会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Systems and methods for data encryption using plugins within virtual systems and subsystems
    • 使用虚拟系统和子系统中的插件进行数据加密的系统和方法
    • US07987497B1
    • 2011-07-26
    • US10794898
    • 2004-03-05
    • Aaron GilesEric P. TrautRene Antonio Vega
    • Aaron GilesEric P. TrautRene Antonio Vega
    • G06F7/04G06F17/30G06F11/30G06F12/14G06F13/00G06F13/28H04N7/16H04L29/06B41K3/38
    • G06F13/385G06F9/45537G06F21/53G06F2213/0058G06F2213/3802
    • Several embodiments of the present invention provide a means for improving data access security in computer systems to support high-security applications, and certain of these embodiments are specifically directed to providing sector-level encryption of a virtual hard disk in a virtual machine environment. More specifically, certain embodiments are directed to providing sector-level encryption by using plug-ins in a virtual machine environment, thereby providing improved data access security in a computer system that supports high-security applications. Certain embodiments also use encryption plug-ins associated with standard encryption software for exchanging data between a virtual machine (VM) and its associated virtual hard drive(s) (VHDs). Moreover, several embodiments of the present invention are directed to the use of plug-in encryption services that interface with, and provide services for, a VM via a VM Encryption API (or its equivalent).
    • 本发明的几个实施例提供了一种用于改善计算机系统中的数据访问安全性以支持高安全性应用的手段,并且这些实施例中的某些具体涉及在虚拟机环境中提供虚拟硬盘的扇区级加密。 更具体地,某些实施例旨在通过在虚拟机环境中使用插件来提供扇区级加密,从而在支持高安全性应用的计算机系统中提供改进的数据访问安全性。 某些实施例还使用与标准加密软件相关联的加密插件来在虚拟机(VM)及其相关联的虚拟硬盘驱动器(VHD)之间交换数据。 此外,本发明的若干实施例涉及使用通过VM加密API(或其等价物)与VM接口并为VM提供服务的插件加密服务。
    • 2. 发明授权
    • Method for hybrid processing of software instructions of an emulated computer system
    • 用于模拟计算机系统的软件指令的混合处理的方法
    • US06980946B2
    • 2005-12-27
    • US09809731
    • 2001-03-15
    • Aaron GilesEric P. Traut
    • Aaron GilesEric P. Traut
    • G06F9/455G06F9/45G06F12/00
    • G06F9/45533
    • A method for processing software instructions in an emulated computing environment is provided in which instruction blocks from the application programs of a guest computer system are parsed to determine whether the instruction blocks include instructions executable at user level or supervisor level. Those instruction blocks that are executable at user level are passed directly to the processor of the host computer system, and those instruction blocks that are executable at supervisor level, are translated before being passed to the processor for execution. In the case of instruction blocks that include instruction blocks executable at supervisor level, prior to translation, a cache is queried to determine whether a translation for the instruction block is in the case. If a translation is in the cache, the translated version in the cache is provided to the processor for execution. If a translation is not in the cache, translation occurs, and the translated instruction block is saved to the cache.
    • 提供了一种用于在仿真计算环境中处理软件指令的方法,其中解析来自客户计算机系统的应用程序的指令块,以确定指令块是否包括在用户级别或主管级别可执行的指令。 可在用户层级执行的指令块直接传递到主计算机系统的处理器,并且可以在主管级别执行的那些指令块在被传递到处理器执行之前被转换。 在包括在主管级别可执行的指令块的指令块的情况下,在转换之前,查询高速缓存以确定在该情况下是否指令块的转换。 如果翻译在缓存中,缓存中的翻译版本将提供给处理器执行。 如果翻译不在缓存中,则发生翻译,并将转换的指令块保存到高速缓存。
    • 5. 发明授权
    • Partition bus
    • 分区巴士
    • US07689800B2
    • 2010-03-30
    • US11128647
    • 2005-05-12
    • Jacob OshinsPeter L. JohnstonEric P. TrautNathan LewisJeffrey Kinsey
    • Jacob OshinsPeter L. JohnstonEric P. TrautNathan LewisJeffrey Kinsey
    • G06F12/00
    • G06F9/544G06F9/45537
    • A method and system are provided for integrating partitions in a virtual machine environment. Specifically, a partition bus is provided, where the partition bus operatively connects partitions in such a way that it functions as a data transport mechanism allowing for data transfer and device sharing between partitions. The partition bus relies on virtualizing software in order to establish itself and to establish channels of communication between partitions and to inject interrupts to partitions where it is appropriate to do so. Furthermore, the partition bus employs such mechanisms ring buffers, transfer pages, and memory map changes to transfer information (requests and data). Furthermore, it uses policy agents to decide when information should be transferred or when devices should be shared among partitions. Lastly, it employs various mechanisms to ensure smooth integration between partitions, which includes remote services that have proxy devices and device versioning functionalities.
