会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Managing latency introduced by virtualization
    • 管理由虚拟化引入的延迟
    • US08719823B2
    • 2014-05-06
    • US12397914
    • 2009-03-04
    • Pratap SubrahmanyamCarl A. WaldspurgerVyacheslav MalyuginTal Garfinkel
    • Pratap SubrahmanyamCarl A. WaldspurgerVyacheslav MalyuginTal Garfinkel
    • G06F9/455G06F9/46
    • G06F9/4881G06F9/45533G06F9/4887
    • A component manages and minimizes latency introduced by virtualization. The virtualization component determines that a currently scheduled guest process has executed functionality responsive to which the virtualization component is to execute a virtualization based operation, wherein the virtualization based operation is one that is not visible to the guest operating system. The virtualization component causes the guest operating system to de-schedule the currently scheduled guest process and schedule at least one separate guest process. The virtualization component then executes the virtualization based operation concurrently with the execution of the at least one separate guest process. Responsive to completing the execution of the virtualization based operation, the virtualization component causes the guest operating system to re-schedule the de-scheduled guest process.
    • 组件管理并最小化由虚拟化引入的延迟。 虚拟化组件确定当前调度的访客进程已经执行响应于虚拟化组件将执行基于虚拟化的操作的功能,其中基于虚拟化的操作是客户操作系统不可见的。 虚拟化组件使客户机操作系统取消调度当前调度的客户机进程并调度至少一个单独的客户机进程。 然后,虚拟化组件与至少一个独立的客户进程的执行同时执行基于虚拟化的操作。 响应于完成基于虚拟化的操作的执行,虚拟化组件使得客户机操作系统重新安排未排程的访客进程。
    • 8. 发明授权
    • Isolating data within a computer system using private shadow mappings
    • 使用私有阴影映射隔离计算机系统内的数据
    • US09274974B1
    • 2016-03-01
    • US11584178
    • 2006-10-20
    • Xiaoxin ChenCarl A. WaldspurgerPratap Subrahmanyam
    • Xiaoxin ChenCarl A. WaldspurgerPratap Subrahmanyam
    • G06F12/10
    • G06F9/45558G06F12/109G06F12/1491G06F2009/45583G06F2212/1052G06F2212/151G06F2212/657
    • Virtualization software establishes multiple execution environments within a virtual machine, wherein software modules executing in one environment cannot access private memory of another environment. A separate set of shadow memory address mappings is maintained for each execution environment. For example, a separate shadow page table may be maintained for each execution environment. The virtualization software ensures that the shadow address mappings for one execution environment do not map to the physical memory pages that contain the private code or data of another execution environment. When execution switches from one execution environment to another, the virtualization software activates the shadow address mappings for the new execution environment. A similar approach, using separate mappings, may also be used to prevent software modules in one execution environment from accessing the private disk space or other secondary storage of another execution environment.
    • 虚拟化软件在虚拟机内建立多个执行环境,其中在一个环境中执行的软件模块不能访问另一环境的专用内存。 为每个执行环境维护一组单独的影子内存地址映射。 例如,可以为每个执行环境维护单独的影子页表。 虚拟化软件确保一个执行环境的影子地址映射不映射到包含其他执行环境的私有代码或数据的物理内存页面。 当执行从一个执行环境切换到另一个执行环境时,虚拟化软件会激活新执行环境的影子地址映射。 使用单独映射的类似方法也可用于防止一个执行环境中的软件模块访问另一个执行环境的专用磁盘空间或其他辅助存储。
    • 9. 发明授权
    • Dynamic verification of validity of executable code
    • 动态验证可执行代码的有效性
    • US07984304B1
    • 2011-07-19
    • US10791602
    • 2004-03-02
    • Carl A. WaldspurgerOle AgesenXiaoxin ChenJohn R. ZedlewskiTal Garfinkel
    • Carl A. WaldspurgerOle AgesenXiaoxin ChenJohn R. ZedlewskiTal Garfinkel
    • G06F11/30G06F12/14
    • G06F21/565
    • Computer-executable instructions in a computer are verified dynamically, after they have been identified for submission for execution, but before they are actually executed. In particular, for at least one current instruction that has been identified for submission to the processor for execution, an identifying value, for example, a hash value, is determined for a current memory block that contains the current instruction. The identifying value of the current memory block is then compared with a set of reference values. If the identifying value satisfies a validation condition, then execution of the current instruction by the processor is allowed. If the validation condition is not satisfied, then a response is generated: In the common case, execution of the current instruction is not allowed, or some other predetermined measure is taken.
    • 计算机中的计算机可执行指令在被识别为提交执行之后但在实际执行之前被动态地验证。 特别地,对于已被识别用于提交给处理器以执行的至少一个当前指令,为包含当前指令的当前存储块确定标识值,例如哈希值。 然后将当前存储器块的识别值与一组参考值进行比较。 如果识别值满足验证条件,则允许由处理器执行当前指令。 如果验证条件不满足,则产生响应:在常见情况下,不允许执行当前指令,或者采取其他一些预定措施。