US 12,457,113 B1
Seamless network confidentiality for a containerized application on edge infrastructure
Maxim Balin, Gan-Yavne (IL); Shree Rathinasamy, Round Rock, TX (US); and Eliyahu Rosenes, Bet Shemesh (IL)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Apr. 26, 2024, as Appl. No. 18/647,363.
Int. Cl. H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3242 (2013.01) [H04L 63/0236 (2013.01); H04L 63/0245 (2013.01); H04L 63/04 (2013.01); H04L 63/0428 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing operation of a deployment, the method comprising:
obtaining application data from an application hosted by a first container, the application data being destined for a second container;
obtaining a first hash of a first media access control address associated with the second container;
making a determination regarding whether the first hash is trusted;
in a first instance of the determination where the first hash is trusted:
encrypting the application data using an encryption key;
obtaining a second hash of a second media access control address associated with the first container;
packaging the encrypted application as a payload of a network data unit and the second hash in a field of control information of the network data unit; and
sending the network data unit to the second container to facilitate provisioning of computer implemented services.