Patents Assigned to Suse LLC
-
Patent number: 12244625Abstract: A container system monitors one or more activities of an application container in a container system by intercepting data from the one or more activities of the application container. The application container includes computer-readable instructions and initiated via a container service and isolated using operating system-level virtualization. The monitoring is performed at a layer between the app container and the container service. The container system also transmits a report of the intercepted one or more activities to a designated source. The container system inspects the intercepted one or more activities, and in response to the intercepted one or more activities violating a policy in a policy store, triggers an action specified in the policy.Type: GrantFiled: August 20, 2023Date of Patent: March 4, 2025Assignee: SUSE LLCInventors: Fei Huang, Gang Duan, Zang Li
-
Patent number: 12190154Abstract: Controlling allocation of resources in network function virtualization. Data defining a pool of available physical resources is maintained. Data defining one or more resource allocation rules is identified. An application request is received. Physical resources from the pool are allocated to virtual resources to implement the application request, on the basis of the maintained data, the identified data and the received application request.Type: GrantFiled: December 17, 2023Date of Patent: January 7, 2025Assignee: SUSE LLCInventors: Ignacio Aldama, Ruben Sevilla Giron, Javier Garcia-Lopez
-
Publication number: 20240388573Abstract: A security monitor monitors network communications at a loopback interface of a pod in the container system. The pod includes a service mesh proxy and an application container. The application container includes computer-readable instructions and is initiated via a container service and is isolated using operating system-level virtualization. The application container communicates with the service mesh proxy using the loopback interface. The security monitor extracts network address and port information from packet data in the network communications at the loopback interface. The security monitor determines one or more connection contexts of the network communications at the loopback interface, each connection context used to identify a network session of the application container with a remote application container.Type: ApplicationFiled: July 31, 2024Publication date: November 21, 2024Applicant: SUSE LLCInventors: Yuncong Feng, Gang Duan
-
Patent number: 12088560Abstract: A security monitor monitors network communications at a loopback interface of a pod in the container system. The pod includes a service mesh proxy and an application container. The application container includes computer-readable instructions and is initiated via a container service and is isolated using operating system-level virtualization. The application container communicates with the service mesh proxy using the loopback interface. The security monitor extracts network address and port information from packet data in the network communications at the loopback interface. The security monitor determines one or more connection contexts of the network communications at the loopback interface, each connection context used to identify a network session of the application container with a remote application container.Type: GrantFiled: July 9, 2021Date of Patent: September 10, 2024Assignee: SUSE LLCInventors: Yuncong Feng, Gang Duan
-
Patent number: 12061896Abstract: The system and method described herein may upgrade kernels in cloud images deployed in cloud computing environments without having to rebuild a machine image that contains a root file system for the cloud image. For example, the cloud image may include a ramdisk that compares the kernel booted in the cloud image to the root file system to verify whether the machine image contains a directory hierarchy matching an operating system release for the kernel. In response to the machine image containing the matching directory hierarchy, the root file system may be mounted for execution in the cloud computing environment. Alternatively, in response to the machine image lacking the matching directory hierarchy, the ramdisk may dynamically create the matching directory hierarchy and inject modules that support the kernel into the root file system prior to mounting and delivering control to the root file system.Type: GrantFiled: May 30, 2023Date of Patent: August 13, 2024Assignee: SUSE LLCInventor: Peter Bowen
-
Publication number: 20240267305Abstract: Some examples described herein relate to providing a customized cloud service. In an example, Key Service Indicators (KSI) may be received for a cloud service. The Key Service Indicators may be associated with a cloud service template for providing the cloud service. The resources required for providing the cloud service may be identified based on the Key Service Indicators.Type: ApplicationFiled: April 18, 2024Publication date: August 8, 2024Applicant: SUSE LLCInventor: Sandhya BALAKRISHNAN
-
Patent number: 12020014Abstract: A method, system, and program product are provided for updating software deployed on computers in an enterprise computer network wherein each computer has a software update agent installed to enable the computer to receive software patch updates. The method includes determining a required software component and updates; determining a version of the agent and updating the agent if required; selecting a server from which required updates are to be downloaded; scanning a plurality of software components on a selected computer and comparing the components with updates available on the server to determine required updates; downloading the required patches from the server; and installing the patches on the selected computer. The system includes components that perform the method steps when operated on a computer in the network. A computer readable medium implements the method for updating software deployed on computers in a network.Type: GrantFiled: December 7, 2021Date of Patent: June 25, 2024Assignee: SUSE LLCInventor: Colin Lee Feeser
