SECURITY THREAT ANALYSIS
Granted: July 11, 2024
Application Number:
20240236142
Example methods and systems for security threat analysis are described. One example may involve a first computer system configuring a test packet that includes malicious content for forwarding along a network path between (a) a first network element that is connected with a first virtualized computing instance and (b) a second network element that is connected with a second virtualized computing instance. The test packet may be injected at the first network element and forwarded towards…
VALIDATION-BASED SERVICE REQUEST HANDLING
Granted: July 11, 2024
Application Number:
20240236037
Example methods and systems for validation-based service request handling are described. In one example, a computer system may obtain, from a management entity, configuration information specifying a unicast service address associated with a service node capable of providing a network service. In response to detecting a service request from the virtualized computing instance, the computer system may generate a modified service request that (a) is destined for the unicast service address…
PRIORITY-BASED NETWORK BANDWIDTH ALLOCATION
Granted: July 11, 2024
Application Number:
20240236016
Example methods and systems for priority-based network bandwidth allocation are described. In one example, a first computer system may detect an event indicating that network bandwidth allocation is required for a virtualized computing instance. The first computer system may identify, from multiple priority levels, a first priority level that is associated with (a) the virtualized computing instance, (b) a logical network element to which the virtualized computing instance is attached,…
DISPLAYING A TRANSCRIPTION WITH ADJUSTABLE TRANSPARENCY
Granted: July 11, 2024
Application Number:
20240233710
A transcription, such as text of audio occurring at to a remote desktop and which may include a translation, may be presented concurrently with an image of the remote desktop on an unused area of a display screen. The transcription may be presented with a selectable and adjustable transparency, and can continue to be presented after the image of the remote desktop is minimized.
ZERO-INPUT INTELLIGENCE MAINTENANCE ASSISTANT FOR A VIRTUALIZED COMPUTING ENVIRONMENT
Granted: July 11, 2024
Application Number:
20240232818
Intelligent maintenance may be planned and performed for hosts in a pool of hosts that run virtual desktop sessions. A number of hosts to be shut down for maintenance, as well as a start time for a maintenance window, may be determined based on a first risk model and on a capacity risk level. A second risk model may be used to determine whether a capacity risk is still less than the capacity risk level, if some hosts have sessions that take longer than expected to log off and so delay…
METHODS AND SYSTEMS THAT MONITOR SYSTEM-CALL-INTEGRITY
Granted: July 11, 2024
Application Number:
20240232328
The current document is directed to automated methods and systems that monitor system-call execution by operating systems in order to detect operating-system corruption. A disclosed implementation of the currently disclosed automated system-call-integrity monitor generate operational system-call fingerprints for randomly selected system calls executed by guest operating systems of randomly selected virtual machines and compares the operational system-call fingerprints to reference…
OBJECT INPUT/OUTPUT SAMPLING FOR PERFORMANCE DIAGNOSIS IN VIRTUALIZED COMPUTING ENVIRONMENT
Granted: July 11, 2024
Application Number:
20240231877
An example method for sampling an input/output (I/O) to an object owned by an object owner is disclosed. The method includes receiving an I/O and determining whether a predetermined time interval exceeds. In response that the predetermined time interval does not exceed, the example method includes calculating a first sample score associated with the object owner, obtaining a second sample score associated with a component owner of the object and calculating a weighted sample score based…
DISPLAYING REMOTE DESKTOP INFORMATION WITH ADJUSTABLE TRANSPARENCY
Granted: July 11, 2024
Application Number:
20240231859
Information, such as information pertaining to a remote desktop, may be presented concurrently with an image of the remote desktop on an unused area of a display screen. The information may be presented with a selectable and adjustable transparency.
DISPLAYING A REMOTE DESKTOP WITH CONTROLLABLE TRANSPARENCY
Granted: July 11, 2024
Application Number:
20240231609
A remote desktop can be displayed with controllable transparency over a local desktop. The transparency may be varied using hotkeys. Hotkeys may also be used to control/switch the direction of user input, such as mouse and keyboard events, so as to direct the user input to the remote desktop or to the local desktop.
