (en)*1998-02-172002-11-19Cisco Technology, Inc.Graphical network security policy management
JP3225924B2 (en)*1998-07-092001-11-05日本電気株式会社 Communication quality control device
US6751729B1 (en)1998-07-242004-06-15Spatial Adventures, Inc.Automated operation and security system for virtual private networks
WO2001063387A2 (en)*2000-02-222001-08-30Visualgold.Com, Inc.Secure distributing services network system and method thereof
US7389358B1 (en)2000-09-132008-06-17Fortinet, Inc.Distributed virtual system to support managed, network-based services
US20030079000A1 (en)2001-10-192003-04-24Chamberlain Robert L.Methods and apparatus for configuring multiple logical networks of devices on a single physical network
US8095668B2 (en)2001-11-092012-01-10Rockstar Bidco LpMiddlebox control
US7254835B2 (en)*2002-01-042007-08-07Sun Microsystems, Inc.Method and apparatus for conveying a security context in addressing information
US7185365B2 (en)*2002-03-272007-02-27Intel CorporationSecurity enabled network access control
US7237008B1 (en)2002-05-102007-06-26Mcafee, Inc.Detecting malware carried by an e-mail message
US20030212900A1 (en)*2002-05-132003-11-13Hsin-Yuo LiuPacket classifying network services
US7231664B2 (en)*2002-09-042007-06-12Secure Computing CorporationSystem and method for transmitting and receiving secure data in a virtual private group
US7587587B2 (en)2002-12-052009-09-08Broadcom CorporationData path security processing
CN1783139A (en)2003-01-082006-06-07Kddi株式会社Identification modes of content file producer and its method
US20050022017A1 (en)2003-06-242005-01-27Maufer Thomas A.Data structures and state tracking for network protocol processing
JP4107213B2 (en)2003-10-062008-06-25松下電工株式会社 Packet judgment device
US20050198370A1 (en)2004-02-012005-09-08Phonex Broadband CorporationMethod for creating, deleting, and maintaining logical networks
US7987497B1 (en)*2004-03-052011-07-26Microsoft CorporationSystems and methods for data encryption using plugins within virtual systems and subsystems
US9027135B1 (en)2004-04-012015-05-05Fireeye, Inc.Prospective client identification using malware attack detection
US8171553B2 (en)2004-04-012012-05-01Fireeye, Inc.Heuristic based capture with replay to virtual machine
US8036221B2 (en)*2004-06-142011-10-11Cisco Technology, Inc.Method and system for dynamic secured group communication
US9264384B1 (en)2004-07-222016-02-16Oracle International CorporationResource virtualization mechanism including virtual host bus adapters
US7778194B1 (en)2004-08-132010-08-17Packeteer, Inc.Examination of connection handshake to enhance classification of encrypted network traffic
JP4324100B2 (en)2004-12-282009-09-02アンリツ株式会社 Data writing control device and data writing control method
US7895652B2 (en)*2005-01-042011-02-22Trustwave Holdings, Inc.System to enable detecting attacks within encrypted traffic
US20120084566A1 (en)2010-10-042012-04-05Edward ChinMethods and systems for providing and controlling cryptographic secure communications across unsecured networks
US7813510B2 (en)2005-02-282010-10-12Motorola, IncKey management for group communications
US7607168B1 (en)*2005-04-222009-10-20Sun Microsystems, Inc.Network interface decryption and classification technique
US20070198837A1 (en)2005-04-292007-08-23Nokia CorporationEstablishment of a secure communication
US7721299B2 (en)2005-08-052010-05-18Red Hat, Inc.Zero-copy network I/O for virtual hosts
US20070079307A1 (en)2005-09-302007-04-05Puneet DhawanVirtual machine based network carriers
US7656894B2 (en)2005-10-282010-02-02Microsoft CorporationOffloading processing tasks to a peripheral device
US8577044B2 (en)2005-10-282013-11-05Hewlett-Packard Development Company, L.P.Method and apparatus for automatic and secure distribution of an asymmetric key security credential in a utility computing environment
US7969892B2 (en)2005-10-282011-06-28Panasonic CorporationTunneling loop detection control apparatus
CN100571125C (en)2005-12-302009-12-16上海贝尔阿尔卡特股份有限公司 A method and device for secure communication between user equipment and internal network
WO2007099276A1 (en)2006-03-022007-09-07British Telecommunications Public Limited CompanyMessage processing methods and systems
US8307359B1 (en)2006-06-232012-11-06Emc CorporationEmbedded virtual storage area network using a virtual block network fabric
US20080002724A1 (en)*2006-06-302008-01-03Karanvir GrewalMethod and apparatus for multiple generic exclusion offsets for security protocols
US8204982B2 (en)2006-09-142012-06-19Quova, Inc.System and method of middlebox detection and characterization
US8379638B2 (en)2006-09-252013-02-19Certes Networks, Inc.Security encapsulation of ethernet frames
US8104082B2 (en)2006-09-292012-01-24Certes Networks, Inc.Virtual security interface
US20080082837A1 (en)2006-09-292008-04-03Protegrity CorporationApparatus and method for continuous data protection in a distributed computing network