-
Patent number: 11996994Abstract: Some examples described herein relate to providing a customized cloud service. In an example, Key Service Indicators (KSI) may be received for a cloud service. The Key Service Indicators may be associated with a cloud service template for providing the cloud service. The resources required for providing the cloud service may be identified based on the Key Service Indicators.Type: GrantFiled: May 31, 2023Date of Patent: May 28, 2024Assignee: SUSE LLCInventor: Sandhya Balakrishnan
-
Publication number: 20240169053Abstract: A policy interpreter detects that an application container has been added in a container system, and opens a stored manifest for the application container. The policy interpreter retrieves running services information regarding the application container, and generates a security policy for the application container. The security policy defines a set of actions for which the application container can perform, and the set of actions are determined using the manifest and the running service information associated with the application container. The policy interpreter loads the security policy at a security container. The security container blocks an action performed by the application container in response to determining that the action performed by the application container does not match any action in the set of actions defined in the security policy. The policy interpreter transmits the security policy to a graphical user interface container for presentation to a user via a display device.Type: ApplicationFiled: January 27, 2024Publication date: May 23, 2024Applicant: SUSE LLCInventors: Glen K. Kosaka, Gang Duan, Fei Huang
-
Patent number: 11966463Abstract: A policy interpreter detects that an application container has been added in a container system, and opens a stored manifest for the application container. The policy interpreter retrieves running services information regarding the application container, and generates a security policy for the application container. The security policy defines a set of actions for which the application container can perform, and the set of actions are determined using the manifest and the running service information associated with the application container. The policy interpreter loads the security policy at a security container. The security container blocks an action performed by the application container in response to determining that the action performed by the application container does not match any action in the set of actions defined in the security policy. The policy interpreter transmits the security policy to a graphical user interface container for presentation to a user via a display device.Type: GrantFiled: January 14, 2022Date of Patent: April 23, 2024Assignee: SUSE LLCInventors: Glen K. Kosaka, Gang Duan, Fei Huang
-
Publication number: 20240086521Abstract: A threat level analyzer probes for one or more threats within an application container in a container system. Each threat is a vulnerability or a non-conformance with a benchmark setting. The threat level analyzer further probes for one or more threats within a host of the container service. The threat level analyzer generates a threat level assessment score based on results from the probing of the one or more threats of the application container and the one or more threats of the host, and generates a report for presentation in a user interface including the threat level assessment score and a list of threats discovered from the probe of the application container and the host. A report is transmitted by the threat level analyzer to a client device of a user for presentation in the user interface.Type: ApplicationFiled: November 21, 2023Publication date: March 14, 2024Applicant: SUSE LLCInventors: Henrik Rosendahl, Fei Huang, Gang Duan
-
Patent number: 11915051Abstract: Controlling allocation of resources in network function virtualization. Data defining a pool of available physical resources is maintained. Data defining one or more resource allocation rules is identified. An application request is received. Physical resources from the pool are allocated to virtual resources to implement the application request, on the basis of the maintained data, the identified data and the received application request.Type: GrantFiled: March 22, 2023Date of Patent: February 27, 2024Assignee: SUSE LLCInventors: Ignacio Aldama, Ruben Sevilla Giron, Javier Garcia-Lopez
-
Patent number: 11886573Abstract: A threat level analyzer probes for one or more threats within an application container in a container system. Each threat is a vulnerability or a non-conformance with a benchmark setting. The threat level analyzer further probes for one or more threats within a host of the container service. The threat level analyzer generates a threat level assessment score based on results from the probing of the one or more threats of the application container and the one or more threats of the host, and generates a report for presentation in a user interface including the threat level assessment score and a list of threats discovered from the probe of the application container and the host. A report is transmitted by the threat level analyzer to a client device of a user for presentation in the user interface.Type: GrantFiled: August 27, 2021Date of Patent: January 30, 2024Assignee: SUSE LLCInventors: Henrik Rosendahl, Fei Huang, Gang Duan
