







| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/165,597US20030229794A1 (en) | 2002-06-07 | 2002-06-07 | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
| AU2003231237AAU2003231237A1 (en) | 2002-06-07 | 2003-05-01 | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
| RU2004139086/09ARU2313126C2 (en) | 2002-06-07 | 2003-05-01 | System and method for protection from non-trusted system control mode code by means of redirection of system management mode interrupt and creation of virtual machine container |
| EP03724373AEP1512074A2 (en) | 2002-06-07 | 2003-05-01 | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
| CNB038188236ACN100377092C (en) | 2002-06-07 | 2003-05-01 | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
| JP2004511985AJP4708016B2 (en) | 2002-06-07 | 2003-05-01 | System and method for protection against unreliable system management code by re-instructing system management instructions and creating virtual machine containers |
| PCT/US2003/013616WO2003104981A2 (en) | 2002-06-07 | 2003-05-01 | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
| MYPI20032123AMY146723A (en) | 2002-06-07 | 2003-06-06 | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
| US11/095,855US7581219B2 (en) | 2002-06-07 | 2005-03-30 | Transitioning between virtual machine monitor domains in a virtual machine environment |
| JP2007150997AJP4846660B2 (en) | 2002-06-07 | 2007-06-06 | How to protect against untrusted system management code by re-ordering system management interrupts and creating virtual machine containers |
| JP2011178882AJP5242747B2 (en) | 2002-06-07 | 2011-08-18 | How to protect against untrusted system management code by re-ordering system management interrupts and creating virtual machine containers |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/165,597US20030229794A1 (en) | 2002-06-07 | 2002-06-07 | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/095,855Continuation-In-PartUS7581219B2 (en) | 2002-06-07 | 2005-03-30 | Transitioning between virtual machine monitor domains in a virtual machine environment |
| Publication Number | Publication Date |
|---|---|
| US20030229794A1true US20030229794A1 (en) | 2003-12-11 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/165,597AbandonedUS20030229794A1 (en) | 2002-06-07 | 2002-06-07 | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
| US11/095,855Expired - LifetimeUS7581219B2 (en) | 2002-06-07 | 2005-03-30 | Transitioning between virtual machine monitor domains in a virtual machine environment |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/095,855Expired - LifetimeUS7581219B2 (en) | 2002-06-07 | 2005-03-30 | Transitioning between virtual machine monitor domains in a virtual machine environment |
| Country | Link |
|---|---|
| US (2) | US20030229794A1 (en) |
| EP (1) | EP1512074A2 (en) |
| JP (3) | JP4708016B2 (en) |
| CN (1) | CN100377092C (en) |
| AU (1) | AU2003231237A1 (en) |
| MY (1) | MY146723A (en) |
| RU (1) | RU2313126C2 (en) |
| WO (1) | WO2003104981A2 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040172629A1 (en)* | 2003-02-28 | 2004-09-02 | Azul Systems | Segmented virtual machine |
| US20040250110A1 (en)* | 2003-03-28 | 2004-12-09 | Wray Michael John | Security policy in trusted computing systems |
| US20040268332A1 (en)* | 2003-04-23 | 2004-12-30 | Masato Mitsumori | Memory access control method and processing system with memory access check function |
| US20050097345A1 (en)* | 2003-10-29 | 2005-05-05 | Kelley Brian H. | System for selectively enabling operating modes of a device |
| US20050257243A1 (en)* | 2004-04-27 | 2005-11-17 | Microsoft Corporation | Method and system for enforcing a security policy via a security virtual machine |
| US20050289311A1 (en)* | 2004-06-29 | 2005-12-29 | David Durham | System and method for secure inter-platform and intra-platform communications |
| US20060021029A1 (en)* | 2004-06-29 | 2006-01-26 | Brickell Ernie F | Method of improving computer security through sandboxing |
| US20060075312A1 (en)* | 2004-09-30 | 2006-04-06 | Fischer Stephen A | System and method for limiting exposure of hardware failure information for a secured execution environment |
| US20060224685A1 (en)* | 2005-03-29 | 2006-10-05 | International Business Machines Corporation | System management architecture for multi-node computer system |
| US20070038997A1 (en)* | 2005-08-09 | 2007-02-15 | Steven Grobman | Exclusive access for secure audio program |
| US20070050764A1 (en)* | 2005-08-30 | 2007-03-01 | Microsoft Corporation | Hierarchical virtualization with a multi-level virtualization mechanism |
| US20070067590A1 (en)* | 2005-09-22 | 2007-03-22 | Uday Savagaonkar | Providing protected access to critical memory regions |
| US20070083739A1 (en)* | 2005-08-29 | 2007-04-12 | Glew Andrew F | Processor with branch predictor |
| US20080133893A1 (en)* | 2005-08-29 | 2008-06-05 | Centaurus Data Llc | Hierarchical register file |
| US20080133883A1 (en)* | 2005-08-29 | 2008-06-05 | Centaurus Data Llc | Hierarchical store buffer |
| US20080133889A1 (en)* | 2005-08-29 | 2008-06-05 | Centaurus Data Llc | Hierarchical instruction scheduler |
| US20080163331A1 (en)* | 2006-12-29 | 2008-07-03 | Datta Sham M | Reconfiguring a secure system |
| US20080216096A1 (en)* | 2005-07-15 | 2008-09-04 | Lenovo (Beijing) Limited | Virtual Computer System Supporting Trusted Computing and Method for Implementing Trusted Computation Thereon |
| US20080263679A1 (en)* | 2007-04-23 | 2008-10-23 | Microsoft Corporation | Storing information in closed computing devices |
| US20080294892A1 (en)* | 2007-05-25 | 2008-11-27 | Ingo Molnar | Method and system for a kernel lock validator |
| US7480908B1 (en) | 2005-06-24 | 2009-01-20 | Azul Systems, Inc. | Segmented virtual machine transport mechanism |
| US20090038017A1 (en)* | 2007-08-02 | 2009-02-05 | David Durham | Secure vault service for software components within an execution environment |
| GB2453652A (en)* | 2007-10-08 | 2009-04-15 | Lenovo | Implementing secure online payments by switching to a dedicated operating system (OS) |
| US20090172385A1 (en)* | 2007-12-31 | 2009-07-02 | Datta Sham M | Enabling system management mode in a secure system |
| US7620953B1 (en)* | 2004-10-05 | 2009-11-17 | Azul Systems, Inc. | System and method for allocating resources of a core space among a plurality of core virtual machines |
| US20100057982A1 (en)* | 2008-08-26 | 2010-03-04 | Phoenix Technologies Ltd | Hypervisor security using SMM |
| US7748037B2 (en) | 2005-09-22 | 2010-06-29 | Intel Corporation | Validating a memory type modification attempt |
| US20100169666A1 (en)* | 2008-12-31 | 2010-07-01 | Prashant Dewan | Methods and systems to direclty render an image and correlate corresponding user input in a secuire memory domain |
| US20110066783A1 (en)* | 2009-09-14 | 2011-03-17 | International Business Machines Corporation | Secure Handling and Routing of Message-Signaled Interrupts |
| US20110231668A1 (en)* | 2005-06-30 | 2011-09-22 | Travis Schluessler | Signed Manifest for Run-Time Verification of Software Program Identity and Integrity |
| US8099718B2 (en) | 2007-11-13 | 2012-01-17 | Intel Corporation | Method and system for whitelisting software components |
| US20120017285A1 (en)* | 2009-05-18 | 2012-01-19 | Mark A Piwonka | Systems and methods of determining a trust level from system management mode |
| US20120255004A1 (en)* | 2011-03-31 | 2012-10-04 | Mcafee, Inc. | System and method for securing access to system calls |
| WO2012135192A2 (en) | 2011-03-28 | 2012-10-04 | Mcafee, Inc. | System and method for virtual machine monitor based anti-malware security |
| KR20120111734A (en)* | 2009-12-29 | 2012-10-10 | 어드밴스드 마이크로 디바이시즈, 인코포레이티드 | Hypervisor isolation of processor cores |
| US8356297B1 (en) | 2007-03-21 | 2013-01-15 | Azul Systems, Inc. | External data source redirection in segmented virtual machine |
| US8495750B2 (en) | 2010-08-31 | 2013-07-23 | International Business Machines Corporation | Filesystem management and security system |
| US20130326288A1 (en)* | 2011-12-31 | 2013-12-05 | Shamanna M. Datta | Processor that detects when system management mode attempts to reach program code outside of protected space |
| US8813227B2 (en) | 2011-03-29 | 2014-08-19 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
| EP2782038A1 (en)* | 2013-03-19 | 2014-09-24 | STMicroelectronics (Grenoble 2) SAS | Resource management in a processor for trusted and untrusted applications |
| EP2782007A1 (en)* | 2013-03-19 | 2014-09-24 | STMicroelectronics (Grenoble 2) SAS | Launching multiple applications in containers on a processor |
| WO2014158603A1 (en)* | 2013-03-13 | 2014-10-02 | Intel Corporation | System management interrupt handling for multi-core processors |
| US8925089B2 (en) | 2011-03-29 | 2014-12-30 | Mcafee, Inc. | System and method for below-operating system modification of malicious code on an electronic device |
| US8959638B2 (en) | 2011-03-29 | 2015-02-17 | Mcafee, Inc. | System and method for below-operating system trapping and securing of interdriver communication |
| US8966624B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for securing an input/output path of an application against malware with a below-operating system security agent |
| US8966629B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for below-operating system trapping of driver loading and unloading |
| US9032525B2 (en) | 2011-03-29 | 2015-05-12 | Mcafee, Inc. | System and method for below-operating system trapping of driver filter attachment |
| US9038176B2 (en) | 2011-03-31 | 2015-05-19 | Mcafee, Inc. | System and method for below-operating system trapping and securing loading of code into memory |
| US9087199B2 (en) | 2011-03-31 | 2015-07-21 | Mcafee, Inc. | System and method for providing a secured operating system execution environment |
| US9176741B2 (en) | 2005-08-29 | 2015-11-03 | Invention Science Fund I, Llc | Method and apparatus for segmented sequential storage |
| US9223963B2 (en) | 2009-12-15 | 2015-12-29 | Mcafee, Inc. | Systems and methods for behavioral sandboxing |
| US9262246B2 (en) | 2011-03-31 | 2016-02-16 | Mcafee, Inc. | System and method for securing memory and storage of an electronic device with a below-operating system security agent |
| US9317690B2 (en) | 2011-03-28 | 2016-04-19 | Mcafee, Inc. | System and method for firmware based anti-malware security |
| JP2016511872A (en)* | 2013-01-22 | 2016-04-21 | アマゾン・テクノロジーズ、インコーポレイテッド | Privileged cryptographic services in a virtualized environment |
| US9367691B2 (en) | 2012-07-31 | 2016-06-14 | Hewlett-Packard Development Company, L.P. | Modify executable bits of system management memory page table |
| US20160350215A1 (en)* | 2014-12-13 | 2016-12-01 | Via Alliance Semiconductor Co., Ltd. | Distributed hang recovery logic |
| US20160350223A1 (en)* | 2014-12-13 | 2016-12-01 | Via Alliance Semiconductor Co., Ltd. | Logic analyzer for detecting hangs |
| US9529627B2 (en) | 2013-03-19 | 2016-12-27 | Stmicroelectronics (Grenoble 2) Sas | Managing multiple systems in a computer device |
| US20170098092A1 (en)* | 2015-10-06 | 2017-04-06 | Symantec Corporation | Techniques for generating a virtual private container |
| US20170192804A1 (en)* | 2014-09-30 | 2017-07-06 | Amazon Technologies, Inc. | Threading as a service |
| US9946651B2 (en)* | 2014-12-13 | 2018-04-17 | Via Alliance Semiconductor Co., Ltd | Pattern detector for detecting hangs |
| CN108292339A (en)* | 2016-01-26 | 2018-07-17 | 惠普发展公司,有限责任合伙企业 | System Management Mode privilege framework |
| US10102040B2 (en) | 2016-06-29 | 2018-10-16 | Amazon Technologies, Inc | Adjusting variable limit on concurrent code executions |
| US10108443B2 (en) | 2014-09-30 | 2018-10-23 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
| US10140139B1 (en)* | 2012-06-19 | 2018-11-27 | Bromium, Inc. | Ensuring the privacy and integrity of a hypervisor |
