US 12,407,714 B2
Application migration vulnerability and device performance monitoring
Parminder Singh Sethi, Punjab (IN); Shelesh Chopra, Bangalore (IN); and Anay Kishore, Bangalore (IN)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Aug. 22, 2023, as Appl. No. 18/453,686.
Prior Publication US 2025/0071139 A1, Feb. 27, 2025
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1441 (2013.01) [H04L 63/0428 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for performing an application migration operation, the method comprising:
initiating the application migration operation to migrate an application from a source device to a target device, wherein the source device comprises a source data migration agent (SDMA) and the target device comprises a target data migration agent (TDMA);
initiating an active scan, wherein the active scan comprises:
determining a type of the application;
determining, based on the type, known vulnerabilities and performance metrics of the application;
monitoring, based on the known vulnerabilities, a network traffic of the source device; and
monitoring, based on the performance metrics of the application, source performance metrics of the source device;
establishing a secure data path between the source device and the target device by:
obtaining, by the SDMA in response to the initiation of the active scan, coordinated universal time (UTC)-based system time of the source device;
generating, by the SDMA, a secure string based on the coordinated UTC-based system time and a configuration parameter set by a user of the source device;
encrypting, by the SDMA, the secure string to generate an encrypted secure string;
appending, by the SDMA, the encrypted secure string to an application migration notification to generate an encrypted secure string-appended request;
sending, by the SDMA, the encrypted secure string-appended request to the TDMA;
receiving, from the TDMA, a confirmation that the encrypted secure string-appended request was properly received; and
initiating, by the SDMA and based on the first confirmation, the secure data path from the source device to the target device;
beginning migration of the application from the source device to the target device using the secure data path;
making a first determination, using the active scan, that the network traffic or the source performance metrics are indicative of suspicious activity;
logging information about the suspicious activity;
making a second determination that the application migration operation is complete; and
terminating the active scan and the secure data path based on the second determination.