US8424064B2 (en)2006-11-022013-04-16Koninklijke Philips Electronics N.V.Distributed device revocation
US8019938B2 (en)*2006-12-062011-09-13Fusion-I0, Inc.Apparatus, system, and method for solid-state storage as cache for high-capacity, non-volatile storage
US8161543B2 (en)2006-12-222012-04-17Aruba Networks, Inc.VLAN tunneling
US20080189769A1 (en)2007-02-012008-08-07Martin CasadoSecure network switching infrastructure
US8713669B2 (en)2007-03-022014-04-29Cisco Technology, Inc.Multi-domain dynamic group virtual private networks
US8151262B2 (en)2007-03-302012-04-03Lenovo (Singapore) Pte. Ltd.System and method for reporting the trusted state of a virtual machine
JP2008269173A (en)2007-04-182008-11-06Hitachi Ltd Computer system, storage system, and data management method
WO2008146639A1 (en)2007-05-232008-12-04Nec CorporationInformation sharing system, computer, project management server and information sharing method used for them
US8321936B1 (en)*2007-05-302012-11-27M86 Security, Inc.System and method for malicious software detection in multiple protocols
US8458366B2 (en)2007-09-272013-06-04Oracle America, Inc.Method and system for onloading network services
US7855982B2 (en)2007-11-192010-12-21Rajesh RamankuttyProviding services to packet flows in a network
US8498417B1 (en)2007-12-272013-07-30Emc CorporationAutomation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located
US20100031353A1 (en)2008-02-042010-02-04Microsoft CorporationMalware Detection Using Code Analysis and Behavior Monitoring
GB2458154B (en)2008-03-072012-06-27Hewlett Packard Development CoRouting across a virtual network
US20110035494A1 (en)2008-04-152011-02-10Blade Network TechnologiesNetwork virtualization for a virtualized server data center environment
US9395929B2 (en)*2008-04-252016-07-19Netapp, Inc.Network storage server with integrated encryption, compression and deduplication capability
US20090319772A1 (en)*2008-04-252009-12-24Netapp, Inc.In-line content based security for data at rest in a network storage system
US8364983B2 (en)*2008-05-082013-01-29Microsoft CorporationCorralling virtual machines with encryption keys
JP2010039626A (en)2008-08-012010-02-18Fujitsu LtdNetwork setting program, network setting method, and network setting device
US8555053B1 (en)*2008-08-292013-10-08Crossroads Systems, Inc.System and method for adjusting to drive specific criteria
JP2010062738A (en)2008-09-022010-03-18Fujitsu LtdProgram, method and device for setting network
US8250356B2 (en)*2008-11-212012-08-21Motorola Solutions, Inc.Method to construct a high-assurance IPSec gateway using an unmodified commercial implementation
CA2738466C (en)2008-11-282018-03-13International Business Machines CorporationApparatus for shielding sensitive file, server computer of the same, method and computer program product for the same
US8271775B2 (en)2008-12-172012-09-18Cisco Technology, Inc.Layer two encryption for data center interconnectivity
US7948986B1 (en)2009-02-022011-05-24Juniper Networks, Inc.Applying services within MPLS networks
ES2938329T3 (en)2009-06-302023-04-103G Licensing S A Method of selecting a network resource
US8693485B2 (en)*2009-10-142014-04-08Dell Products, LpVirtualization aware network switch
US8321657B2 (en)2009-10-162012-11-27Dell Products L.P.System and method for BIOS and controller communication
US9202015B2 (en)2009-12-312015-12-01Intel CorporationEntering a secured computing environment using multiple authenticated code modules
GB201004449D0 (en)*2010-02-222010-05-05Corbett SeanData accelerator
US8782402B2 (en)2010-02-252014-07-15Bank Of America CorporationSystem and method for secure communications
CN102238002A (en)2010-04-302011-11-09国际商业机器公司Dynamic encryption and decryption methods and equipment for network communication
EP2577539B1 (en)*2010-06-022018-12-19VMware, Inc.Securing customer virtual machines in a multi-tenant cloud
WO2011159842A2 (en)2010-06-152011-12-22Nimbula, Inc.Virtual computing infrastructure
US9104458B1 (en)*2010-09-302015-08-11Amazon Technologies, Inc.Managing virtual computing nodes using isolation and migration techniques
US11030305B2 (en)2010-10-042021-06-08Unisys CorporationVirtual relay device for providing a secure connection to a remote device
WO2012057942A1 (en)2010-10-272012-05-03High Cloud Security, Inc.System and method for secure storage of virtual machines
CN102469021B (en)2010-11-182014-08-13杭州华三通信技术有限公司Method of transmitting business flow and member equipment in intelligent resilience frame system
US8948382B2 (en)2010-12-162015-02-03Microsoft CorporationSecure protocol for peer-to-peer network
US8751828B1 (en)2010-12-232014-06-10Emc CorporationSharing encryption-related metadata between multiple layers in a storage I/O stack