| US10162672B2 (en) | 2016-03-30 | 2018-12-25 | Amazon Technologies, Inc. | Generating data streams from pre-existing data sets |
| US10162688B2 (en) | 2014-09-30 | 2018-12-25 | Amazon Technologies, Inc. | Processing event messages for user requests to execute program code |
| US10203990B2 (en) | 2016-06-30 | 2019-02-12 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
| CN109542610A (en)* | 2018-12-04 | 2019-03-29 | 中国航空工业集团公司西安航空计算技术研究所 | A kind of multi partition operating system void interrupt criteria component realization method |
| US10277708B2 (en) | 2016-06-30 | 2019-04-30 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
| US10282229B2 (en) | 2016-06-28 | 2019-05-07 | Amazon Technologies, Inc. | Asynchronous task management in an on-demand network code execution environment |
| US10353746B2 (en) | 2014-12-05 | 2019-07-16 | Amazon Technologies, Inc. | Automatic determination of resource sizing |
| US10353678B1 (en) | 2018-02-05 | 2019-07-16 | Amazon Technologies, Inc. | Detecting code characteristic alterations due to cross-service calls |
| US10365985B2 (en) | 2015-12-16 | 2019-07-30 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
| CN110084039A (en)* | 2013-04-19 | 2019-08-02 | Nicira股份有限公司 | Frame for the coordination between endpoint security and Network Security Service |
| US10387177B2 (en) | 2015-02-04 | 2019-08-20 | Amazon Technologies, Inc. | Stateful virtual compute system |
| US10437629B2 (en) | 2015-12-16 | 2019-10-08 | Amazon Technologies, Inc. | Pre-triggers for code execution environments |
| US10528390B2 (en) | 2016-09-23 | 2020-01-07 | Amazon Technologies, Inc. | Idempotent task execution in on-demand network code execution systems |
| US10552193B2 (en) | 2015-02-04 | 2020-02-04 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
| US10564946B1 (en) | 2017-12-13 | 2020-02-18 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
| US10579405B1 (en)* | 2013-03-13 | 2020-03-03 | Amazon Technologies, Inc. | Parallel virtual machine managers |
| US10592269B2 (en) | 2014-09-30 | 2020-03-17 | Amazon Technologies, Inc. | Dynamic code deployment and versioning |
| US10623476B2 (en) | 2015-04-08 | 2020-04-14 | Amazon Technologies, Inc. | Endpoint management system providing an application programming interface proxy service |
| US10691498B2 (en) | 2015-12-21 | 2020-06-23 | Amazon Technologies, Inc. | Acquisition and maintenance of compute capacity |
| US10725752B1 (en) | 2018-02-13 | 2020-07-28 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
| US10733085B1 (en) | 2018-02-05 | 2020-08-04 | Amazon Technologies, Inc. | Detecting impedance mismatches due to cross-service calls |
| US10754701B1 (en) | 2015-12-16 | 2020-08-25 | Amazon Technologies, Inc. | Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions |
| US10776091B1 (en) | 2018-02-26 | 2020-09-15 | Amazon Technologies, Inc. | Logging endpoint in an on-demand code execution system |
| US10776171B2 (en) | 2015-04-08 | 2020-09-15 | Amazon Technologies, Inc. | Endpoint management system and virtual compute system |
| US10824484B2 (en) | 2014-09-30 | 2020-11-03 | Amazon Technologies, Inc. | Event-driven computing |
| US10831898B1 (en) | 2018-02-05 | 2020-11-10 | Amazon Technologies, Inc. | Detecting privilege escalations in code including cross-service calls |
| US10884812B2 (en) | 2018-12-13 | 2021-01-05 | Amazon Technologies, Inc. | Performance-based hardware emulation in an on-demand network code execution system |
| US10884802B2 (en) | 2014-09-30 | 2021-01-05 | Amazon Technologies, Inc. | Message-based computation request scheduling |
| US10884722B2 (en) | 2018-06-26 | 2021-01-05 | Amazon Technologies, Inc. | Cross-environment application of tracing information for improved code execution |
| US10884787B1 (en) | 2016-09-23 | 2021-01-05 | Amazon Technologies, Inc. | Execution guarantees in an on-demand network code execution system |
| US10891145B2 (en) | 2016-03-30 | 2021-01-12 | Amazon Technologies, Inc. | Processing pre-existing data sets at an on demand code execution environment |
| US10908927B1 (en) | 2019-09-27 | 2021-02-02 | Amazon Technologies, Inc. | On-demand execution of object filter code in output path of object storage service |
| US10915371B2 (en) | 2014-09-30 | 2021-02-09 | Amazon Technologies, Inc. | Automatic management of low latency computational capacity |
| US10942795B1 (en) | 2019-11-27 | 2021-03-09 | Amazon Technologies, Inc. | Serverless call distribution to utilize reserved capacity without inhibiting scaling |
| US10949237B2 (en) | 2018-06-29 | 2021-03-16 | Amazon Technologies, Inc. | Operating system customization in an on-demand network code execution system |
| WO2021080601A1 (en)* | 2019-10-25 | 2021-04-29 | Hewlett-Packard Development Company, L.P. | Integrity monitor |
| US10996961B2 (en) | 2019-09-27 | 2021-05-04 | Amazon Technologies, Inc. | On-demand indexing of data in input path of object storage service |
| CN112800431A (en)* | 2020-08-28 | 2021-05-14 | 支付宝(杭州)信息技术有限公司 | Method and device for safely entering trusted execution environment in hyper-thread scene |
| US11010188B1 (en) | 2019-02-05 | 2021-05-18 | Amazon Technologies, Inc. | Simulated data object storage using on-demand computation of data objects |
| US11016815B2 (en) | 2015-12-21 | 2021-05-25 | Amazon Technologies, Inc. | Code execution request routing |
| US11023311B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | On-demand code execution in input path of data uploaded to storage service in multiple data portions |
| US11023416B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | Data access control system for object storage service based on owner-defined code |
| US11055112B2 (en) | 2019-09-27 | 2021-07-06 | Amazon Technologies, Inc. | Inserting executions of owner-specified code into input/output path of object storage service |
| US11099870B1 (en) | 2018-07-25 | 2021-08-24 | Amazon Technologies, Inc. | Reducing execution times in an on-demand network code execution system using saved machine states |
| US11099917B2 (en) | 2018-09-27 | 2021-08-24 | Amazon Technologies, Inc. | Efficient state maintenance for execution environments in an on-demand code execution system |
| US11106477B2 (en) | 2019-09-27 | 2021-08-31 | Amazon Technologies, Inc. | Execution of owner-specified code during input/output path to object storage service |
| US11115404B2 (en) | 2019-06-28 | 2021-09-07 | Amazon Technologies, Inc. | Facilitating service connections in serverless code executions |
| US11119826B2 (en) | 2019-11-27 | 2021-09-14 | Amazon Technologies, Inc. | Serverless call distribution to implement spillover while avoiding cold starts |
| US11119813B1 (en) | 2016-09-30 | 2021-09-14 | Amazon Technologies, Inc. | Mapreduce implementation using an on-demand network code execution system |
| US11119809B1 (en) | 2019-06-20 | 2021-09-14 | Amazon Technologies, Inc. | Virtualization-based transaction handling in an on-demand network code execution system |
| US11132213B1 (en) | 2016-03-30 | 2021-09-28 | Amazon Technologies, Inc. | Dependency-based process of pre-existing data sets at an on demand code execution environment |
| US11146569B1 (en) | 2018-06-28 | 2021-10-12 | Amazon Technologies, Inc. | Escalation-resistant secure network services using request-scoped authentication information |
| US11159528B2 (en) | 2019-06-28 | 2021-10-26 | Amazon Technologies, Inc. | Authentication to network-services using hosted authentication information |
| US11171983B2 (en)* | 2018-06-29 | 2021-11-09 | Intel Corporation | Techniques to provide function-level isolation with capability-based security |
| US11190609B2 (en) | 2019-06-28 | 2021-11-30 | Amazon Technologies, Inc. | Connection pooling for scalable network services |
| US11188391B1 (en) | 2020-03-11 | 2021-11-30 | Amazon Technologies, Inc. | Allocating resources to on-demand code executions under scarcity conditions |
| CN113826072A (en)* | 2019-05-16 | 2021-12-21 | 微软技术许可有限责任公司 | Code Updates in System Administration Mode |
| US11243953B2 (en) | 2018-09-27 | 2022-02-08 | Amazon Technologies, Inc. | Mapreduce implementation in an on-demand network code execution system and stream data processing system |
| US11250007B1 (en) | 2019-09-27 | 2022-02-15 | Amazon Technologies, Inc. | On-demand execution of object combination code in output path of object storage service |
| US11263220B2 (en) | 2019-09-27 | 2022-03-01 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
| US11360948B2 (en) | 2019-09-27 | 2022-06-14 | Amazon Technologies, Inc. | Inserting owner-specified data processing pipelines into input/output path of object storage service |
| US11386230B2 (en) | 2019-09-27 | 2022-07-12 | Amazon Technologies, Inc. | On-demand code obfuscation of data in input path of object storage service |
| US11388210B1 (en) | 2021-06-30 | 2022-07-12 | Amazon Technologies, Inc. | Streaming analytics using a serverless compute system |
| US11394761B1 (en) | 2019-09-27 | 2022-07-19 | Amazon Technologies, Inc. | Execution of user-submitted code on a stream of data |
| US11416628B2 (en) | 2019-09-27 | 2022-08-16 | Amazon Technologies, Inc. | User-specific data manipulation system for object storage service based on user-submitted code |
| US11449601B2 (en)* | 2020-01-08 | 2022-09-20 | Red Hat, Inc. | Proof of code compliance and protected integrity using a trusted execution environment |
| US11550944B2 (en) | 2019-09-27 | 2023-01-10 | Amazon Technologies, Inc. | Code execution environment customization system for object storage service |
| US11550713B1 (en) | 2020-11-25 | 2023-01-10 | Amazon Technologies, Inc. | Garbage collection in distributed systems using life cycled storage roots |
| US11593270B1 (en) | 2020-11-25 | 2023-02-28 | Amazon Technologies, Inc. | Fast distributed caching using erasure coded object parts |
| US20230061511A1 (en)* | 2021-08-30 | 2023-03-02 | International Business Machines Corporation | Inaccessible prefix pages during virtual machine execution |
| US11656892B1 (en) | 2019-09-27 | 2023-05-23 | Amazon Technologies, Inc. | Sequential execution of user-submitted code and native functions |
| US11714682B1 (en) | 2020-03-03 | 2023-08-01 | Amazon Technologies, Inc. | Reclaiming computing resources in an on-demand code execution system |
| US11775640B1 (en) | 2020-03-30 | 2023-10-03 | Amazon Technologies, Inc. | Resource utilization-based malicious task detection in an on-demand code execution system |
| US11861386B1 (en) | 2019-03-22 | 2024-01-02 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
| US11875173B2 (en) | 2018-06-25 | 2024-01-16 | Amazon Technologies, Inc. | Execution of auxiliary functions in an on-demand network code execution system |
| US11943093B1 (en) | 2018-11-20 | 2024-03-26 | Amazon Technologies, Inc. | Network connection recovery after virtual machine transition in an on-demand network code execution system |
| US11968280B1 (en) | 2021-11-24 | 2024-04-23 | Amazon Technologies, Inc. | Controlling ingestion of streaming data to serverless function executions |
| US12015603B2 (en) | 2021-12-10 | 2024-06-18 | Amazon Technologies, Inc. | Multi-tenant mode for serverless code execution |
| US12327133B1 (en) | 2019-03-22 | 2025-06-10 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
| US12381878B1 (en) | 2023-06-27 | 2025-08-05 | Amazon Technologies, Inc. | Architecture for selective use of private paths between cloud services |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8041761B1 (en)* | 2002-12-23 | 2011-10-18 | Netapp, Inc. | Virtual filer and IP space based IT configuration transitioning framework |
| CN100349123C (en)* | 2004-03-02 | 2007-11-14 | 英特维数位科技股份有限公司 | Method for Remotely Controlling Computer System |
| US7305592B2 (en)* | 2004-06-30 | 2007-12-04 | Intel Corporation | Support for nested fault in a virtual machine environment |