-
Publication number: 20230412628Abstract: A container system monitors one or more activities of an application container in a container system by intercepting data from the one or more activities of the application container. The application container includes computer-readable instructions and initiated via a container service and isolated using operating system-level virtualization. The monitoring is performed at a layer between the app container and the container service. The container system also transmits a report of the intercepted one or more activities to a designated source. The container system inspects the intercepted one or more activities, and in response to the intercepted one or more activities violating a policy in a policy store, triggers an action specified in the policy.Type: ApplicationFiled: August 20, 2023Publication date: December 21, 2023Applicant: SUSE LLCInventors: Fei Huang, Gang Duan, Zang Li
-
Patent number: 11792216Abstract: A container system monitors one or more activities of an application container in a container system by intercepting data from the one or more activities of the application container. The application container includes computer-readable instructions and initiated via a container service and isolated using operating system-level virtualization. The monitoring is performed at a layer between the app container and the container service. The container system also transmits a report of the intercepted one or more activities to a designated source. The container system inspects the intercepted one or more activities, and in response to the intercepted one or more activities violating a policy in a policy store, triggers an action specified in the policy.Type: GrantFiled: June 26, 2018Date of Patent: October 17, 2023Assignee: SUSE LLCInventors: Fei Huang, Gang Duan, Zang Li
-
Publication number: 20230318939Abstract: Some examples described herein relate to providing a customized cloud service. In an example, Key Service Indicators (KSI) may be received for a cloud service. The Key Service Indicators may be associated with a cloud service template for providing the cloud service. The resources required for providing the cloud service may be identified based on the Key Service Indicators.Type: ApplicationFiled: May 31, 2023Publication date: October 5, 2023Applicant: SUSE LLCInventor: Sandhya BALAKRISHNAN
-
Publication number: 20230297364Abstract: The system and method described herein may upgrade kernels in cloud images deployed in cloud computing environments without having to rebuild a machine image that contains a root file system for the cloud image. For example, the cloud image may include a ramdisk that compares the kernel booted in the cloud image to the root file system to verify whether the machine image contains a directory hierarchy matching an operating system release for the kernel. In response to the machine image containing the matching directory hierarchy, the root file system may be mounted for execution in the cloud computing environment. Alternatively, in response to the machine image lacking the matching directory hierarchy, the ramdisk may dynamically create the matching directory hierarchy and inject modules that support the kernel into the root file system prior to mounting and delivering control to the root file system.Type: ApplicationFiled: May 30, 2023Publication date: September 21, 2023Applicant: SUSE LLCInventor: Peter Bowen
-
Publication number: 20230229496Abstract: Controlling allocation of resources in network function virtualization. Data defining a pool of available physical resources is maintained. Data defining one or more resource allocation rules is identified. An application request is received. Physical resources from the pool are allocated to virtual resources to implement the application request, on the basis of the maintained data, the identified data and the received application request.Type: ApplicationFiled: March 22, 2023Publication date: July 20, 2023Applicant: SUSE LLCInventors: Ignacio Aldama, Ruben Sevilla Giron, Javier Garcia-Lopez
-
Patent number: 11698781Abstract: The system and method described herein may upgrade kernels in cloud images deployed in cloud computing environments without having to rebuild a machine image that contains a root file system for the cloud image. For example, the cloud image may include a ramdisk that compares the kernel booted in the cloud image to the root file system to verify whether the machine image contains a directory hierarchy matching an operating system release for the kernel. In response to the machine image containing the matching directory hierarchy, the root file system may be mounted for execution in the cloud computing environment. Alternatively, in response to the machine image lacking the matching directory hierarchy, the ramdisk may dynamically create the matching directory hierarchy and inject modules that support the kernel into the root file system prior to mounting and delivering control to the root file system.Type: GrantFiled: March 21, 2016Date of Patent: July 11, 2023Assignee: Suse LLCInventor: Peter Bowen
-
Patent number: 11700188Abstract: Some examples described herein relate to providing a customized cloud service. In an example, Key Service Indicators (KSI) may be received for a cloud service. The Key Service Indicators may be associated with a cloud service template for providing the cloud service. The resources required for providing the cloud service may be identified based on the Key Service Indicators.Type: GrantFiled: February 1, 2022Date of Patent: July 11, 2023Assignee: SUSE LLCInventor: Sandhya Balakrishnan