SCALABLE NETWORK LATENCY MEASUREMENT DESIGN IN DISTRIBUTED STORAGE SYSTEMS
Granted: June 27, 2024
Application Number:
20240214290
The disclosure provides a method for measuring network latency between hosts in a cluster. The method generally includes receiving, by a first host, a first ping list indicating the first host is to engage in a first ping round with a second host; executing the first ping round with the second host, wherein executing the first ping round comprises: transmitting first ping requests to the second host; calculating a network latency for each of the first ping requests; and determining a…
MEDIA ACCESS CONTROL (MAC) ADDRESS ASSIGNMENT FOR VIRTUAL NETWORK INTERFACE CARDS (VNICs)
Granted: June 20, 2024
Application Number:
20240205184
Example methods and systems for media access control (MAC) address assignment for virtual network interface cards (VNICs) are described. One example may involve a first computer system may determining a first MAC address portion that is uniquely associated with the first computer system. A first VNIC may be assigned with a first MAC address that includes (a) the first MAC address portion and (b) a third MAC address portion that is uniquely associated with the first VNIC on the first…
METHODS AND SYSTEMS THAT GENERATE COMPONENT QUANTITIES FOR SYSTEM CONFIGURATIONS
Granted: June 20, 2024
Application Number:
20240202196
The current document is directed to methods and systems that generate lists of component types and quantities needed for system installations based on parameter values that characterize the system, environment, and application domain, referred to as “input values.” An implementation of a private-5G-network component-type-and-quantity-determination system is disclosed. An initial model used to generate component types and quantities is generated from information acquired from various…
TECHNIQUES FOR APPLYING A NAMED PORT SECURITY POLICY
Granted: June 6, 2024
Application Number:
20240187378
The disclosure provides an example method for implementing a network policy in a software defined networking environment. The method generally includes receiving a manifest defining a plurality of pods, wherein: for a first pod, the manifest defines a first environment value, a first port number for a first container of the first pod, and a name for the first port number; for a second pod, the manifest defines the first environment value, a second port number for a second container of…
PATH SELECTION METHOD BASED ON AN ACTIVE-ACTIVE CONFIGURATION FOR A HYPERCONVERGED INFRASTRUCTURE STORAGE ENVIRONMENT
Granted: June 6, 2024
Application Number:
20240184610
For a distributed storage system that has an active-active configuration for hosts and which uses an Internet small computer system interface (iSCSI) protocol, techniques are provided to identify/select a plurality of paths to a target. An active optimized path is selected for a host that is an object owner, and an active non-optimized path is selected for a host that is a component owner. The selection of the optimized path for a host is further based on whether that host has sufficient…
METHOD AND SYSTEM TO SUPPORT ACCESSIBILITY TO WEB PAGE
Granted: May 30, 2024
Application Number:
20240176837
Example methods and systems to support accessibility to a web page are disclosed. One example method includes examining a document to be rendered to the web page and determining whether an accessibility issue exists in the document. In response to determining that the accessibility issue exists in the document, the example method further includes determining whether a first remediation of the document corresponding to the accessibility issue exists. In response to determining that the…
CONTEXT AWARE BEHAVIORAL ANOMALY DETECTION IN COMPUTING SYSTEMS
Granted: May 2, 2024
Application Number:
20240143746
Systems and methods are described for employing event context to improve threat detection. Systems and methods of embodiments of the disclosure measure both process deviation and path deviation to determine whether processes are benign or represent threats. Both a process deviation model and a path deviation model are deployed. The process deviation model determines the similarity of a process to past processes, and the path deviation model estimates whether processes have been called…
REUSING AND RECOMMENDING USER INTERFACE (UI) CONTENTS BASED ON SEMANTIC INFORMATION
Granted: May 2, 2024
Application Number:
20240143293
A recommendation system reuses user interface (UI) strings in a virtualized computing environment based on semantic information. The recommendation system receives an input UI string query, and searches indexed and validated UI strings for candidate UI strings. The candidate UI strings are identified based on a relevance score and then ranked based on a semantic similarity score. The ranked UI strings are provided as a recommendation for a UI string in UI content of a user interface.
METHODS AND SYSTEMS FOR CONSTRUCTING AN ONTOLOGY OF LOG MESSAGES WITH NAVIGATION AND KNOWLEDGE TRANSFER
Granted: April 25, 2024
Application Number:
20240135261
Computer-implemented methods and systems described herein are directed to constructing a navigable tiered ontology that characterize how groups of log messages are distributed across products and applications that run on the platforms provided by the products. The ontology is constructed based on the products, applications, and event types of the log messages. The ontology represents how the log messages are distributed across the products. applications, and event types. The ontology is…
METHODS AND SYSTEMS THAT MONITOR SYSTEM-CALL-INTEGRITY
Granted: April 25, 2024
Application Number:
20240134961
The current document is directed to automated methods and systems that monitor system-call execution by operating systems in order to detect operating-system corruption. A disclosed implementation of the currently disclosed automated system-call-integrity monitor generate operational system-call fingerprints for randomly selected system calls executed by guest operating systems of randomly selected virtual machines and compares the operational system-call fingerprints to reference…
SECURE EXECUTION OF A FILE ON A COPY DEVICE IN A VIRTUALIZED COMPUTING ENVIRONMENT
Granted: April 4, 2024
Application Number:
20240111857
Techniques are provided to prevent or allow the execution of a file from a copy device, such as a shadow copy device, depending on whether the file includes malicious code or trusted code. Redirection techniques may be used to cause a file (stored in the copy device) to be analyzed for malicious code at an original volume, rather than being analyzed at or executed from the copy device.