| US7757231B2 (en) | 2004-12-10 | 2010-07-13 | Intel Corporation | System and method to deprivilege components of a virtual machine monitor |
| US9785485B2 (en)* | 2005-07-27 | 2017-10-10 | Intel Corporation | Virtualization event processing in a layered virtualization architecture |
| US20140373144A9 (en)* | 2006-05-22 | 2014-12-18 | Alen Capalik | System and method for analyzing unauthorized intrusion into a computer network |
| US8973094B2 (en) | 2006-05-26 | 2015-03-03 | Intel Corporation | Execution of a secured environment initialization instruction on a point-to-point interconnect system |
| US7490191B2 (en)* | 2006-09-22 | 2009-02-10 | Intel Corporation | Sharing information between guests in a virtual machine environment |
| US7533207B2 (en)* | 2006-12-06 | 2009-05-12 | Microsoft Corporation | Optimized interrupt delivery in a virtualized environment |
| US9354927B2 (en) | 2006-12-21 | 2016-05-31 | Vmware, Inc. | Securing virtual machine data |
| US9098347B2 (en)* | 2006-12-21 | 2015-08-04 | Vmware | Implementation of virtual machine operations using storage system functionality |
| US9189265B2 (en) | 2006-12-21 | 2015-11-17 | Vmware, Inc. | Storage architecture for virtual machines |
| US7698507B2 (en)* | 2007-02-28 | 2010-04-13 | Intel Corporation | Protecting system management mode (SMM) spaces against cache attacks |
| JP4864817B2 (en) | 2007-06-22 | 2012-02-01 | 株式会社日立製作所 | Virtualization program and virtual computer system |
| US8151264B2 (en)* | 2007-06-29 | 2012-04-03 | Intel Corporation | Injecting virtualization events in a layered virtualization architecture |
| US20090119748A1 (en)* | 2007-08-30 | 2009-05-07 | Jiewen Yao | System management mode isolation in firmware |
| US8250641B2 (en)* | 2007-09-17 | 2012-08-21 | Intel Corporation | Method and apparatus for dynamic switching and real time security control on virtualized systems |
| JP4678396B2 (en)* | 2007-09-25 | 2011-04-27 | 日本電気株式会社 | Computer and method for monitoring virtual machine monitor, and virtual machine monitor monitor program |
| US8522236B2 (en)* | 2007-12-28 | 2013-08-27 | Intel Corporation | Method and system for establishing a robust virtualized environment |
| US8261028B2 (en)* | 2007-12-31 | 2012-09-04 | Intel Corporation | Cached dirty bits for context switch consistency checks |
| CN101970477B (en)* | 2008-03-14 | 2014-12-31 | 诺沃-诺迪斯克有限公司 | Protease-stabilized insulin analogues |
| US8145471B2 (en)* | 2008-04-30 | 2012-03-27 | International Business Machines Corporation | Non-destructive simulation of a failure in a virtualization environment |
| JP5405799B2 (en) | 2008-10-30 | 2014-02-05 | 株式会社日立製作所 | Virtual computer control method, virtualization program, and virtual computer system |
| US8205197B2 (en)* | 2008-11-12 | 2012-06-19 | Lenovo (Singapore) Pte. Ltd. | Apparatus, system, and method for granting hypervisor privileges |
| US8868925B2 (en)* | 2008-12-09 | 2014-10-21 | Nvidia Corporation | Method and apparatus for the secure processing of confidential content within a virtual machine of a processor |
| KR101571880B1 (en)* | 2009-02-02 | 2015-11-25 | 삼성전자 주식회사 | Virtualized electronic apparatus virtual machine store and method for using virtual machine service |
| JP4961459B2 (en)* | 2009-06-26 | 2012-06-27 | 株式会社日立製作所 | Virtual computer system and control method in virtual computer system |
| US8612975B2 (en)* | 2009-07-07 | 2013-12-17 | Advanced Micro Devices, Inc. | World switch between virtual machines with selective storage of state information |
| DE102009051350A1 (en)* | 2009-10-30 | 2011-05-05 | Continental Automotive Gmbh | Method of operating a tachograph and tachograph |
| US20110197256A1 (en)* | 2009-12-18 | 2011-08-11 | Assured Information Security, Inc. | Methods for securing a processing system and devices thereof |
| US8346935B2 (en)* | 2010-01-15 | 2013-01-01 | Joyent, Inc. | Managing hardware resources by sending messages amongst servers in a data center |
| US9106697B2 (en)* | 2010-06-24 | 2015-08-11 | NeurallQ, Inc. | System and method for identifying unauthorized activities on a computer system using a data structure model |
| US8555276B2 (en) | 2011-03-11 | 2013-10-08 | Joyent, Inc. | Systems and methods for transparently optimizing workloads |
| CN103748556B (en) | 2011-08-30 | 2018-02-02 | 惠普发展公司,有限责任合伙企业 | Communicating with Virtual Trusted Runtime BIOS |
| US10303501B2 (en) | 2011-08-30 | 2019-05-28 | Hewlett-Packard Development Company, L.P. | Virtual high privilege mode for a system management request |
| US8782224B2 (en) | 2011-12-29 | 2014-07-15 | Joyent, Inc. | Systems and methods for time-based dynamic allocation of resource management |
| RU2522019C1 (en)* | 2012-12-25 | 2014-07-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of detecting threat in code executed by virtual machine |
| RU2535175C2 (en)* | 2012-12-25 | 2014-12-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for detecting malware by creating isolated environment |
| US8826279B1 (en) | 2013-03-14 | 2014-09-02 | Joyent, Inc. | Instruction set architecture for compute-based object stores |
| US8881279B2 (en) | 2013-03-14 | 2014-11-04 | Joyent, Inc. | Systems and methods for zone-based intrusion detection |
| US8943284B2 (en) | 2013-03-14 | 2015-01-27 | Joyent, Inc. | Systems and methods for integrating compute resources in a storage area network |
| US8677359B1 (en)* | 2013-03-14 | 2014-03-18 | Joyent, Inc. | Compute-centric object stores and methods of use |
| US9104456B2 (en) | 2013-03-14 | 2015-08-11 | Joyent, Inc. | Zone management of compute-centric object stores |
| US9092238B2 (en) | 2013-03-15 | 2015-07-28 | Joyent, Inc. | Versioning schemes for compute-centric object stores |
| US8793688B1 (en) | 2013-03-15 | 2014-07-29 | Joyent, Inc. | Systems and methods for double hulled virtualization operations |
| US8775485B1 (en) | 2013-03-15 | 2014-07-08 | Joyent, Inc. | Object store management operations within compute-centric object stores |
| US9330035B2 (en)* | 2013-05-23 | 2016-05-03 | Arm Limited | Method and apparatus for interrupt handling |
| CN103927224B (en)* | 2014-03-28 | 2016-06-29 | 小米科技有限责任公司 | Bead performs method and apparatus |
| US20160048679A1 (en)* | 2014-08-18 | 2016-02-18 | Bitdefender IPR Management Ltd. | Systems And Methods for Exposing A Current Processor Instruction Upon Exiting A Virtual Machine |
| US9471799B2 (en)* | 2014-09-22 | 2016-10-18 | Advanced Micro Devices, Inc. | Method for privileged mode based secure input mechanism |
| US10104099B2 (en) | 2015-01-07 | 2018-10-16 | CounterTack, Inc. | System and method for monitoring a computer system using machine interpretable code |
| GB2539436B (en)* | 2015-06-16 | 2019-02-06 | Advanced Risc Mach Ltd | Secure initialisation |
| US11347529B2 (en)* | 2019-03-08 | 2022-05-31 | International Business Machines Corporation | Inject interrupts and exceptions into secure virtual machine |
| CN113791865B (en)* | 2021-09-08 | 2024-07-26 | 山石网科通信技术股份有限公司 | Container security processing method and device, storage medium and processor |
| CN113986481A (en)* | 2021-09-30 | 2022-01-28 | 深圳曦华科技有限公司 | Interrupt service instance calling method and related device |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3699532A (en)* | 1970-04-21 | 1972-10-17 | Singer Co | Multiprogramming control for a data handling system |
| US3996449A (en)* | 1975-08-25 | 1976-12-07 | International Business Machines Corporation | Operating system authenticator |
| US4162536A (en)* | 1976-01-02 | 1979-07-24 | Gould Inc., Modicon Div. | Digital input/output system and method |
| US4207609A (en)* | 1978-05-08 | 1980-06-10 | International Business Machines Corporation | Method and means for path independent device reservation and reconnection in a multi-CPU and shared device access system |
| US4247905A (en)* | 1977-08-26 | 1981-01-27 | Sharp Kabushiki Kaisha | Memory clear system |
| US4276594A (en)* | 1978-01-27 | 1981-06-30 | Gould Inc. Modicon Division | Digital computer with multi-processor capability utilizing intelligent composite memory and input/output modules and method for performing the same |
| US4278837A (en)* | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
| US4307214A (en)* | 1979-12-12 | 1981-12-22 | Phillips Petroleum Company | SC2 activation of supported chromium oxide catalysts |
| US4307447A (en)* | 1979-06-19 | 1981-12-22 | Gould Inc. | Programmable controller |
| US4319233A (en)* | 1978-11-30 | 1982-03-09 | Kokusan Denki Co., Ltd. | Device for electrically detecting a liquid level |
| US4319323A (en)* | 1980-04-04 | 1982-03-09 | Digital Equipment Corporation | Communications device for data processing system |
| US4347565A (en)* | 1978-12-01 | 1982-08-31 | Fujitsu Limited | Address control system for software simulation |
| US4366537A (en)* | 1980-05-23 | 1982-12-28 | International Business Machines Corp. | Authorization mechanism for transfer of program control or data between different address spaces having different storage protect keys |
| US4403283A (en)* | 1980-07-28 | 1983-09-06 | Ncr Corporation | Extended memory system and method |
| US4419724A (en)* | 1980-04-14 | 1983-12-06 | Sperry Corporation | Main bus interface package |
| US4430709A (en)* | 1980-09-13 | 1984-02-07 | Robert Bosch Gmbh | Apparatus for safeguarding data entered into a microprocessor |
| US4521852A (en)* | 1982-06-30 | 1985-06-04 | Texas Instruments Incorporated | Data processing device formed on a single semiconductor substrate having secure memory |
| US4571672A (en)* | 1982-12-17 | 1986-02-18 | Hitachi, Ltd. | Access control method for multiprocessor systems |
| US4759064A (en)* | 1985-10-07 | 1988-07-19 | Chaum David L | Blind unanticipated signature systems |
| US4795893A (en)* | 1986-07-11 | 1989-01-03 | Bull, Cp8 | Security device prohibiting the function of an electronic data processing unit after a first cutoff of its electrical power |
| US4802084A (en)* | 1985-03-11 | 1989-01-31 | Hitachi, Ltd. | Address translator |
| US4825052A (en)* | 1985-12-31 | 1989-04-25 | Bull Cp8 | Method and apparatus for certifying services obtained using a portable carrier such as a memory card |
| US4907272A (en)* | 1986-07-11 | 1990-03-06 | Bull Cp8 | Method for authenticating an external authorizing datum by a portable object, such as a memory card |
| US4907270A (en)* | 1986-07-11 | 1990-03-06 | Bull Cp8 | Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission line |
| US4910774A (en)* | 1987-07-10 | 1990-03-20 | Schlumberger Industries | Method and system for suthenticating electronic memory cards |
| US4975836A (en)* | 1984-12-19 | 1990-12-04 | Hitachi, Ltd. | Virtual computer system |
| US5007082A (en)* | 1988-08-03 | 1991-04-09 | Kelly Services, Inc. | Computer software encryption apparatus |
| US5022077A (en)* | 1989-08-25 | 1991-06-04 | International Business Machines Corp. | Apparatus and method for preventing unauthorized access to BIOS in a personal computer system |
| US5075842A (en)* | 1989-12-22 | 1991-12-24 | Intel Corporation | Disabling tag bit recognition and allowing privileged operations to occur in an object-oriented memory protection mechanism |
| US5079737A (en)* | 1988-10-25 | 1992-01-07 | United Technologies Corporation | Memory management unit for the MIL-STD 1750 bus |
| US5139760A (en)* | 1989-02-28 | 1992-08-18 | Mizusawa Industrial Chemicals, Ltd. | Amorphous silica-alumina spherical particles and process for preparation thereof |
| US5187802A (en)* | 1988-12-26 | 1993-02-16 | Hitachi, Ltd. | Virtual machine system with vitual machine resetting store indicating that virtual machine processed interrupt without virtual machine control program intervention |
| US5230069A (en)* | 1990-10-02 | 1993-07-20 | International Business Machines Corporation | Apparatus and method for providing private and shared access to host address and data spaces by guest programs in a virtual machine computer system |