    • 提供了一种在虚拟机环境中集成分区的方法和系统。 具体地说,提供了分区总线,其中分区总线以这样的方式可操作地连接分区,使得其用作数据传输机制,允许分区之间的数据传输和设备共享。 分区总线依赖于虚拟化软件,以便建立自身并建立分区之间的通信通道,并将中断注入适当的分区。 此外,分区总线使用环形缓冲器,传送页面和存储器映射变化来传送信息(请求和数据)。 此外,它使用策略代理来决定何时应该传输信息,或者在分区之间共享设备。 最后,它采用各种机制来确保分区之间的平滑集成,其中包括具有代理设备和设备版本控制功能的远程服务。
    • 7. 发明授权
    • System and method for the logical substitution of processor control in an emulated computing environment
    • 用于仿真计算环境中处理器控制的逻辑替换的系统和方法
    • US07275028B2
    • 2007-09-25
    • US09906392
    • 2001-07-16
    • Eric P. Traut
    • Eric P. Traut
    • G06F9/455G06F9/46G06F9/30G06F17/50
    • G06F9/45558G06F2009/45583
    • In an emulated computing environment, a method is provided for logically decoupling the host operating system from the processor of the computer system with respect to certain processor settings of the processor. A hypervisor of the emulation program replaces some of the processor settings of the processor with processor settings associated with software routines or data structures provided by the guest operating system. The replaced processor settings are written to memory. During this period, when the processor calls a software routine or accesses a data structure associated with the replaced processor setting, the processor will call or access a software routine or access a data structure associated with the guest operating system, bypassing the host operating system and communicating directly with the guest operating system. When the host operating system is to be recoupled to the processor, the processor settings that have been saved to memory are rewritten to the appropriate registers of the processor. During the period that the hypervisor is coupled to the processor, the page table of the hypervisor is established such that it largely mirrors the page table of the guest operating system. If a change to the page table of the guest operating system causes a conflict between the page table of the guest operating system and the page table of the hypervisor, the page table of the hypervisor is reallocated in a manner that is transparent to the guest operating system.
    • 在仿真的计算环境中,提供了一种用于相对于处理器的某些处理器设置将主机操作系统与计算机系统的处理器逻辑去耦的方法。 仿真程序的虚拟机管理程序用与客户机操作系统提供的软件例程或数据结构相关联的处理器设置替代处理器的一些处理器设置。 已更换的处理器设置将写入存储器。 在此期间,当处理器调用软件程序或访问与替换的处理器设置相关联的数据结构时,处理器将呼叫或访问软件程序或访问与客户操作系统相关联的数据结构,绕过主机操作系统,以及 与客户操作系统直接通信。 当主机操作系统要重新连接到处理器时,已经保存到存储器的处理器设置被重写到处理器的相应寄存器。 在管理程序耦合到处理器的期间,管理程序的页表被建立,使得它很大程度上反映客户操作系统的页表。 如果对客户操作系统的页表的更改导致客户机操作系统的页表和虚拟机管理程序的页表之间的冲突,则虚拟机管理程序的页表以对客户操作透明的方式重新分配 系统。
    • 8. 发明授权
    • Method for monitoring and emulating privileged instructions of programs in a virtual machine
    • 用于监视和仿真虚拟机中程序的特权指令的方法
    • US07210144B2
    • 2007-04-24
    • US10211148
    • 2002-08-02
    • Eric P. Traut
    • Eric P. Traut
    • G06F9/455G06F9/46G06F12/00G06F12/14G06F17/30
    • G06F11/3466G06F9/45554G06F2201/865G06F2201/88
    • A method for monitoring and emulating privileged instructions of a program that is being executed at a privilege level in a virtual machine is disclosed. A privilege level associated with a received instruction is determined. The instruction privilege level is compared to the program execution privilege level. If the instruction privilege level is valid with respect to the program execution privilege level, the instruction is executed. If the instruction privilege level is invalid with respect to the program execution privilege level: the instruction result is emulated; the number of times the instruction has been received from the program is checked; and if the instruction has been received more than a specified number of times, the instruction is overwritten with one or more instructions with a valid privilege level with respect to the program execution privilege level.
    • 公开了一种用于监视和模拟正在虚拟机中的特权级别执行的程序的特许指令的方法。 确定与接收到的指令相关联的特权级别。 指令权限级别与程序执行权限级别进行比较。 如果指令权限级别对程序执行权限级别有效,则执行指令。 如果指令权限级别相对于程序执行权限级别无效,则指令结果被仿真; 检查从程序接收到指令的次数; 并且如果指令已被接收多于指定次数,则指令被相对于程序执行权限级别的具有有效特权级别的一个或多个指令覆盖。
    • 9. 发明授权
    • Migrating a virtual machine to a target machine
    • 将虚拟机迁移到目标计算机
    • US08566824B2
    • 2013-10-22
    • US12917312
    • 2010-11-01
    • Eric P. Traut
    • Eric P. Traut
    • G06F9/455G06F21/00
    • G06F11/2025G06F11/1438G06F11/2038G06F11/2097
    • The present invention is directed to systems and methods for providing disaster recovery services using virtual machines. The invention provides an inexpensive and minimally intrusive way to provide disaster recovery services including recovery of the state of computer processors and devices. The system includes a production host and a backup host that communicate via a communications link. The state of the processor and devices on the production host are periodically stored onto backup host and can be restored in the event of an emergency. Additionally, the invention includes two business methods for utilizing the system and methods for providing disaster recovery services.
    • 本发明涉及使用虚拟机提供灾难恢复服务的系统和方法。 本发明提供了廉价和最小的侵入方式来提供灾难恢复服务,包括恢复计算机处理器和设备的状态。 该系统包括通过通信链路进行通信的生产主机和备份主机。 处理器和生产主机上的设备的状态会定期存储在备份主机上,并在紧急情况下恢复。 此外,本发明包括利用系统的两种业务方法和用于提供灾难恢复服务的方法。