US8379857B1 (en)*2011-03-302013-02-19Google Inc.Secure key distribution for private communication in an unsecured communication channel
US8756434B2 (en)*2011-04-082014-06-17Apple Inc.System and method for executing an encrypted binary from a memory pool
US8601583B1 (en)2011-04-142013-12-03Trend Micro IncorporatedCertification of virtual machine images in cloud computing environments
WO2012151392A1 (en)*2011-05-042012-11-08Citrix Systems, Inc.Systems and methods for sr-iov pass-thru via an intermediary device
US9047441B2 (en)*2011-05-242015-06-02Palo Alto Networks, Inc.Malware analysis system
US9154327B1 (en)2011-05-272015-10-06Cisco Technology, Inc.User-configured on-demand virtual layer-2 network for infrastructure-as-a-service (IaaS) on a hybrid cloud network
US10333711B2 (en)2011-06-172019-06-25Microsoft Technology Licensing, LlcControlling access to protected objects
US9386035B2 (en)2011-06-212016-07-05At&T Intellectual Property I, L.P.Methods and apparatus to configure virtual private mobile networks for security
US10237060B2 (en)*2011-06-232019-03-19Microsoft Technology Licensing, LlcMedia agnostic, distributed, and defendable data retention
US8923294B2 (en)2011-06-282014-12-30Polytechnic Institute Of New York UniversityDynamically provisioning middleboxes
US8584242B2 (en)*2011-07-122013-11-12At&T Intellectual Property I, L.P.Remote-assisted malware detection
US9749291B2 (en)*2011-07-152017-08-29International Business Machines CorporationSecuring applications on public facing systems
US8893274B2 (en)2011-08-032014-11-18Trend Micro, Inc.Cross-VM network filtering
US8660124B2 (en)2011-08-052014-02-25International Business Machines CorporationDistributed overlay network data traffic management by a virtual server
US20130034094A1 (en)2011-08-052013-02-07International Business Machines CorporationVirtual Switch Data Control In A Distributed Overlay Network
US8412945B2 (en)2011-08-092013-04-02CloudPassage, Inc.Systems and methods for implementing security in a cloud computing environment
AU2012296329B2 (en)2011-08-172015-08-27Nicira, Inc.Logical L3 routing
CN103051510B (en)2011-09-072016-04-13微软技术许可有限责任公司The method and apparatus that network strategy unloads to the safety and efficiently of network interface unit
US20130073847A1 (en)*2011-09-132013-03-21Cognex CorporationEncryption authentication of data transmitted from machine vision tools
US9319459B2 (en)2011-09-192016-04-19Cisco Technology, Inc.Services controlled session based flow interceptor
US9037511B2 (en)2011-09-292015-05-19Amazon Technologies, Inc.Implementation of secure communications in a support system
US9100453B2 (en)*2011-10-082015-08-04Broadcom CorporationSocial device security in a social network
US9246876B1 (en)2011-10-132016-01-26Juniper Networks, Inc.Anti-replay mechanism for group virtual private networks
US9792430B2 (en)2011-11-032017-10-17Cyphort Inc.Systems and methods for virtualized malware detection
AU2015255293B2 (en)*2011-11-152018-03-15VMware LLCArchitecture of networks with middleboxes
US9172603B2 (en)*2011-11-152015-10-27Nicira, Inc.WAN optimizer for logical networks
US9553725B2 (en)2011-11-212017-01-24Combined Conditional Access Development And Support, LlcSystem and method for authenticating data
CN102546601B (en)2011-12-192015-09-02广州杰赛科技股份有限公司The servicing unit of cloud computing terminal for accessing virtual machine
US8830834B2 (en)2011-12-212014-09-09Cisco Technology, Inc.Overlay-based packet steering
SG11201403482TA (en)2011-12-212014-07-30Ssh Comm Security OyjAutomated access, key, certificate, and credential management
US8681992B2 (en)2012-02-132014-03-25Alephcloud Systems, Inc.Monitoring and controlling access to electronic content
US8875234B2 (en)2012-09-132014-10-28PivotCloud, Inc.Operator provisioning of a trustworthy workspace to a subscriber
US9535764B2 (en)2012-02-152017-01-03Cisco Technology, Inc.Resource allocation mechanism
US8996887B2 (en)2012-02-242015-03-31Google Inc.Log structured volume encryption for virtual machines
US8954964B2 (en)2012-02-272015-02-10Ca, Inc.System and method for isolated virtual image and appliance communication within a cloud environment
US9268590B2 (en)2012-02-292016-02-23Vmware, Inc.Provisioning a cluster of distributed computing platform based on placement strategy
US9430295B1 (en)2012-03-292016-08-30Infoblox Inc.Internet protocol address management (IPAM) integration with a plurality of virtualization tiers in the virtual cloud
WO2013145780A1 (en)*2012-03-302013-10-03Nec CorporationCommunication system, control apparatus, communication apparatus, communication control method, and program
US9171178B1 (en)2012-05-142015-10-27Symantec CorporationSystems and methods for optimizing security controls for virtual data centers
US9300570B2 (en)2012-05-222016-03-29Harris CorporationMulti-tunnel virtual private network