| US5237616A (en)* | 1992-09-21 | 1993-08-17 | International Business Machines Corporation | Secure computer system having privileged and unprivileged memories |
| US5255379A (en)* | 1990-12-28 | 1993-10-19 | Sun Microsystems, Inc. | Method for automatically transitioning from V86 mode to protected mode in a computer system using an Intel 80386 or 80486 processor |
| US5287363A (en)* | 1991-07-01 | 1994-02-15 | Disk Technician Corporation | System for locating and anticipating data storage media failures |
| US5293424A (en)* | 1992-10-14 | 1994-03-08 | Bull Hn Information Systems Inc. | Secure memory card |
| US5295251A (en)* | 1989-09-21 | 1994-03-15 | Hitachi, Ltd. | Method of accessing multiple virtual address spaces and computer system |
| US5317705A (en)* | 1990-10-24 | 1994-05-31 | International Business Machines Corporation | Apparatus and method for TLB purge reduction in a multi-level machine system |
| US5319760A (en)* | 1991-06-28 | 1994-06-07 | Digital Equipment Corporation | Translation buffer for virtual machines with address space match |
| US5355490A (en)* | 1991-06-14 | 1994-10-11 | Toshiba America Information Systems, Inc. | System and method for saving the state for advanced microprocessor operating modes |
| US5361375A (en)* | 1989-02-09 | 1994-11-01 | Fujitsu Limited | Virtual computer system having input/output interrupt control of virtual machines |
| US5386552A (en)* | 1991-10-21 | 1995-01-31 | Intel Corporation | Preservation of a computer system processing state in a mass storage device |
| US5421006A (en)* | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
| US5434999A (en)* | 1988-11-09 | 1995-07-18 | Bull Cp8 | Safeguarded remote loading of service programs by authorizing loading in protected memory zones in a terminal |
| US5437033A (en)* | 1990-11-16 | 1995-07-25 | Hitachi, Ltd. | System for recovery from a virtual machine monitor failure with a continuous guest dispatched to a nonguest mode |
| US5442645A (en)* | 1989-06-06 | 1995-08-15 | Bull Cp8 | Method for checking the integrity of a program or data, and apparatus for implementing this method |
| US5455909A (en)* | 1991-07-05 | 1995-10-03 | Chips And Technologies Inc. | Microprocessor with operation capture facility |
| US5459867A (en)* | 1989-10-20 | 1995-10-17 | Iomega Corporation | Kernels, description tables, and device drivers |
| US5459869A (en)* | 1994-02-17 | 1995-10-17 | Spilo; Michael L. | Method for providing protected mode services for device drivers and other resident software |
| US5469557A (en)* | 1993-03-05 | 1995-11-21 | Microchip Technology Incorporated | Code protection in microcontroller with EEPROM fuses |
| US5473692A (en)* | 1994-09-07 | 1995-12-05 | Intel Corporation | Roving software license for a hardware agent |
| US5479509A (en)* | 1993-04-06 | 1995-12-26 | Bull Cp8 | Method for signature of an information processing file, and apparatus for implementing it |
| US5504922A (en)* | 1989-06-30 | 1996-04-02 | Hitachi, Ltd. | Virtual machine with hardware display controllers for base and target machines |
| US5506975A (en)* | 1992-12-18 | 1996-04-09 | Hitachi, Ltd. | Virtual machine I/O interrupt control method compares number of pending I/O interrupt conditions for non-running virtual machines with predetermined number |
| US5511217A (en)* | 1992-11-30 | 1996-04-23 | Hitachi, Ltd. | Computer system of virtual machines sharing a vector processor |
| US5522075A (en)* | 1991-06-28 | 1996-05-28 | Digital Equipment Corporation | Protection ring extension for computers having distinct virtual machine monitor and virtual machine address spaces |
| US5528231A (en)* | 1993-06-08 | 1996-06-18 | Bull Cp8 | Method for the authentication of a portable object by an offline terminal, and apparatus for implementing the process |
| US5533126A (en)* | 1993-04-22 | 1996-07-02 | Bull Cp8 | Key protection device for smart cards |
| US5555414A (en)* | 1994-12-14 | 1996-09-10 | International Business Machines Corporation | Multiprocessing system including gating of host I/O and external enablement to guest enablement at polling intervals |
| US5555385A (en)* | 1993-10-27 | 1996-09-10 | International Business Machines Corporation | Allocation of address spaces within virtual machine compute system |
| US5560013A (en)* | 1994-12-06 | 1996-09-24 | International Business Machines Corporation | Method of using a target processor to execute programs of a source architecture that uses multiple address spaces |
| US5564040A (en)* | 1994-11-08 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for providing a server function in a logically partitioned hardware machine |
| US5566323A (en)* | 1988-12-20 | 1996-10-15 | Bull Cp8 | Data processing system including programming voltage inhibitor for an electrically erasable reprogrammable nonvolatile memory |
| US5574936A (en)* | 1992-01-02 | 1996-11-12 | Amdahl Corporation | Access control mechanism controlling access to and logical purging of access register translation lookaside buffer (ALB) in a computer system |
| US5582717A (en)* | 1990-09-12 | 1996-12-10 | Di Santo; Dennis E. | Water dispenser with side by side filling-stations |
| US5603499A (en)* | 1995-07-26 | 1997-02-18 | Doris G. Jagosz | Blackjack play option response indicator |
| US5604805A (en)* | 1994-02-28 | 1997-02-18 | Brands; Stefanus A. | Privacy-protected transfer of electronic information |
| US5606617A (en)* | 1994-10-14 | 1997-02-25 | Brands; Stefanus A. | Secret-key certificates |
| US5615263A (en)* | 1995-01-06 | 1997-03-25 | Vlsi Technology, Inc. | Dual purpose security architecture with protected internal operating system |
| US5628022A (en)* | 1993-06-04 | 1997-05-06 | Hitachi, Ltd. | Microcomputer with programmable ROM |
| US5633929A (en)* | 1995-09-15 | 1997-05-27 | Rsa Data Security, Inc | Cryptographic key escrow system having reduced vulnerability to harvesting attacks |
| US5657445A (en)* | 1996-01-26 | 1997-08-12 | Dell Usa, L.P. | Apparatus and method for limiting access to mass storage devices in a computer system |
| US5668971A (en)* | 1992-12-01 | 1997-09-16 | Compaq Computer Corporation | Posted disk read operations performed by signalling a disk read complete to the system prior to completion of data transfer |
| US5684948A (en)* | 1995-09-01 | 1997-11-04 | National Semiconductor Corporation | Memory management circuit which provides simulated privilege levels |
| US5706469A (en)* | 1994-09-12 | 1998-01-06 | Mitsubishi Denki Kabushiki Kaisha | Data processing system controlling bus access to an arbitrary sized memory area |
| US5708818A (en)* | 1994-02-25 | 1998-01-13 | Munz; Heinrich | Method and apparatus for real-time operation of a processor |
| US5717903A (en)* | 1995-05-15 | 1998-02-10 | Compaq Computer Corporation | Method and appartus for emulating a peripheral device to allow device driver development before availability of the peripheral device |
| US5720609A (en)* | 1991-01-09 | 1998-02-24 | Pfefferle; William Charles | Catalytic method |
| US5721222A (en)* | 1992-04-16 | 1998-02-24 | Zeneca Limited | Heterocyclic ketones |
| US5729760A (en)* | 1996-06-21 | 1998-03-17 | Intel Corporation | System for providing first type access to register if processor in first mode and second type access to register if processor not in first mode |
| US5737604A (en)* | 1989-11-03 | 1998-04-07 | Compaq Computer Corporation | Method and apparatus for independently resetting processors and cache controllers in multiple processor systems |
| US5740178A (en)* | 1996-08-29 | 1998-04-14 | Lucent Technologies Inc. | Software for controlling a reliable backup memory |
| US5752046A (en)* | 1993-01-14 | 1998-05-12 | Apple Computer, Inc. | Power management system for computer device interconnection bus |
| US5757919A (en)* | 1996-12-12 | 1998-05-26 | Intel Corporation | Cryptographically protected paging subsystem |
| US5764969A (en)* | 1995-02-10 | 1998-06-09 | International Business Machines Corporation | Method and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronization |
| US5854913A (en)* | 1995-06-07 | 1998-12-29 | International Business Machines Corporation | Microprocessor with an architecture mode control capable of supporting extensions of two distinct instruction-set architectures |
| US5987604A (en)* | 1997-10-07 | 1999-11-16 | Phoenix Technologies, Ltd. | Method and apparatus for providing execution of system management mode services in virtual mode |
| US6075938A (en)* | 1997-06-10 | 2000-06-13 | The Board Of Trustees Of The Leland Stanford Junior University | Virtual machine monitors for scalable multiprocessors |
| US6182089B1 (en)* | 1997-09-23 | 2001-01-30 | Silicon Graphics, Inc. | Method, system and computer program product for dynamically allocating large memory pages of different sizes |
| US6272637B1 (en)* | 1997-04-14 | 2001-08-07 | Dallas Semiconductor Corporation | Systems and methods for protecting access to encrypted information |
| US6282650B1 (en)* | 1999-01-25 | 2001-08-28 | Intel Corporation | Secure public digital watermark |
| US6314409B2 (en)* | 1996-01-11 | 2001-11-06 | Veridian Information Solutions | System for controlling access and distribution of digital property |
| US6374317B1 (en)* | 1999-10-07 | 2002-04-16 | Intel Corporation | Method and apparatus for initializing a computer interface |
| US6397242B1 (en)* | 1998-05-15 | 2002-05-28 | Vmware, Inc. | Virtualization system including a virtual machine monitor for a computer with a segmented architecture |
| US20020099753A1 (en)* | 2001-01-20 | 2002-07-25 | Hardin David S. | System and method for concurrently supporting multiple independent virtual machines |
| US20030037089A1 (en)* | 2001-08-15 | 2003-02-20 | Erik Cota-Robles | Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor |
| US6961941B1 (en)* | 2001-06-08 | 2005-11-01 | Vmware, Inc. | Computer configuration for resource management in systems including a virtual machine |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4253145A (en)* | 1978-12-26 | 1981-02-24 | Honeywell Information Systems Inc. | Hardware virtualizer for supporting recursive virtual computer systems on a host computer system |
| WO1993009494A1 (en)* | 1991-10-28 | 1993-05-13 | Digital Equipment Corporation | Fault-tolerant computer processing using a shadow virtual processor |
| GB2282245B (en)* | 1993-09-23 | 1998-04-15 | Advanced Risc Mach Ltd | Execution of data processing instructions |
| US6181703B1 (en)* | 1995-09-08 | 2001-01-30 | Sprint Communications Company L. P. | System for managing telecommunications |
| US6093213A (en)* | 1995-10-06 | 2000-07-25 | Advanced Micro Devices, Inc. | Flexible implementation of a system management mode (SMM) in a processor |
| CA2285106A1 (en)* | 1997-04-02 | 1998-10-08 | David M. Silver | Method for integrating a virtual machine with input method editors |
| US6496847B1 (en)* | 1998-05-15 | 2002-12-17 | Vmware, Inc. | System and method for virtualizing computer systems |
| JP2002041305A (en)* | 2000-07-26 | 2002-02-08 | Hitachi Ltd | Method of allocating computer resources in virtual computer system and virtual computer system |
| US6725289B1 (en)* | 2002-04-17 | 2004-04-20 | Vmware, Inc. | Transparent address remapping for high-speed I/O |
| US7318141B2 (en)* | 2002-12-17 | 2008-01-08 | Intel Corporation | Methods and systems to control virtual machines |
| US7424709B2 (en)* | 2003-09-15 | 2008-09-09 | Intel Corporation | Use of multiple virtual machine monitors to handle privileged events |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3699532A (en)* | 1970-04-21 | 1972-10-17 | Singer Co | Multiprogramming control for a data handling system |
| US3996449A (en)* | 1975-08-25 | 1976-12-07 | International Business Machines Corporation | Operating system authenticator |
