Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Logical port authentication for virtual machines

一种逻辑端口、虚拟机的技术,应用在数字数据认证、软件仿真/解释/模拟、仪器等方向,能够解决未虚拟交换机优化等问题

Active Publication Date: 2019-10-01
NICIRA INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

EAP has not been optimized for virtual switches that provide logical network overlays

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Logical port authentication for virtual machines
  • Logical port authentication for virtual machines
  • Logical port authentication for virtual machines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] figure 1 A computer system 100 is shown for authenticating a logical port of a virtual machine. Computer system 100 includes a plurality of host computers configured with software and coupled by a data communications network. exist figure 1 In , the computer system 100 is vertically divided into four layers for users, logical network, virtual network and hardware. Computer system 100 is also divided horizontally into a data plane on the left and a control plane on the right.

[0020] In the data plane, hardware includes the physical network interface (P-NIC), central processing unit (CPU), random access memory (RAM), storage devices, local area network (LAN) and wide area network (WAN). In the data plane, a virtual network includes a hypervisor, a virtual switch (V-SW), and a virtual machine. The user layer in the data plane includes a guest operating system (OS) and user applications.

[0021] In the control plane, the hardware also includes the same or differen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer system authenticates a logical port for a virtual machine. A logical network maintains logical network data for a logical switch having the logical port. A virtual switch identifies a logical port authentication request for the virtual machine and transfers the logical port authentication request. A logical port authenticator receives the logical port authentication request and transfers the logical port authentication request for delivery to an authentication database. The logical port authenticator receives a logical port authentication response transferred by the authentication database that grants the logical port authentication request for the virtual machine and transfers authorization data for the logical port. The virtual switch transfers user data for the virtual machine when the virtual machine uses the logical port responsive to the authorization data.

Description

[0001] M. Naraparedi and A. Catreca [0002] related application [0003] This application is related to and claims priority to U.S. Nonprovisional Patent Application 15 / 387,828, entitled "LOGICAL PORT AUTHENTICATION FOR VIRTUAL MACHINES," filed December 22, 2016, the entire contents of which are incorporated by reference into this article. Background technique [0004] Computer hardware executes operating system software and user application software. Computer hardware includes components such as a central processing unit (CPU), random access memory (RAM), network interface cards (NICs), and data storage drives. The CPU executes the operating system software to control the computer hardware. The CPU executes user application software to interact with operating system software. Operating system software controls computer hardware on behalf of user application software. [0005] Virtualization software was introduced to eliminate the interface between computer hardware an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/44G06F9/455
CPCG06F21/44H04L63/0876H04L63/0892H04L63/101H04L63/162G06F9/45558G06F2009/45595H04L63/10G06F21/30G06F9/45533
Inventor M·纳拉帕雷迪A·卡特雷卡
Owner NICIRA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products