US8811409B2 (en)*2012-06-042014-08-19Telefonaktiebolaget L M Ericsson (Publ)Routing VLAN tagged packets to far end addresses of virtual forwarding instances using separate administrations
US9304801B2 (en)2012-06-122016-04-05TELEFONAKTIEBOLAGET L M ERRICSSON (publ)Elastic enforcement layer for cloud security using SDN
US10248442B2 (en)2012-07-122019-04-02Unisys CorporationAutomated provisioning of virtual machines
US9819658B2 (en)2012-07-122017-11-14Unisys CorporationVirtual gateways for isolating virtual machines
US20140052877A1 (en)2012-08-162014-02-20Wenbo MaoMethod and apparatus for tenant programmable logical network for multi-tenancy cloud datacenters
US9172557B2 (en)2012-08-172015-10-27International Business Machines CorporationLoad balancing overlay network traffic using a teamed set of network interface cards
US8656482B1 (en)2012-08-202014-02-18Bitdefender IPR Management Ltd.Secure communication using a trusted virtual machine
US10203972B2 (en)2012-08-272019-02-12Vmware, Inc.Framework for networking and security services in virtual networks
US9104492B2 (en)2012-09-042015-08-11Wisconsin Alumni Research FoundationCloud-based middlebox management system
US8924720B2 (en)2012-09-272014-12-30Intel CorporationMethod and system to securely migrate and provision virtual machine images and content
US9389898B2 (en)*2012-10-022016-07-12Ca, Inc.System and method for enforcement of security controls on virtual machines throughout life cycle state changes
US8700898B1 (en)2012-10-022014-04-15Ca, Inc.System and method for multi-layered sensitive data protection in a virtual computing environment
US9571507B2 (en)2012-10-212017-02-14Mcafee, Inc.Providing a virtual security appliance architecture to a virtual cloud infrastructure
US9083550B2 (en)2012-10-292015-07-14Oracle International CorporationNetwork virtualization over infiniband
US20140181975A1 (en)2012-11-062014-06-26William SpernowMethod to scan a forensic image of a computer system with multiple malicious code detection engines simultaneously from a master control point
US20140189235A1 (en)2012-12-312014-07-03Unisys CorporationStealth appliance between a storage controller and a disk array
US9930066B2 (en)*2013-02-122018-03-27Nicira, Inc.Infrastructure level LAN security
US9154484B2 (en)2013-02-212015-10-06Cisco Technology, Inc.Identity propagation
CN104022953B (en)*2013-02-282018-02-09新华三技术有限公司Message forwarding method and device based on open flows Openflow
EP2955897B1 (en)2013-03-052018-08-01Huawei Technologies Co., Ltd.Key interaction method and device
US9130872B2 (en)*2013-03-152015-09-08Cisco Technology, Inc.Workload based service chain insertion in a network environment
US9448826B2 (en)2013-03-152016-09-20Symantec CorporationEnforcing policy-based compliance of virtual machine image configurations
JP6069580B2 (en)*2013-04-102017-02-01イルミオ, インコーポレイテッドIllumio,Inc. Distributed network management using a logical multidimensional label-based policy model
KR101394424B1 (en)*2013-04-222014-05-13한국인터넷진흥원Hypervisor-based intrusion prevention platform and virtual network intrusion prevention system
CN104219208B (en)*2013-06-032018-11-13华为技术有限公司 A method and device for data input
US9686192B2 (en)2013-06-282017-06-20Niciria, Inc.Network service slotting
WO2015010730A1 (en)*2013-07-242015-01-29Nokia Solutions And Networks Gmbh & Co. KgNetwork consolidation by means of virtualization
US20150071298A1 (en)2013-09-092015-03-12Microsoft CorporationHybrid Forwarding in a Virtual Switch
US9124430B2 (en)2013-09-232015-09-01Venafi, Inc.Centralized policy management for security keys
WO2015047285A1 (en)*2013-09-272015-04-02Intel CorporationProtection scheme for remotely-stored data
US9264313B1 (en)2013-10-312016-02-16Vmware, Inc.System and method for performing a service discovery for virtual networks
US9516061B2 (en)2013-11-262016-12-06Cisco Technology, Inc.Smart virtual private network
CN104811326A (en)*2014-01-242015-07-29中兴通讯股份有限公司Service chain management method, service chain management system, and devices
US9538311B2 (en)2014-02-042017-01-03Texas Instruments IncorporatedAuto-provisioning for internet-of-things devices
US10084813B2 (en)*2014-06-242018-09-25Fireeye, Inc.Intrusion prevention and remedy system
US9792447B2 (en)2014-06-302017-10-17Nicira, Inc.Method and apparatus for differently encrypting different flows
US10469477B2 (en)2015-03-312019-11-05Amazon Technologies, Inc.Key export techniques
US10122709B2 (en)2015-05-122018-11-06Citrix Systems, Inc.Multifactor contextual authentication and entropy from device or device input or gesture authentication
US10686827B2 (en)2016-04-142020-06-16Sophos LimitedIntermediate encryption for exposed content
US10250385B2 (en)2016-02-182019-04-02Cloud9 Technologies, LLCCustomer call logging data privacy in cloud infrastructure
US10798073B2 (en)2016-08-262020-10-06Nicira, Inc.Secure key management protocol for distributed network encryption