| US4162536A (en)* | 1976-01-02 | 1979-07-24 | Gould Inc., Modicon Div. | Digital input/output system and method |
| US4247905A (en)* | 1977-08-26 | 1981-01-27 | Sharp Kabushiki Kaisha | Memory clear system |
| US4278837A (en)* | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
| US4276594A (en)* | 1978-01-27 | 1981-06-30 | Gould Inc. Modicon Division | Digital computer with multi-processor capability utilizing intelligent composite memory and input/output modules and method for performing the same |
| US4207609A (en)* | 1978-05-08 | 1980-06-10 | International Business Machines Corporation | Method and means for path independent device reservation and reconnection in a multi-CPU and shared device access system |
| US4319233A (en)* | 1978-11-30 | 1982-03-09 | Kokusan Denki Co., Ltd. | Device for electrically detecting a liquid level |
| US4347565A (en)* | 1978-12-01 | 1982-08-31 | Fujitsu Limited | Address control system for software simulation |
| US4307447A (en)* | 1979-06-19 | 1981-12-22 | Gould Inc. | Programmable controller |
| US4307214A (en)* | 1979-12-12 | 1981-12-22 | Phillips Petroleum Company | SC2 activation of supported chromium oxide catalysts |
| US4319323A (en)* | 1980-04-04 | 1982-03-09 | Digital Equipment Corporation | Communications device for data processing system |
| US4419724A (en)* | 1980-04-14 | 1983-12-06 | Sperry Corporation | Main bus interface package |
| US4366537A (en)* | 1980-05-23 | 1982-12-28 | International Business Machines Corp. | Authorization mechanism for transfer of program control or data between different address spaces having different storage protect keys |
| US4403283A (en)* | 1980-07-28 | 1983-09-06 | Ncr Corporation | Extended memory system and method |
| US4430709A (en)* | 1980-09-13 | 1984-02-07 | Robert Bosch Gmbh | Apparatus for safeguarding data entered into a microprocessor |
| US4521852A (en)* | 1982-06-30 | 1985-06-04 | Texas Instruments Incorporated | Data processing device formed on a single semiconductor substrate having secure memory |
| US4571672A (en)* | 1982-12-17 | 1986-02-18 | Hitachi, Ltd. | Access control method for multiprocessor systems |
| US4975836A (en)* | 1984-12-19 | 1990-12-04 | Hitachi, Ltd. | Virtual computer system |
| US4802084A (en)* | 1985-03-11 | 1989-01-31 | Hitachi, Ltd. | Address translator |
| US4759064A (en)* | 1985-10-07 | 1988-07-19 | Chaum David L | Blind unanticipated signature systems |
| US4825052A (en)* | 1985-12-31 | 1989-04-25 | Bull Cp8 | Method and apparatus for certifying services obtained using a portable carrier such as a memory card |
| US4907270A (en)* | 1986-07-11 | 1990-03-06 | Bull Cp8 | Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission line |
| US4907272A (en)* | 1986-07-11 | 1990-03-06 | Bull Cp8 | Method for authenticating an external authorizing datum by a portable object, such as a memory card |
| US4795893A (en)* | 1986-07-11 | 1989-01-03 | Bull, Cp8 | Security device prohibiting the function of an electronic data processing unit after a first cutoff of its electrical power |
| US4910774A (en)* | 1987-07-10 | 1990-03-20 | Schlumberger Industries | Method and system for suthenticating electronic memory cards |
| US5007082A (en)* | 1988-08-03 | 1991-04-09 | Kelly Services, Inc. | Computer software encryption apparatus |
| US5079737A (en)* | 1988-10-25 | 1992-01-07 | United Technologies Corporation | Memory management unit for the MIL-STD 1750 bus |
| US5434999A (en)* | 1988-11-09 | 1995-07-18 | Bull Cp8 | Safeguarded remote loading of service programs by authorizing loading in protected memory zones in a terminal |
| US5566323A (en)* | 1988-12-20 | 1996-10-15 | Bull Cp8 | Data processing system including programming voltage inhibitor for an electrically erasable reprogrammable nonvolatile memory |
| US5187802A (en)* | 1988-12-26 | 1993-02-16 | Hitachi, Ltd. | Virtual machine system with vitual machine resetting store indicating that virtual machine processed interrupt without virtual machine control program intervention |
| US5361375A (en)* | 1989-02-09 | 1994-11-01 | Fujitsu Limited | Virtual computer system having input/output interrupt control of virtual machines |
| US5139760A (en)* | 1989-02-28 | 1992-08-18 | Mizusawa Industrial Chemicals, Ltd. | Amorphous silica-alumina spherical particles and process for preparation thereof |
| US5442645A (en)* | 1989-06-06 | 1995-08-15 | Bull Cp8 | Method for checking the integrity of a program or data, and apparatus for implementing this method |
| US5504922A (en)* | 1989-06-30 | 1996-04-02 | Hitachi, Ltd. | Virtual machine with hardware display controllers for base and target machines |
| US5022077A (en)* | 1989-08-25 | 1991-06-04 | International Business Machines Corp. | Apparatus and method for preventing unauthorized access to BIOS in a personal computer system |
| US5295251A (en)* | 1989-09-21 | 1994-03-15 | Hitachi, Ltd. | Method of accessing multiple virtual address spaces and computer system |
| US5459867A (en)* | 1989-10-20 | 1995-10-17 | Iomega Corporation | Kernels, description tables, and device drivers |
| US5737604A (en)* | 1989-11-03 | 1998-04-07 | Compaq Computer Corporation | Method and apparatus for independently resetting processors and cache controllers in multiple processor systems |
| US5075842A (en)* | 1989-12-22 | 1991-12-24 | Intel Corporation | Disabling tag bit recognition and allowing privileged operations to occur in an object-oriented memory protection mechanism |
| US5582717A (en)* | 1990-09-12 | 1996-12-10 | Di Santo; Dennis E. | Water dispenser with side by side filling-stations |
| US5230069A (en)* | 1990-10-02 | 1993-07-20 | International Business Machines Corporation | Apparatus and method for providing private and shared access to host address and data spaces by guest programs in a virtual machine computer system |
| US5317705A (en)* | 1990-10-24 | 1994-05-31 | International Business Machines Corporation | Apparatus and method for TLB purge reduction in a multi-level machine system |
| US5437033A (en)* | 1990-11-16 | 1995-07-25 | Hitachi, Ltd. | System for recovery from a virtual machine monitor failure with a continuous guest dispatched to a nonguest mode |
| US5255379A (en)* | 1990-12-28 | 1993-10-19 | Sun Microsystems, Inc. | Method for automatically transitioning from V86 mode to protected mode in a computer system using an Intel 80386 or 80486 processor |
| US5720609A (en)* | 1991-01-09 | 1998-02-24 | Pfefferle; William Charles | Catalytic method |
| US5355490A (en)* | 1991-06-14 | 1994-10-11 | Toshiba America Information Systems, Inc. | System and method for saving the state for advanced microprocessor operating modes |
| US5319760A (en)* | 1991-06-28 | 1994-06-07 | Digital Equipment Corporation | Translation buffer for virtual machines with address space match |
| US5522075A (en)* | 1991-06-28 | 1996-05-28 | Digital Equipment Corporation | Protection ring extension for computers having distinct virtual machine monitor and virtual machine address spaces |
| US5287363A (en)* | 1991-07-01 | 1994-02-15 | Disk Technician Corporation | System for locating and anticipating data storage media failures |
| US5455909A (en)* | 1991-07-05 | 1995-10-03 | Chips And Technologies Inc. | Microprocessor with operation capture facility |
| US5386552A (en)* | 1991-10-21 | 1995-01-31 | Intel Corporation | Preservation of a computer system processing state in a mass storage device |
| US5574936A (en)* | 1992-01-02 | 1996-11-12 | Amdahl Corporation | Access control mechanism controlling access to and logical purging of access register translation lookaside buffer (ALB) in a computer system |
| US5721222A (en)* | 1992-04-16 | 1998-02-24 | Zeneca Limited | Heterocyclic ketones |
| US5421006A (en)* | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
| US5237616A (en)* | 1992-09-21 | 1993-08-17 | International Business Machines Corporation | Secure computer system having privileged and unprivileged memories |
| US5293424A (en)* | 1992-10-14 | 1994-03-08 | Bull Hn Information Systems Inc. | Secure memory card |
| US5511217A (en)* | 1992-11-30 | 1996-04-23 | Hitachi, Ltd. | Computer system of virtual machines sharing a vector processor |
| US5668971A (en)* | 1992-12-01 | 1997-09-16 | Compaq Computer Corporation | Posted disk read operations performed by signalling a disk read complete to the system prior to completion of data transfer |
| US5506975A (en)* | 1992-12-18 | 1996-04-09 | Hitachi, Ltd. | Virtual machine I/O interrupt control method compares number of pending I/O interrupt conditions for non-running virtual machines with predetermined number |
| US5752046A (en)* | 1993-01-14 | 1998-05-12 | Apple Computer, Inc. | Power management system for computer device interconnection bus |
| US5469557A (en)* | 1993-03-05 | 1995-11-21 | Microchip Technology Incorporated | Code protection in microcontroller with EEPROM fuses |
| US5479509A (en)* | 1993-04-06 | 1995-12-26 | Bull Cp8 | Method for signature of an information processing file, and apparatus for implementing it |
| US5533126A (en)* | 1993-04-22 | 1996-07-02 | Bull Cp8 | Key protection device for smart cards |
| US5628022A (en)* | 1993-06-04 | 1997-05-06 | Hitachi, Ltd. | Microcomputer with programmable ROM |
| US5528231A (en)* | 1993-06-08 | 1996-06-18 | Bull Cp8 | Method for the authentication of a portable object by an offline terminal, and apparatus for implementing the process |
| US5555385A (en)* | 1993-10-27 | 1996-09-10 | International Business Machines Corporation | Allocation of address spaces within virtual machine compute system |
| US5459869A (en)* | 1994-02-17 | 1995-10-17 | Spilo; Michael L. | Method for providing protected mode services for device drivers and other resident software |
| US5708818A (en)* | 1994-02-25 | 1998-01-13 | Munz; Heinrich | Method and apparatus for real-time operation of a processor |
| US5604805A (en)* | 1994-02-28 | 1997-02-18 | Brands; Stefanus A. | Privacy-protected transfer of electronic information |
| US5473692A (en)* | 1994-09-07 | 1995-12-05 | Intel Corporation | Roving software license for a hardware agent |
| US5568552A (en)* | 1994-09-07 | 1996-10-22 | Intel Corporation | Method for providing a roving software license from one node to another node |
| US5706469A (en)* | 1994-09-12 | 1998-01-06 | Mitsubishi Denki Kabushiki Kaisha | Data processing system controlling bus access to an arbitrary sized memory area |
| US5606617A (en)* | 1994-10-14 | 1997-02-25 | Brands; Stefanus A. | Secret-key certificates |
| US5564040A (en)* | 1994-11-08 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for providing a server function in a logically partitioned hardware machine |
| US5560013A (en)* | 1994-12-06 | 1996-09-24 | International Business Machines Corporation | Method of using a target processor to execute programs of a source architecture that uses multiple address spaces |
| US5555414A (en)* | 1994-12-14 | 1996-09-10 | International Business Machines Corporation | Multiprocessing system including gating of host I/O and external enablement to guest enablement at polling intervals |
| US5615263A (en)* | 1995-01-06 | 1997-03-25 | Vlsi Technology, Inc. | Dual purpose security architecture with protected internal operating system |
| US5764969A (en)* | 1995-02-10 | 1998-06-09 | International Business Machines Corporation | Method and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronization |
| US5717903A (en)* | 1995-05-15 | 1998-02-10 | Compaq Computer Corporation | Method and appartus for emulating a peripheral device to allow device driver development before availability of the peripheral device |
| US5854913A (en)* | 1995-06-07 | 1998-12-29 | International Business Machines Corporation | Microprocessor with an architecture mode control capable of supporting extensions of two distinct instruction-set architectures |
