Patent application number | Description | Published |
20100005267 | Memory management for hypervisor loading - Techniques related to personal computers and devices sharing similar architectures are disclosed. Particularly shown is a system and method for enabling improved performance and security in hypervisor programs and related applications programs achieved through the use of multiple non-volatile memories. | 01-07-2010 |
20100057982 | Hypervisor security using SMM - Methods, systems, apparatuses and program products are disclosed for protecting computers and similar equipment from undesirable occurrences, especially attacks by malware. Invariant information, such as pure code and some data tables may be enrolled for later revalidation by code operating outside the normal context. For example, a periodic interrupt may invoked a system management mode interrupt service routine to discover whether code regions accessible to Protected Mode programs have become corrupted or otherwise changed, such as by tampering from untrusted or untrustworthy programs that have easy access only to protected mode operation. | 03-04-2010 |
20120084487 | System and Method for Controlling the Input/Output of a Virtualized Network - In accordance with an embodiment a method of running a virtual machine on a server includes controlling data path resources allocated to the virtual machine using a first supervisory process running on the server, controlling data path resources comprising controlling a data path of a hardware interface device coupled to the server, and controlling control path and initialization resources of the hardware interface device using a second process running on the server, where the second process is separate from the first supervisory process. | 04-05-2012 |
20120324442 | System and Method for an In-Server Virtual Switch - In accordance with an embodiment, a data processing system includes a processor, a memory, and an interface port configured to be coupled to a hardware network interface device. The processor is configured to run a process that maps network switching functions of each of a plurality of virtual machines to the hardware network interface device. | 12-20-2012 |
Patent application number | Description | Published |
20080256539 | Fault Tolerant and Hang Resistant Media Processing Applications - Techniques for playing a media file in a multimedia application include launching a multimedia application as one process and automatically launching a pipeline of one or more media processing components as one or more isolated processes. In this manner, any untrustworthy components can be executed in an isolated process that is separate from the execution process of the multimedia application, thereby improving fault tolerance and hang resistance. | 10-16-2008 |
20090006862 | Provisioning a computing system for digital rights management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage. | 01-01-2009 |
20090142044 | Systems and Methods for Enhancing a User's DVD Experience - Methods, systems and architectures for enhancing a user's DVD experience are described. In one embodiment, the physical structure (e.g. titles and chapters) of a DVD is ascertained and a playlist structure shell that represents the DVD's physical structure is built. Metadata associated with the DVD is acquired and used to populate the playlist structure shell. In some embodiments, the metadata can be acquired from a metadata source external to the DVD and/or remote from a computing device on which the DVD is being played. Remote locations can include, without limitation, those that are network- or Internet-accessible. Once the playlist structure shell is populated, it can be used to render a playlist associated with the DVD's video in an area of a user interface display. In some embodiments, a DVD's video can be rendered in a first area of the user interface display and the playlist can be rendered in a second area of the user interface display during at least some of the time that the DVD's video is rendered in the first area. | 06-04-2009 |
20090158036 | PROTECTED COMPUTING ENVIRONMENT - A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device, establishing a security state for the kernel based on the validation, creating a secure process and loading a software component into the secure process, periodically checking the security state of the kernel, and notifying the secure process when the security state of the kernel has changed. | 06-18-2009 |
20090257597 | Protocol for Protecting Third Party Cryptographic Keys - A protocol is provided that permits a third-party key issuing entity to have its issued keys protected by an unrelated key protecting entity. In at least some embodiments, a trusted key protecting entity is injected, in a sense, in a conversation between the third-party key issuing entity and a client to which one or more keys are distributed. The trusted key protecting entity is able to apply various protections which, in at least some embodiments are unknown to the key issuing entity, to a distributed key which can then be used by the client to access protected content. | 10-15-2009 |
20090271319 | Embedded Licenses for Content - In accordance with one or more aspects, a license for content is retrieved, the license having been previously embedded in the content. A requested action is allowed to be performed with the content only if a standalone license, or both a leaf license and a root license, indicate that the action with the content is permissible. Leaf licenses and/or standalone licenses can be embedded by a source of the content and/or by a target device that receives the content. Additionally, licenses can include one or more rules indicating where a target device that receives the content is to store the licenses. | 10-29-2009 |
20090307254 | Translating DRM System Requirements - Various embodiments provide a mapping layer to translate DRM system requirements from one DRM system, such as a source system, to another DRM system, such as a target system. In at least some embodiments, DRM system requirement translation is performed using a signed data structure that maps DRM system requirements from one DRM system to one or more other DRM systems. By mapping DRM system requirements from one system to another, licenses associated with DRM-protected content and associated content can be safely transferred between systems. | 12-10-2009 |
20140173750 | Provisioning a Computing System for Digital Rights Management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage. | 06-19-2014 |