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020114453A1 (en)*2001-02-212002-08-22Bartholet Thomas G.System and method for secure cryptographic data transport and storage
US20030065941A1 (en)*2001-09-052003-04-03Ballard Clinton L.Message handling with format translation and key management
US20030149781A1 (en)*2001-12-042003-08-07Peter YaredDistributed network identity
US8340300B2 (en)*2002-09-172012-12-25Foundry Networks, LlcNon-disruptive authentication administration
US20040105549A1 (en)*2002-11-152004-06-03Nec CorporationKey mangement system and multicast delivery system using the same
US8295492B2 (en)*2005-06-272012-10-23Wells Fargo Bank, N.A.Automated key management system
US20080170689A1 (en)*2006-08-072008-07-17David BoubionSystems and methods for conducting secure wired and wireless networked telephony
US8321925B1 (en)*2009-02-172012-11-27Amazon Technologies, Inc.Distributed encryption key management
US20120045059A1 (en)*2009-05-142012-02-23Makoto FujinamiCommunication apparatus and secret information sharing method
US20100303241A1 (en)*2009-06-022010-12-02Oliver BreyelAutomatic change of symmetrical encryption key
US20110295708A1 (en)*2010-05-252011-12-01beonSoft Inc.Systems and methods for providing software rental services to devices connected to a network
US9178698B1 (en)*2011-12-212015-11-03Google Inc.Dynamic key management
US9317316B2 (en)*2011-12-282016-04-19Huawei Technologies Co., Ltd.Host virtual machine assisting booting of a fully-encrypted user virtual machine on a cloud environment
US8584216B1 (en)*2012-03-152013-11-12Symantec CorporationSystems and methods for efficiently deploying updates within a cryptographic-key management system
US20150078550A1 (en)*2013-09-132015-03-19Microsoft CorporationSecurity processing unit with configurable access control
US20150242594A1 (en)*2014-02-212015-08-27Venafi, Inc.Trust Map Management and User Interface