| US5603499A (en)* | 1995-07-26 | 1997-02-18 | Doris G. Jagosz | Blackjack play option response indicator |
| US5684948A (en)* | 1995-09-01 | 1997-11-04 | National Semiconductor Corporation | Memory management circuit which provides simulated privilege levels |
| US5633929A (en)* | 1995-09-15 | 1997-05-27 | Rsa Data Security, Inc | Cryptographic key escrow system having reduced vulnerability to harvesting attacks |
| US6314409B2 (en)* | 1996-01-11 | 2001-11-06 | Veridian Information Solutions | System for controlling access and distribution of digital property |
| US5657445A (en)* | 1996-01-26 | 1997-08-12 | Dell Usa, L.P. | Apparatus and method for limiting access to mass storage devices in a computer system |
| US5729760A (en)* | 1996-06-21 | 1998-03-17 | Intel Corporation | System for providing first type access to register if processor in first mode and second type access to register if processor not in first mode |
| US5740178A (en)* | 1996-08-29 | 1998-04-14 | Lucent Technologies Inc. | Software for controlling a reliable backup memory |
| US5757919A (en)* | 1996-12-12 | 1998-05-26 | Intel Corporation | Cryptographically protected paging subsystem |
| US6272637B1 (en)* | 1997-04-14 | 2001-08-07 | Dallas Semiconductor Corporation | Systems and methods for protecting access to encrypted information |
| US6075938A (en)* | 1997-06-10 | 2000-06-13 | The Board Of Trustees Of The Leland Stanford Junior University | Virtual machine monitors for scalable multiprocessors |
| US6182089B1 (en)* | 1997-09-23 | 2001-01-30 | Silicon Graphics, Inc. | Method, system and computer program product for dynamically allocating large memory pages of different sizes |
| US5987604A (en)* | 1997-10-07 | 1999-11-16 | Phoenix Technologies, Ltd. | Method and apparatus for providing execution of system management mode services in virtual mode |
| US6397242B1 (en)* | 1998-05-15 | 2002-05-28 | Vmware, Inc. | Virtualization system including a virtual machine monitor for a computer with a segmented architecture |
| US6282650B1 (en)* | 1999-01-25 | 2001-08-28 | Intel Corporation | Secure public digital watermark |
| US6374317B1 (en)* | 1999-10-07 | 2002-04-16 | Intel Corporation | Method and apparatus for initializing a computer interface |
| US20020099753A1 (en)* | 2001-01-20 | 2002-07-25 | Hardin David S. | System and method for concurrently supporting multiple independent virtual machines |
| US6961941B1 (en)* | 2001-06-08 | 2005-11-01 | Vmware, Inc. | Computer configuration for resource management in systems including a virtual machine |
| US20030037089A1 (en)* | 2001-08-15 | 2003-02-20 | Erik Cota-Robles | Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7536688B2 (en)* | 2003-02-28 | 2009-05-19 | Azul Systems | Segmented virtual machine |
| US20040172629A1 (en)* | 2003-02-28 | 2004-09-02 | Azul Systems | Segmented virtual machine |
| US20040250110A1 (en)* | 2003-03-28 | 2004-12-09 | Wray Michael John | Security policy in trusted computing systems |
| US8612755B2 (en)* | 2003-03-28 | 2013-12-17 | Hewlett-Packard Development Company, L.P. | Security policy in trusted computing systems |
| US20040268332A1 (en)* | 2003-04-23 | 2004-12-30 | Masato Mitsumori | Memory access control method and processing system with memory access check function |
| US20050097345A1 (en)* | 2003-10-29 | 2005-05-05 | Kelley Brian H. | System for selectively enabling operating modes of a device |
| US7496958B2 (en)* | 2003-10-29 | 2009-02-24 | Qualcomm Incorporated | System for selectively enabling operating modes of a device |
| US20050257243A1 (en)* | 2004-04-27 | 2005-11-17 | Microsoft Corporation | Method and system for enforcing a security policy via a security virtual machine |
| US8607299B2 (en) | 2004-04-27 | 2013-12-10 | Microsoft Corporation | Method and system for enforcing a security policy via a security virtual machine |
| US20050289311A1 (en)* | 2004-06-29 | 2005-12-29 | David Durham | System and method for secure inter-platform and intra-platform communications |
| WO2006012197A3 (en)* | 2004-06-29 | 2006-04-06 | Intel Corp | Method of improving computer security through sandboxing |
| WO2006012197A2 (en) | 2004-06-29 | 2006-02-02 | Intel Corporation | Method of improving computer security through sandboxing |
| WO2006012341A1 (en) | 2004-06-29 | 2006-02-02 | Intel Corporation | System and method for secure inter-platform and intra-platform communications |
| US7908653B2 (en)* | 2004-06-29 | 2011-03-15 | Intel Corporation | Method of improving computer security through sandboxing |
| US20060021029A1 (en)* | 2004-06-29 | 2006-01-26 | Brickell Ernie F | Method of improving computer security through sandboxing |
| US20060075312A1 (en)* | 2004-09-30 | 2006-04-06 | Fischer Stephen A | System and method for limiting exposure of hardware failure information for a secured execution environment |
| US7934076B2 (en) | 2004-09-30 | 2011-04-26 | Intel Corporation | System and method for limiting exposure of hardware failure information for a secured execution environment |
| US7620953B1 (en)* | 2004-10-05 | 2009-11-17 | Azul Systems, Inc. | System and method for allocating resources of a core space among a plurality of core virtual machines |
| US20060224685A1 (en)* | 2005-03-29 | 2006-10-05 | International Business Machines Corporation | System management architecture for multi-node computer system |
| US7487222B2 (en) | 2005-03-29 | 2009-02-03 | International Business Machines Corporation | System management architecture for multi-node computer system |
| US7480908B1 (en) | 2005-06-24 | 2009-01-20 | Azul Systems, Inc. | Segmented virtual machine transport mechanism |
| US8276138B2 (en) | 2005-06-24 | 2012-09-25 | Azul Systems, Inc. | Segmented virtual machine transport mechanism |
| US20090178039A1 (en)* | 2005-06-24 | 2009-07-09 | Azul Systems, Inc. | Segmented virtual machine transport mechanism |
| US20090172665A1 (en)* | 2005-06-24 | 2009-07-02 | Azul Systems, Inc. | Reducing latency in a segmented virtual machine |
| US8336048B2 (en) | 2005-06-24 | 2012-12-18 | Azul Systems, Inc. | Reducing latency in a segmented virtual machine |
| US9361471B2 (en) | 2005-06-30 | 2016-06-07 | Intel Corporation | Secure vault service for software components within an execution environment |
| US9547772B2 (en) | 2005-06-30 | 2017-01-17 | Intel Corporation | Secure vault service for software components within an execution environment |
| US8601273B2 (en) | 2005-06-30 | 2013-12-03 | Intel Corporation | Signed manifest for run-time verification of software program identity and integrity |
| US8499151B2 (en) | 2005-06-30 | 2013-07-30 | Intel Corporation | Secure platform voucher service for software components within an execution environment |
| US20110231668A1 (en)* | 2005-06-30 | 2011-09-22 | Travis Schluessler | Signed Manifest for Run-Time Verification of Software Program Identity and Integrity |
| US20080216096A1 (en)* | 2005-07-15 | 2008-09-04 | Lenovo (Beijing) Limited | Virtual Computer System Supporting Trusted Computing and Method for Implementing Trusted Computation Thereon |
| US20100192150A1 (en)* | 2005-08-09 | 2010-07-29 | Steven Grobman | Exclusive access for secure audio program |
| US7971057B2 (en)* | 2005-08-09 | 2011-06-28 | Intel Corporation | Exclusive access for secure audio program |
| US20070038997A1 (en)* | 2005-08-09 | 2007-02-15 | Steven Grobman | Exclusive access for secure audio program |
| US7752436B2 (en)* | 2005-08-09 | 2010-07-06 | Intel Corporation | Exclusive access for secure audio program |
| US20080133893A1 (en)* | 2005-08-29 | 2008-06-05 | Centaurus Data Llc | Hierarchical register file |
| US9176741B2 (en) | 2005-08-29 | 2015-11-03 | Invention Science Fund I, Llc | Method and apparatus for segmented sequential storage |
| US8296550B2 (en) | 2005-08-29 | 2012-10-23 | The Invention Science Fund I, Llc | Hierarchical register file with operand capture ports |
| US7644258B2 (en) | 2005-08-29 | 2010-01-05 | Searete, Llc | Hybrid branch predictor using component predictors each having confidence and override signals |
| US20080133885A1 (en)* | 2005-08-29 | 2008-06-05 | Centaurus Data Llc | Hierarchical multi-threading processor |
| US20070083739A1 (en)* | 2005-08-29 | 2007-04-12 | Glew Andrew F | Processor with branch predictor |
| US8275976B2 (en) | 2005-08-29 | 2012-09-25 | The Invention Science Fund I, Llc | Hierarchical instruction scheduler facilitating instruction replay |
| US20080133883A1 (en)* | 2005-08-29 | 2008-06-05 | Centaurus Data Llc | Hierarchical store buffer |
| US8266412B2 (en) | 2005-08-29 | 2012-09-11 | The Invention Science Fund I, Llc | Hierarchical store buffer having segmented partitions |
| US20080133889A1 (en)* | 2005-08-29 | 2008-06-05 | Centaurus Data Llc | Hierarchical instruction scheduler |
| US8037288B2 (en) | 2005-08-29 | 2011-10-11 | The Invention Science Fund I, Llc | Hybrid branch predictor having negative ovedrride signals |
| US8028152B2 (en) | 2005-08-29 | 2011-09-27 | The Invention Science Fund I, Llc | Hierarchical multi-threading processor for executing virtual threads in a time-multiplexed fashion |
| US8327353B2 (en)* | 2005-08-30 | 2012-12-04 | Microsoft Corporation | Hierarchical virtualization with a multi-level virtualization mechanism |
| US20070050764A1 (en)* | 2005-08-30 | 2007-03-01 | Microsoft Corporation | Hierarchical virtualization with a multi-level virtualization mechanism |
| US7748037B2 (en) | 2005-09-22 | 2010-06-29 | Intel Corporation | Validating a memory type modification attempt |
| US20070067590A1 (en)* | 2005-09-22 | 2007-03-22 | Uday Savagaonkar | Providing protected access to critical memory regions |
| US20080163331A1 (en)* | 2006-12-29 | 2008-07-03 | Datta Sham M | Reconfiguring a secure system |
| US8316414B2 (en) | 2006-12-29 | 2012-11-20 | Intel Corporation | Reconfiguring a secure system |
| US8683191B2 (en) | 2006-12-29 | 2014-03-25 | Intel Corporation | Reconfiguring a secure system |
| US8356297B1 (en) | 2007-03-21 | 2013-01-15 | Azul Systems, Inc. | External data source redirection in segmented virtual machine |
| US20080263679A1 (en)* | 2007-04-23 | 2008-10-23 | Microsoft Corporation | Storing information in closed computing devices |
| US20080294892A1 (en)* | 2007-05-25 | 2008-11-27 | Ingo Molnar | Method and system for a kernel lock validator |
| US8145903B2 (en)* | 2007-05-25 | 2012-03-27 | Red Hat, Inc. | Method and system for a kernel lock validator |
| US8839450B2 (en) | 2007-08-02 | 2014-09-16 | Intel Corporation | Secure vault service for software components within an execution environment |
| US20090038017A1 (en)* | 2007-08-02 | 2009-02-05 | David Durham | Secure vault service for software components within an execution environment |
| GB2453652A (en)* | 2007-10-08 | 2009-04-15 | Lenovo | Implementing secure online payments by switching to a dedicated operating system (OS) |
| GB2453652B (en)* | 2007-10-08 | 2010-07-14 | Lenovo | Method and client system for implementing online secure payment |
| US8099718B2 (en) | 2007-11-13 | 2012-01-17 | Intel Corporation | Method and system for whitelisting software components |
| US20090172385A1 (en)* | 2007-12-31 | 2009-07-02 | Datta Sham M | Enabling system management mode in a secure system |
| US8473945B2 (en)* | 2007-12-31 | 2013-06-25 | Intel Corporation | Enabling system management mode in a secure system |
| US8843742B2 (en)* | 2008-08-26 | 2014-09-23 | Hewlett-Packard Company | Hypervisor security using SMM |
| US20100057982A1 (en)* | 2008-08-26 | 2010-03-04 | Phoenix Technologies Ltd | Hypervisor security using SMM |
| US8364601B2 (en) | 2008-12-31 | 2013-01-29 | Intel Corporation | Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain |
| US20100169666A1 (en)* | 2008-12-31 | 2010-07-01 | Prashant Dewan | Methods and systems to direclty render an image and correlate corresponding user input in a secuire memory domain |
