会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Systems and methods for hypervisor discovery and utilization
    • 管理程序发现和利用的系统和方法
    • US08635612B2
    • 2014-01-21
    • US11119200
    • 2005-04-29
    • Adrian J. OneyAndrew John ThorntonEric P. TrautNathan T. Lewis
    • Adrian J. OneyAndrew John ThorntonEric P. TrautNathan T. Lewis
    • G06F9/455
    • G06F9/45533
    • Systems and methods are provided, whereby partitions may become enlightened and discover the presence of a hypervisor. Several techniques of hypervisor discovery are discussed, such as detecting the presence of virtual processor registers (e.g. model specific registers or special-purpose registers) or the presence of virtual hardware devices. Upon discovery, information (code and/or data) may be injected in a partition by the hypervisor, whereby such injection allows the partition to call the hypervisor. Moreover, the hypervisor may present a versioning mechanism that allows the partition to match up the version of the hypervisor to its virtual devices. Next, once code and/or data is injected, calling conventions are established that allow the partition and the hypervisor to communicate, so that the hypervisor may perform some operations on behalf of the partition. Four exemplary calling conventions are considered: restartable instructions, a looping mechanism, shared memory transport, and synchronous or asynchronous processed packets. Last, cancellation mechanisms are considered, whereby partition requests may be cancelled.
    • 提供了系统和方法,由此分区可能变得开明并发现管理程序的存在。 讨论了管理程序发现的几种技术,例如检测虚拟处理器寄存器(例如模型特定寄存器或专用寄存器)的存在或虚拟硬件设备的存在。 一旦发现,信息(代码和/或数据)可以由管理程序注入到分区中,由此这种注入允许分区调用管理程序。 此外,管理程序可以呈现允许分区将虚拟机管理程序的版本与其虚拟设备相匹配的版本控制机制。 接下来,一旦注入了代码和/或数据,就建立了允许分区和管理程序进行通信的调用约定,以便管理程序可以代表分区执行一些操作。 考虑四个示例性的呼叫约定:可重新启动的指令,循环机制,共享存储器传输和同步或异步处理的分组。 最后,考虑取消机制,从而可能会取消分区请求。
    • 4. 发明申请
    • ENCRYPTED CONTENT STREAMING
    • 加密内容流
    • US20120155639A1
    • 2012-06-21
    • US12969414
    • 2010-12-15
    • Adrian J. OneyQuintin S. BurnsBryan Born
    • Adrian J. OneyQuintin S. BurnsBryan Born
    • H04N7/167H04L9/18
    • H04L9/0822H04L9/0836H04L2209/603H04N21/2347H04N21/4405H04N21/4627H04N21/47202H04N21/63345H04N21/8355
    • Encrypted content streaming is provided by a method comprising holding an encrypted content stream that is cryptographically encrypted from a content stream with a content key, and holding an encrypted content key that is cryptographically encrypted from the content key with one or more intermediate encryption keys. The method further comprises serving the encrypted content stream to a plurality of content consumption devices, wherein the encrypted content stream is embedded with a leaf license comprising the encrypted content key, and wherein the encrypted content stream is cryptographically decryptable by a content consumption device having a scalable root license providing one or more intermediate root keys from which the content consumption device derives the one or more intermediate decryption keys paired to the one or more intermediate encryption keys.
    • 加密内容流是通过一种方法提供的,该方法包括:使用内容密钥保存从内容流加密的加密内容流,以及使用一个或多个中间加密密钥保存从内容密钥加密的加密内容密钥。 所述方法还包括将加密的内容流服务于多个内容消费设备,其中所述加密的内容流被嵌入有包括所述加密的内容密钥的叶子许可证,并且其中所述加密的内容流可由内容消费设备加密地解密,所述内容消费设备具有 提供一个或多个中间根密钥的可扩展根许可证,内容消费装置从该根密钥导出与一个或多个中间加密密钥配对的一个或多个中间解密密钥。
    • 8. 发明授权
    • Encrypted content streaming
    • 加密内容流
    • US09137214B2
    • 2015-09-15
    • US12969399
    • 2010-12-15
    • Adrian J. OneyQuintin S. BurnsBryan Born
    • Adrian J. OneyQuintin S. BurnsBryan Born
    • H04L9/00H04L29/06
    • H04L63/0428H04L63/045H04L63/0457H04L2463/061H04L2463/062H04L2463/101
    • Encrypted content streaming is provided by a method comprising holding an encrypted content stream that is cryptographically encrypted from a content stream with a content key, and holding an encrypted content key that is cryptographically encrypted from the content key with one or more blackout encryption keys. Each blackout encryption key is paired to a blackout decryption key corresponding to a specific audience, and each blackout decryption key is obtainable by audiences other than the specific audience corresponding to the blackout decryption key. The method further comprises serving the encrypted content stream to the plurality of different audiences. The encrypted content stream is embedded with a leaf license comprising the encrypted content key, and the encrypted content key is cryptographically decryptable by audiences having the one or more blackout decryption keys paired to the one or more blackout encryption keys.
    • 加密内容流是通过一种方法来提供的,该方法包括:通过内容密钥保存从内容流加密的加密内容流,并且使用一个或多个中断加密密钥保存从内容密钥加密加密的加密内容密钥。 每个停电加密密钥与对应于特定观众的中断解密密钥配对,并且每个中断解密密钥可由除了中断解密密钥的特定受众以外的受众获得。 该方法还包括向多个不同的受众服务加密的内容流。 加密的内容流被嵌入具有加密的内容密钥的叶子许可证,并且加密的内容密钥由具有与一个或多个中断加密密钥配对的一个或多个中断解密密钥的受众进行密码解密。
    • 10. 发明申请
    • Allowing Virtual Machine to Discover Virtual Status Thereof
    • 允许虚拟机发现其虚拟状态
    • US20080104586A1
    • 2008-05-01
    • US11553843
    • 2006-10-27
    • Andrew John ThortonAdrian J. OneyRobert H. Earhart
    • Andrew John ThortonAdrian J. OneyRobert H. Earhart
    • G06F9/455
    • G06F9/45533
    • A host computing device has a virtual machine (VM) instantiated thereon. The VM has a virtual application instantiated thereon and a virtual processor. The host also has a virtual machine monitor (VMM) instantiated thereon to oversee the VM and to intercept instructions from a virtual entity comprising one of the virtual application and the VM to the virtual processor of such VM. The virtual entity becomes self-aware of the virtual status thereof based on a self-aware flag as obtained from the VMM, and based thereon obtains particular virtual metadata from a Synthetic range of the virtual processor by way of the VMM to operate efficiently. The Synthetic range of the virtual processor is implemented by the VMM and does not correspond to any defined range of the physical processor corresponding to the virtual processor.
    • 主计算设备具有在其上实例化的虚拟机(VM)。 VM具有在其上实例化的虚拟应用程序和虚拟处理器。 主机还具有在其上实例化的虚拟机监视器(VMM),以监督虚拟机并且从包括虚拟应用程序和虚拟机中的虚拟实体的虚拟实体截取到该VM的虚拟处理器的指令。 虚拟实体基于从VMM获得的自我感知标志变得自我感知其虚拟状态,并且基于该虚拟实体通过VMM从虚拟处理器的合成范围获得特定的虚拟元数据以有效地操作。 虚拟处理器的合成范围由VMM实现,并且不对应于与虚拟处理器对应的物理处理器的任何定义的范围。