Cited By (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9930066B2 (en)2013-02-122018-03-27Nicira, Inc.Infrastructure level LAN security
US11411995B2 (en)2013-02-122022-08-09Nicira, Inc.Infrastructure level LAN security
US11743292B2 (en)2013-02-122023-08-29Nicira, Inc.Infrastructure level LAN security
US10771505B2 (en)2013-02-122020-09-08Nicira, Inc.Infrastructure level LAN security
US12206706B2 (en)2013-02-122025-01-21Nicira, Inc.Infrastructure level LAN security
US9613218B2 (en)2014-06-302017-04-04Nicira, Inc.Encryption system in a virtualized environment
US9792447B2 (en)2014-06-302017-10-17Nicira, Inc.Method and apparatus for differently encrypting different flows
US10445509B2 (en)2014-06-302019-10-15Nicira, Inc.Encryption architecture
US10747888B2 (en)2014-06-302020-08-18Nicira, Inc.Method and apparatus for differently encrypting data messages for different logical networks
US12093406B2 (en)2014-06-302024-09-17Nicira, Inc.Method and apparatus for dynamically creating encryption rules
US11087006B2 (en)2014-06-302021-08-10Nicira, Inc.Method and apparatus for encrypting messages based on encryption group association
US10241930B2 (en)*2014-12-082019-03-26eperi GmbHStoring data in a server computer with deployable encryption/decryption infrastructure
US10798073B2 (en)2016-08-262020-10-06Nicira, Inc.Secure key management protocol for distributed network encryption
US11533301B2 (en)2016-08-262022-12-20Nicira, Inc.Secure key management protocol for distributed network encryption
CN109166119A (en)*2018-09-052019-01-08深圳灵图慧视科技有限公司Fabric defect detection method, device, equipment and machine readable media
CN113454598A (en)*2019-02-222021-09-28Vm维尔股份有限公司Providing services with guest VM mobility
US11190336B2 (en)*2019-05-102021-11-30Sap SePrivacy-preserving benchmarking with interval statistics reducing leakage
CN112637107A (en)*2019-09-242021-04-09中国电信股份有限公司Information processing method and system based on attributes
US12432077B2 (en)2020-03-112025-09-30Bytedance Inc.Indication of digital medial integrity
US20230080139A1 (en)*2020-05-152023-03-16Huawei Technologies Co., Ltd.Communication method and communications apparatus
US12413412B2 (en)*2020-05-152025-09-09Shenzhen Yinwang Intelligent Technologies Co., Ltd.Communication method and communications apparatus for authentication in a handshake process
WO2022072723A1 (en)*2020-09-302022-04-07Bytedance Inc.Picture partitioning in video coding
US20240089097A1 (en)*2022-09-092024-03-14Renesas Electronics CorporationKey update management system and key update management method
CN119675967A (en)*2024-12-192025-03-21苏州奥米伽网络科技有限公司 A file transmission protection method, system and device based on multiple encryption algorithms