| US20120017285A1 (en)* | 2009-05-18 | 2012-01-19 | Mark A Piwonka | Systems and methods of determining a trust level from system management mode |
| US8850601B2 (en)* | 2009-05-18 | 2014-09-30 | Hewlett-Packard Development Company, L.P. | Systems and methods of determining a trust level from system management mode |
| US8250273B2 (en)* | 2009-09-14 | 2012-08-21 | International Business Machines Corporation | Secure handling and routing of message-signaled interrupts |
| US20110066783A1 (en)* | 2009-09-14 | 2011-03-17 | International Business Machines Corporation | Secure Handling and Routing of Message-Signaled Interrupts |
| US9223963B2 (en) | 2009-12-15 | 2015-12-29 | Mcafee, Inc. | Systems and methods for behavioral sandboxing |
| US9058183B2 (en) | 2009-12-29 | 2015-06-16 | Advanced Micro Devices, Inc. | Hypervisor isolation of processor cores to enable computing accelerator cores |
| KR20120111734A (en)* | 2009-12-29 | 2012-10-10 | 어드밴스드 마이크로 디바이시즈, 인코포레이티드 | Hypervisor isolation of processor cores |
| KR101668399B1 (en) | 2009-12-29 | 2016-10-21 | 어드밴스드 마이크로 디바이시즈, 인코포레이티드 | Hypervisor isolation of processor cores |
| US8495750B2 (en) | 2010-08-31 | 2013-07-23 | International Business Machines Corporation | Filesystem management and security system |
| EP2691908A4 (en)* | 2011-03-28 | 2014-10-29 | Mcafee Inc | SYSTEM AND METHOD FOR ANTI-MALICIAL SECURITY BASED ON A VIRTUAL MACHINE MONITOR |
| US9317690B2 (en) | 2011-03-28 | 2016-04-19 | Mcafee, Inc. | System and method for firmware based anti-malware security |
| US9747443B2 (en) | 2011-03-28 | 2017-08-29 | Mcafee, Inc. | System and method for firmware based anti-malware security |
| WO2012135192A2 (en) | 2011-03-28 | 2012-10-04 | Mcafee, Inc. | System and method for virtual machine monitor based anti-malware security |
| US9392016B2 (en) | 2011-03-29 | 2016-07-12 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
| US8925089B2 (en) | 2011-03-29 | 2014-12-30 | Mcafee, Inc. | System and method for below-operating system modification of malicious code on an electronic device |
| US8959638B2 (en) | 2011-03-29 | 2015-02-17 | Mcafee, Inc. | System and method for below-operating system trapping and securing of interdriver communication |
| US9032525B2 (en) | 2011-03-29 | 2015-05-12 | Mcafee, Inc. | System and method for below-operating system trapping of driver filter attachment |
| US8813227B2 (en) | 2011-03-29 | 2014-08-19 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
| US20120255004A1 (en)* | 2011-03-31 | 2012-10-04 | Mcafee, Inc. | System and method for securing access to system calls |
| US9087199B2 (en) | 2011-03-31 | 2015-07-21 | Mcafee, Inc. | System and method for providing a secured operating system execution environment |
| US9038176B2 (en) | 2011-03-31 | 2015-05-19 | Mcafee, Inc. | System and method for below-operating system trapping and securing loading of code into memory |
| US8966629B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for below-operating system trapping of driver loading and unloading |
| US9262246B2 (en) | 2011-03-31 | 2016-02-16 | Mcafee, Inc. | System and method for securing memory and storage of an electronic device with a below-operating system security agent |
| US8966624B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for securing an input/output path of an application against malware with a below-operating system security agent |
| US8863283B2 (en)* | 2011-03-31 | 2014-10-14 | Mcafee, Inc. | System and method for securing access to system calls |
| US9530001B2 (en) | 2011-03-31 | 2016-12-27 | Mcafee, Inc. | System and method for below-operating system trapping and securing loading of code into memory |
| US9448867B2 (en)* | 2011-12-31 | 2016-09-20 | Intel Corporation | Processor that detects when system management mode attempts to reach program code outside of protected space |
| US20130326288A1 (en)* | 2011-12-31 | 2013-12-05 | Shamanna M. Datta | Processor that detects when system management mode attempts to reach program code outside of protected space |
| US10140139B1 (en)* | 2012-06-19 | 2018-11-27 | Bromium, Inc. | Ensuring the privacy and integrity of a hypervisor |
| US10877903B2 (en) | 2012-07-31 | 2020-12-29 | Hewlett-Packard Development Company, L.P. | Protected memory area |
| US9367691B2 (en) | 2012-07-31 | 2016-06-14 | Hewlett-Packard Development Company, L.P. | Modify executable bits of system management memory page table |
| US10102154B2 (en) | 2012-07-31 | 2018-10-16 | Hewlett-Packard Development Company, L.P. | Protected memory area |
| JP2016511872A (en)* | 2013-01-22 | 2016-04-21 | アマゾン・テクノロジーズ、インコーポレイテッド | Privileged cryptographic services in a virtualized environment |
| US9311138B2 (en) | 2013-03-13 | 2016-04-12 | Intel Corporation | System management interrupt handling for multi-core processors |
| WO2014158603A1 (en)* | 2013-03-13 | 2014-10-02 | Intel Corporation | System management interrupt handling for multi-core processors |
| US10579405B1 (en)* | 2013-03-13 | 2020-03-03 | Amazon Technologies, Inc. | Parallel virtual machine managers |
| US9529627B2 (en) | 2013-03-19 | 2016-12-27 | Stmicroelectronics (Grenoble 2) Sas | Managing multiple systems in a computer device |
| EP2782007A1 (en)* | 2013-03-19 | 2014-09-24 | STMicroelectronics (Grenoble 2) SAS | Launching multiple applications in containers on a processor |
| US9552477B2 (en) | 2013-03-19 | 2017-01-24 | Stmicroelectronics (Grenoble 2) Sas | Resource management in a processor |
| EP2782038A1 (en)* | 2013-03-19 | 2014-09-24 | STMicroelectronics (Grenoble 2) SAS | Resource management in a processor for trusted and untrusted applications |
| US10140958B2 (en) | 2013-03-19 | 2018-11-27 | Stmicroelectronics (Grenoble 2) Sas | Managing multiple systems in a computer device |
| US9317304B2 (en) | 2013-03-19 | 2016-04-19 | Stmicroelectronics (Grenoble 2) Sas | Launching multiple applications in a processor |
| US11736530B2 (en) | 2013-04-19 | 2023-08-22 | Nicira, Inc. | Framework for coordination between endpoint security and network security services |
| CN110084039A (en)* | 2013-04-19 | 2019-08-02 | Nicira股份有限公司 | Frame for the coordination between endpoint security and Network Security Service |
| US11263034B2 (en) | 2014-09-30 | 2022-03-01 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
| US10915371B2 (en) | 2014-09-30 | 2021-02-09 | Amazon Technologies, Inc. | Automatic management of low latency computational capacity |
| US10956185B2 (en) | 2014-09-30 | 2021-03-23 | Amazon Technologies, Inc. | Threading as a service |
| US10108443B2 (en) | 2014-09-30 | 2018-10-23 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
| US10140137B2 (en)* | 2014-09-30 | 2018-11-27 | Amazon Technologies, Inc. | Threading as a service |
| US12321766B2 (en) | 2014-09-30 | 2025-06-03 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
| US11467890B2 (en) | 2014-09-30 | 2022-10-11 | Amazon Technologies, Inc. | Processing event messages for user requests to execute program code |
| US11561811B2 (en) | 2014-09-30 | 2023-01-24 | Amazon Technologies, Inc. | Threading as a service |
| US10162688B2 (en) | 2014-09-30 | 2018-12-25 | Amazon Technologies, Inc. | Processing event messages for user requests to execute program code |
| US10884802B2 (en) | 2014-09-30 | 2021-01-05 | Amazon Technologies, Inc. | Message-based computation request scheduling |
| US20170192804A1 (en)* | 2014-09-30 | 2017-07-06 | Amazon Technologies, Inc. | Threading as a service |
| US10824484B2 (en) | 2014-09-30 | 2020-11-03 | Amazon Technologies, Inc. | Event-driven computing |
| US10592269B2 (en) | 2014-09-30 | 2020-03-17 | Amazon Technologies, Inc. | Dynamic code deployment and versioning |
| US11126469B2 (en) | 2014-12-05 | 2021-09-21 | Amazon Technologies, Inc. | Automatic determination of resource sizing |
| US10353746B2 (en) | 2014-12-05 | 2019-07-16 | Amazon Technologies, Inc. | Automatic determination of resource sizing |
| US9946651B2 (en)* | 2014-12-13 | 2018-04-17 | Via Alliance Semiconductor Co., Ltd | Pattern detector for detecting hangs |
| US20160350215A1 (en)* | 2014-12-13 | 2016-12-01 | Via Alliance Semiconductor Co., Ltd. | Distributed hang recovery logic |
| US10067871B2 (en)* | 2014-12-13 | 2018-09-04 | Via Alliance Semiconductor Co., Ltd | Logic analyzer for detecting hangs |
| US10324842B2 (en)* | 2014-12-13 | 2019-06-18 | Via Alliance Semiconductor Co., Ltd | Distributed hang recovery logic |
| US20160350223A1 (en)* | 2014-12-13 | 2016-12-01 | Via Alliance Semiconductor Co., Ltd. | Logic analyzer for detecting hangs |
| US11461124B2 (en) | 2015-02-04 | 2022-10-04 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
| US11360793B2 (en) | 2015-02-04 | 2022-06-14 | Amazon Technologies, Inc. | Stateful virtual compute system |
| US10853112B2 (en) | 2015-02-04 | 2020-12-01 | Amazon Technologies, Inc. | Stateful virtual compute system |
| US10552193B2 (en) | 2015-02-04 | 2020-02-04 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
| US10387177B2 (en) | 2015-02-04 | 2019-08-20 | Amazon Technologies, Inc. | Stateful virtual compute system |
| US10623476B2 (en) | 2015-04-08 | 2020-04-14 | Amazon Technologies, Inc. | Endpoint management system providing an application programming interface proxy service |
| US10776171B2 (en) | 2015-04-08 | 2020-09-15 | Amazon Technologies, Inc. | Endpoint management system and virtual compute system |
| US9940470B2 (en)* | 2015-10-06 | 2018-04-10 | Symantec Corporation | Techniques for generating a virtual private container |
| US20170098092A1 (en)* | 2015-10-06 | 2017-04-06 | Symantec Corporation | Techniques for generating a virtual private container |
| US10754701B1 (en) | 2015-12-16 | 2020-08-25 | Amazon Technologies, Inc. | Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions |
| US10437629B2 (en) | 2015-12-16 | 2019-10-08 | Amazon Technologies, Inc. | Pre-triggers for code execution environments |
| US10365985B2 (en) | 2015-12-16 | 2019-07-30 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
| US11243819B1 (en) | 2015-12-21 | 2022-02-08 | Amazon Technologies, Inc. | Acquisition and maintenance of compute capacity |
| US10691498B2 (en) | 2015-12-21 | 2020-06-23 | Amazon Technologies, Inc. | Acquisition and maintenance of compute capacity |
| US11016815B2 (en) | 2015-12-21 | 2021-05-25 | Amazon Technologies, Inc. | Code execution request routing |
| US10747873B2 (en) | 2016-01-26 | 2020-08-18 | Hewlett-Packard Development Company, L.P. | System management mode privilege architecture |
| CN108292339A (en)* | 2016-01-26 | 2018-07-17 | 惠普发展公司,有限责任合伙企业 | System Management Mode privilege framework |
| EP3314516A4 (en)* | 2016-01-26 | 2019-01-09 | Hewlett-Packard Development Company, L.P. | SYSTEM MANAGEMENT MODE PRIVILEGE ARCHITECTURE |
| US10162672B2 (en) | 2016-03-30 | 2018-12-25 | Amazon Technologies, Inc. | Generating data streams from pre-existing data sets |
| US11132213B1 (en) | 2016-03-30 | 2021-09-28 | Amazon Technologies, Inc. | Dependency-based process of pre-existing data sets at an on demand code execution environment |
| US10891145B2 (en) | 2016-03-30 | 2021-01-12 | Amazon Technologies, Inc. | Processing pre-existing data sets at an on demand code execution environment |
| US10282229B2 (en) | 2016-06-28 | 2019-05-07 | Amazon Technologies, Inc. | Asynchronous task management in an on-demand network code execution environment |
| US11354169B2 (en) | 2016-06-29 | 2022-06-07 | Amazon Technologies, Inc. | Adjusting variable limit on concurrent code executions |
| US10402231B2 (en) | 2016-06-29 | 2019-09-03 | Amazon Technologies, Inc. | Adjusting variable limit on concurrent code executions |
| US10102040B2 (en) | 2016-06-29 | 2018-10-16 | Amazon Technologies, Inc | Adjusting variable limit on concurrent code executions |
| US10203990B2 (en) | 2016-06-30 | 2019-02-12 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
