Manage nic encrypted traffic for migrating clients or tasks
A client, stream key technology, applied in electrical digital data processing, instruments, program control design, etc., can solve problems such as affecting external computing devices and affecting data locations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The technology generally involves migrating a guest of a virtual machine from a host server to a target server while avoiding loss of connectivity and continuing to encrypt data accurately. For example, a virtual machine on a host server may need to be migrated to a target server. In this case, the monitor associated with the host server may cooperate between the client server and the network interface controller (NIC) and ultimately the target server.
[0019] The host server can use the stream key to encrypt and decrypt communications between the host server and the target server. When it comes to migrating clients, the stream key can be encrypted by receiving the master key, which can generate the receiving key. As an example, this process can occur on a monitor of a host server. The monitor can then send the receive token (along with the stream key encapsulated therein) to the host server's NIC. The NIC then encrypts the data packet using the stream key, and send...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



