Unlock instant, AI-driven research and patent intelligence for your innovation.

Manage nic encrypted traffic for migrating clients or tasks

A client, stream key technology, applied in electrical digital data processing, instruments, program control design, etc., can solve problems such as affecting external computing devices and affecting data locations

Active Publication Date: 2021-11-16
GOOGLE LLC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Migration of a client on a virtual machine (VM) from a host server to a target server may affect not only the location of the data, but also various external computing devices that interact with the client as well as the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Manage nic encrypted traffic for migrating clients or tasks
  • Manage nic encrypted traffic for migrating clients or tasks
  • Manage nic encrypted traffic for migrating clients or tasks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technology generally involves migrating a guest of a virtual machine from a host server to a target server while avoiding loss of connectivity and continuing to encrypt data accurately. For example, a virtual machine on a host server may need to be migrated to a target server. In this case, the monitor associated with the host server may cooperate between the client server and the network interface controller (NIC) and ultimately the target server.

[0019] The host server can use the stream key to encrypt and decrypt communications between the host server and the target server. When it comes to migrating clients, the stream key can be encrypted by receiving the master key, which can generate the receiving key. As an example, this process can occur on a monitor of a host server. The monitor can then send the receive token (along with the stream key encapsulated therein) to the host server's NIC. The NIC then encrypts the data packet using the stream key, and send...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method are provided for implementing live migration of clients on virtual machines of a host server (110) to a target server (150). For example, the host server (110) can encrypt and decrypt communications with the target server (150) using a stream key. The stream key can be encrypted (808) with the receive master key, which results in a receive token. The receipt token may be sent (810) to the network interface controller (120) of the host server (110), which then encrypts the data packet and forwards the information to the target server (150). Multiple sender scenarios can be employed on the host server (110) and various updates can occur on the target server (150) as a result of the new location of the client being migrated from the host server (110) to the target server (150) result.

Description

[0001] Cross References to Related Applications [0002] This application is a continuation of U.S. Patent Application No. 14 / 708,685, filed May 11, 2015, which claims the application titled "Managing NIC Encrypted Streams for MANAGINGNIC-ENCRYPTED FLOWS FOR MIGRATING GUESTS OR TASKS," U.S. Provisional Patent Application No. 61 / 991,784, which is hereby incorporated by reference in its entirety. Background technique [0003] Migration of a client on a virtual machine (VM) from a host server to a target server may affect not only the location of data, but also various external computing devices that interact with the client as well as the server. Technological advances have resolved some of the issues associated with native migrations, which can effectively suspend customer execution until the migration is complete. In this regard, brownout and blackout phases can be employed to reduce the client's abort time such that the only abort is during the outage phase to deliver dirty...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F9/455
CPCG06F9/45558G06F2009/4557G06F2009/45587H04L63/045H04L63/061G06F9/455H04L2463/062H04L9/0822H04L63/0428
Inventor 本杰明·查尔斯·塞利布林
Owner GOOGLE LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More