Also Published As

Publication numberPublication date
US9613218B2 (en)2017-04-04
US10445509B2 (en)2019-10-15
US20220164456A1 (en)2022-05-26
US11087006B2 (en)2021-08-10
US9792447B2 (en)2017-10-17
WO2016003491A4 (en)2016-02-25
US20150379277A1 (en)2015-12-31
US20150381578A1 (en)2015-12-31
EP3531332B1 (en)2021-12-15
US10747888B2 (en)2020-08-18
US20150379281A1 (en)2015-12-31
US20150379278A1 (en)2015-12-31
US20150379282A1 (en)2015-12-31
US20150379279A1 (en)2015-12-31
US12093406B2 (en)2024-09-17
CN106575338B (en)2021-03-02
EP3161718A1 (en)2017-05-03
US9489519B2 (en)2016-11-08
US20150379280A1 (en)2015-12-31
WO2016003491A1 (en)2016-01-07
CN106575338A (en)2017-04-19
EP3161718B1 (en)2019-05-01
EP3531332A1 (en)2019-08-28
EP3161718A4 (en)2018-03-28

Similar Documents

PublicationPublication DateTitle
US12093406B2 (en)Method and apparatus for dynamically creating encryption rules
US11533301B2 (en)Secure key management protocol for distributed network encryption
US20220261273A1 (en)Collecting and processing context attributes on a host
US10778651B2 (en)Performing context-rich attribute-based encryption on a host
US10805332B2 (en)Context engine model
US20190334950A1 (en)Private key operations
JP7681068B2 (en) Collecting and processing context attributes on the host
US9385866B2 (en)System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised
US20250240275A1 (en)Beacon and threat intelligence based apt detection
US20240422195A1 (en)Data-plane approach for policy configuration

Legal Events

DateCodeTitleDescription
STCVInformation on status: appeal procedure

Free format text:NOTICE OF APPEAL FILED

STCVInformation on status: appeal procedure

Free format text:APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:TC RETURN OF APPEAL

STCVInformation on status: appeal procedure

Free format text:ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

STCVInformation on status: appeal procedure

Free format text:BOARD OF APPEALS DECISION RENDERED

STCVInformation on status: appeal procedure

Free format text:REQUEST RECONSIDERATION AFTER BOARD OF APPEALS DECISION

STCVInformation on status: appeal procedure

Free format text:BOARD OF APPEALS DECISION RENDERED AFTER REQUEST FOR RECONSIDERATION

STCVInformation on status: appeal procedure

Free format text:APPLICATION INVOLVED IN COURT PROCEEDINGS

STCVInformation on status: appeal procedure

Free format text:BOARD OF APPEALS DECISION RENDERED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION


[8]ページ先頭

©2009-2025 Movatter.jp