| US10277708B2 (en) | 2016-06-30 | 2019-04-30 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
| US10528390B2 (en) | 2016-09-23 | 2020-01-07 | Amazon Technologies, Inc. | Idempotent task execution in on-demand network code execution systems |
| US10884787B1 (en) | 2016-09-23 | 2021-01-05 | Amazon Technologies, Inc. | Execution guarantees in an on-demand network code execution system |
| US11119813B1 (en) | 2016-09-30 | 2021-09-14 | Amazon Technologies, Inc. | Mapreduce implementation using an on-demand network code execution system |
| US10564946B1 (en) | 2017-12-13 | 2020-02-18 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
| US10353678B1 (en) | 2018-02-05 | 2019-07-16 | Amazon Technologies, Inc. | Detecting code characteristic alterations due to cross-service calls |
| US10733085B1 (en) | 2018-02-05 | 2020-08-04 | Amazon Technologies, Inc. | Detecting impedance mismatches due to cross-service calls |
| US10831898B1 (en) | 2018-02-05 | 2020-11-10 | Amazon Technologies, Inc. | Detecting privilege escalations in code including cross-service calls |
| US10725752B1 (en) | 2018-02-13 | 2020-07-28 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
| US10776091B1 (en) | 2018-02-26 | 2020-09-15 | Amazon Technologies, Inc. | Logging endpoint in an on-demand code execution system |
| US11875173B2 (en) | 2018-06-25 | 2024-01-16 | Amazon Technologies, Inc. | Execution of auxiliary functions in an on-demand network code execution system |
| US12314752B2 (en) | 2018-06-25 | 2025-05-27 | Amazon Technologies, Inc. | Execution of auxiliary functions in an on-demand network code execution system |
| US10884722B2 (en) | 2018-06-26 | 2021-01-05 | Amazon Technologies, Inc. | Cross-environment application of tracing information for improved code execution |
| US11146569B1 (en) | 2018-06-28 | 2021-10-12 | Amazon Technologies, Inc. | Escalation-resistant secure network services using request-scoped authentication information |
| US11171983B2 (en)* | 2018-06-29 | 2021-11-09 | Intel Corporation | Techniques to provide function-level isolation with capability-based security |
| US10949237B2 (en) | 2018-06-29 | 2021-03-16 | Amazon Technologies, Inc. | Operating system customization in an on-demand network code execution system |
| US11836516B2 (en) | 2018-07-25 | 2023-12-05 | Amazon Technologies, Inc. | Reducing execution times in an on-demand network code execution system using saved machine states |
| US11099870B1 (en) | 2018-07-25 | 2021-08-24 | Amazon Technologies, Inc. | Reducing execution times in an on-demand network code execution system using saved machine states |
| US11099917B2 (en) | 2018-09-27 | 2021-08-24 | Amazon Technologies, Inc. | Efficient state maintenance for execution environments in an on-demand code execution system |
| US11243953B2 (en) | 2018-09-27 | 2022-02-08 | Amazon Technologies, Inc. | Mapreduce implementation in an on-demand network code execution system and stream data processing system |
| US11943093B1 (en) | 2018-11-20 | 2024-03-26 | Amazon Technologies, Inc. | Network connection recovery after virtual machine transition in an on-demand network code execution system |
| CN109542610A (en)* | 2018-12-04 | 2019-03-29 | 中国航空工业集团公司西安航空计算技术研究所 | A kind of multi partition operating system void interrupt criteria component realization method |
| US10884812B2 (en) | 2018-12-13 | 2021-01-05 | Amazon Technologies, Inc. | Performance-based hardware emulation in an on-demand network code execution system |
| US11010188B1 (en) | 2019-02-05 | 2021-05-18 | Amazon Technologies, Inc. | Simulated data object storage using on-demand computation of data objects |
| US12327133B1 (en) | 2019-03-22 | 2025-06-10 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
| US11861386B1 (en) | 2019-03-22 | 2024-01-02 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
| CN113826072A (en)* | 2019-05-16 | 2021-12-21 | 微软技术许可有限责任公司 | Code Updates in System Administration Mode |
| US11119809B1 (en) | 2019-06-20 | 2021-09-14 | Amazon Technologies, Inc. | Virtualization-based transaction handling in an on-demand network code execution system |
| US11714675B2 (en) | 2019-06-20 | 2023-08-01 | Amazon Technologies, Inc. | Virtualization-based transaction handling in an on-demand network code execution system |
| US11115404B2 (en) | 2019-06-28 | 2021-09-07 | Amazon Technologies, Inc. | Facilitating service connections in serverless code executions |
| US11190609B2 (en) | 2019-06-28 | 2021-11-30 | Amazon Technologies, Inc. | Connection pooling for scalable network services |
| US11159528B2 (en) | 2019-06-28 | 2021-10-26 | Amazon Technologies, Inc. | Authentication to network-services using hosted authentication information |
| US11023311B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | On-demand code execution in input path of data uploaded to storage service in multiple data portions |
| US11263220B2 (en) | 2019-09-27 | 2022-03-01 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
| US11386230B2 (en) | 2019-09-27 | 2022-07-12 | Amazon Technologies, Inc. | On-demand code obfuscation of data in input path of object storage service |
| US10908927B1 (en) | 2019-09-27 | 2021-02-02 | Amazon Technologies, Inc. | On-demand execution of object filter code in output path of object storage service |
| US11394761B1 (en) | 2019-09-27 | 2022-07-19 | Amazon Technologies, Inc. | Execution of user-submitted code on a stream of data |
| US11416628B2 (en) | 2019-09-27 | 2022-08-16 | Amazon Technologies, Inc. | User-specific data manipulation system for object storage service based on user-submitted code |
| US10996961B2 (en) | 2019-09-27 | 2021-05-04 | Amazon Technologies, Inc. | On-demand indexing of data in input path of object storage service |
| US11656892B1 (en) | 2019-09-27 | 2023-05-23 | Amazon Technologies, Inc. | Sequential execution of user-submitted code and native functions |
| US11250007B1 (en) | 2019-09-27 | 2022-02-15 | Amazon Technologies, Inc. | On-demand execution of object combination code in output path of object storage service |
| US11550944B2 (en) | 2019-09-27 | 2023-01-10 | Amazon Technologies, Inc. | Code execution environment customization system for object storage service |
| US11023416B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | Data access control system for object storage service based on owner-defined code |
| US11860879B2 (en) | 2019-09-27 | 2024-01-02 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
| US11055112B2 (en) | 2019-09-27 | 2021-07-06 | Amazon Technologies, Inc. | Inserting executions of owner-specified code into input/output path of object storage service |
| US11106477B2 (en) | 2019-09-27 | 2021-08-31 | Amazon Technologies, Inc. | Execution of owner-specified code during input/output path to object storage service |
| US11360948B2 (en) | 2019-09-27 | 2022-06-14 | Amazon Technologies, Inc. | Inserting owner-specified data processing pipelines into input/output path of object storage service |
| WO2021080601A1 (en)* | 2019-10-25 | 2021-04-29 | Hewlett-Packard Development Company, L.P. | Integrity monitor |
| US10942795B1 (en) | 2019-11-27 | 2021-03-09 | Amazon Technologies, Inc. | Serverless call distribution to utilize reserved capacity without inhibiting scaling |
| US11119826B2 (en) | 2019-11-27 | 2021-09-14 | Amazon Technologies, Inc. | Serverless call distribution to implement spillover while avoiding cold starts |
| US11449601B2 (en)* | 2020-01-08 | 2022-09-20 | Red Hat, Inc. | Proof of code compliance and protected integrity using a trusted execution environment |
| US11714682B1 (en) | 2020-03-03 | 2023-08-01 | Amazon Technologies, Inc. | Reclaiming computing resources in an on-demand code execution system |
| US11188391B1 (en) | 2020-03-11 | 2021-11-30 | Amazon Technologies, Inc. | Allocating resources to on-demand code executions under scarcity conditions |
| US11775640B1 (en) | 2020-03-30 | 2023-10-03 | Amazon Technologies, Inc. | Resource utilization-based malicious task detection in an on-demand code execution system |
| CN112800431A (en)* | 2020-08-28 | 2021-05-14 | 支付宝(杭州)信息技术有限公司 | Method and device for safely entering trusted execution environment in hyper-thread scene |
| US11550713B1 (en) | 2020-11-25 | 2023-01-10 | Amazon Technologies, Inc. | Garbage collection in distributed systems using life cycled storage roots |
| US11593270B1 (en) | 2020-11-25 | 2023-02-28 | Amazon Technologies, Inc. | Fast distributed caching using erasure coded object parts |
| US11388210B1 (en) | 2021-06-30 | 2022-07-12 | Amazon Technologies, Inc. | Streaming analytics using a serverless compute system |
| US12020059B2 (en)* | 2021-08-30 | 2024-06-25 | International Business Machines Corporation | Inaccessible prefix pages during virtual machine execution |
| US20230061511A1 (en)* | 2021-08-30 | 2023-03-02 | International Business Machines Corporation | Inaccessible prefix pages during virtual machine execution |
| US11968280B1 (en) | 2021-11-24 | 2024-04-23 | Amazon Technologies, Inc. | Controlling ingestion of streaming data to serverless function executions |
| US12015603B2 (en) | 2021-12-10 | 2024-06-18 | Amazon Technologies, Inc. | Multi-tenant mode for serverless code execution |
| US12381878B1 (en) | 2023-06-27 | 2025-08-05 | Amazon Technologies, Inc. | Architecture for selective use of private paths between cloud services |
| Publication number | Publication date |
|---|---|
| RU2313126C2 (en) | 2007-12-20 |
| US20060015869A1 (en) | 2006-01-19 |
| JP4846660B2 (en) | 2011-12-28 |
| AU2003231237A8 (en) | 2003-12-22 |
| CN1675623A (en) | 2005-09-28 |
| CN100377092C (en) | 2008-03-26 |
| US7581219B2 (en) | 2009-08-25 |
| JP5242747B2 (en) | 2013-07-24 |
| AU2003231237A1 (en) | 2003-12-22 |
| WO2003104981A3 (en) | 2004-05-13 |
| JP2005529401A (en) | 2005-09-29 |
| EP1512074A2 (en) | 2005-03-09 |
| MY146723A (en) | 2012-09-14 |
| JP4708016B2 (en) | 2011-06-22 |
| WO2003104981A2 (en) | 2003-12-18 |
| JP2007265434A (en) | 2007-10-11 |
| RU2004139086A (en) | 2005-07-10 |
| JP2011227939A (en) | 2011-11-10 |
| Publication | Publication Date | Title |
|---|---|---|
| US20030229794A1 (en) | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container | |
| US7631160B2 (en) | Method and apparatus for securing portions of memory | |
| JP6404283B2 (en) | System and method for executing instructions to initialize a secure environment | |
| US7260848B2 (en) | Hardened extensible firmware framework | |
| US5944821A (en) | Secure software registration and integrity assessment in a computer system | |
| US10360386B2 (en) | Hardware enforcement of providing separate operating system environments for mobile devices | |
| KR100950102B1 (en) | A computer system including a secure execution mode-capable processor and a method of initializing the computer system | |
| JP3982687B2 (en) | Controlling access to multiple isolated memories in an isolated execution environment | |
| JP2006012170A (en) | Method to enable user mode process to operate in privileged execution mode | |
| US11989576B2 (en) | Execution of code in system memory | |
| US20060136679A1 (en) | Protected processing apparatus, systems, and methods |
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment | Owner name:INTEL CORPORATION, CALIFORNIA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GLEW, ANDY;REEL/FRAME:012995/0740 Effective date:20020603 | |
| AS | Assignment | Owner name:INTEL CORPORATION, CALIFORNIA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SUTTON, JAMES A. II;GRAWROCK, DAVID W.;UHLIG, RICHARD A.;AND OTHERS;REEL/FRAME:013389/0650;SIGNING DATES FROM 20020813 TO 20021004 | |
| STCB | Information on status: application discontinuation | Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION | |
| AS | Assignment | Owner name:TAHOE RESEARCH, LTD., IRELAND Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTEL CORPORATION;REEL/FRAME:061175/0176 Effective date:20220718 |