-
公开(公告)号:GB2528756A
公开(公告)日:2016-02-03
申请号:GB201509051
申请日:2015-05-27
Applicant: INTEL CORP
Inventor: SAHITA RAVI , SHANBHOGUE VEDVYAS , SHWARTSMAN STANISLAV , NEIGER GILBERT , LEMAY MICHAEL , HUNTLEY BARRY E , DURHAM DAVID M , OUZIEL IDO , ANDERSON ANDREW
Abstract: A processing core 111 executes a first application, typically a virtual machine manager 117, and a second application, typically a virtual machine 131. The first and second applications are associated, respectively, with first and second privilege levels. A first set of privileges associated with the first privilege level includes a second set of privileges associated with the second privilege level. An address validation component validates the mapping of a first address, typically a guest virtual address, to a second address, typically a guest physical address. Validation occurs using an address translation data structure, preferably a Restricted Linear Check (RLC) table, maintained by the first application. The first and second addresses are defined, respectively, in first and second address spaces of the second application. Also disclosed is an arrangement in which a page miss handler of a computer system receives a guest virtual address associated with a memory access operation by a virtual machine managed by a virtual machine manager. A tentative guest physical address is received corresponding to the guest virtual address and in view of an address translation data structure it is determined whether an expected guest physical address corresponds to the tentative guest virtual address.
-
公开(公告)号:GB2356762A
公开(公告)日:2001-05-30
申请号:GB0018984
申请日:2000-08-02
Applicant: HEWLETT PACKARD CO , INTEL CORP
Inventor: MAHON HUGH F , DURHAM DAVID M , TANG PUQI
Abstract: Method and apparatus for assigning policies which are rules that govern the use of or access to network services. Each rule defines conditions that when evaluated true trigger actions to allow or deny the service. Techniques are disclosed which provide for explicit, flexible, and centralized assignment of policy to targets which are specified network services. These techniques include explicitly associating a policy with a network resource or process, grouping policy related processes, grouping related targets, associating groups of targets with groups of policies, mapping a user name contained in a policy to an associated network address such as an Internet Protocol (IP) address, and providing dynamically mapped policy identified user and host names with associated network addresses, such as IP addresses, to client processes.
-
公开(公告)号:DE112017004962T5
公开(公告)日:2019-06-19
申请号:DE112017004962
申请日:2017-08-30
Applicant: INTEL CORP
Inventor: SULTANA SALMIN , BRATANOV STANISLAV , DURHAM DAVID M , STRONG BEEMAN C
Abstract: Eine Ausführungsform stellt eine Vorrichtung bereit. Die Vorrichtung weist Sammlerschaltungen auf, um Prozessor-Trace- (PT) -Daten von einem PT-Treiber zu erfassen. Die PT-Daten weisen ein erstes Zielbefehlszeiger- (TIP) -Paket einschließlich einer ersten Laufzeitzieladresse eines indirekten Verzweigungsbefehls einer ausführenden Zielanwendung auf. Die Vorrichtung weist ferner Decoderschaltungen auf, um das erste TIP-Paket aus den PT-Daten zu extrahieren und das erste TIP-Paket zu decodieren, um die erste Laufzeitzieladresse hervorzubringen. Die Vorrichtung weist ferner Steuerflussvalidiererschaltungen auf, um basierend mindestens teilweise auf einer grafischen Steuerflussdarstellung (CFG) .zu bestimmen, ob ein Steuerflussübergang zur ersten Laufzeitzieladresse einer Steuerflussverletzung entspricht. Die CFG weist mehrere Knoten auf, wobei jeder Knoten eine Startadresse eines ersten Basisblocks, eine Endadresse des ersten Basisblocks und eine nächstmögliche Adresse eines zweiten Basisblocks oder ein Nicht-gefunden-Tag aufweist.
-
公开(公告)号:DE112017004017T5
公开(公告)日:2019-05-02
申请号:DE112017004017
申请日:2017-07-20
Applicant: INTEL CORP
Inventor: DURHAM DAVID M , SAHITA RAVI L , HUNTLEY BARRY E , DESHPANDE NIKHIL M
Abstract: Ein Verfahren, ein System, ein computerlesbares Medium und eine Vorrichtung werden vorgesehen, um eine sichere Cloud-Umgebung sicherzustellen, wobei öffentliche Cloud-Dienstanbieter ihren Code aus der Trusted Computing Base (TCB) ihrer Cloud-Dienstverbraucher entfernen können. Das Verfahren zum Sicherstellen einer sicheren Cloud-Umgebung hält den Virtuellen Maschinenmonitor (VMM), Vorrichtungen, Firmware und den physischen Angreifer (wenn ein schlechter Administrator/ Techniker versucht, direkt auf die Cloud-Host-Hardware zuzugreifen) außerhalb der Virtuellen Maschinen- (VM-) TCB. Nur der Verbraucher, dem diese sichere VM gehört, kann die VM modifizieren oder auf Inhalte der VM zugreifen (wie von dem Verbraucher bestimmt).
-
公开(公告)号:GB2523040A
公开(公告)日:2015-08-12
申请号:GB201509614
申请日:2013-10-23
Applicant: INTEL CORP
Inventor: DEWAN PRASHANT , LI HONG , DURHAM DAVID M
IPC: G06F21/53
Abstract: In some embodiments, a filter may filter web graphics library code executing on the graphics processing unit. As a result the web graphics library code may be prevented from accessing memory or other resources that are not allocated specifically for the web graphics library module. Likewise web graphics library code may not access any shared resources that have been explicitly assigned to the process specific web graphics library module.
-
公开(公告)号:HK1073026A1
公开(公告)日:2005-09-16
申请号:HK05104388
申请日:2005-05-25
Applicant: INTEL CORP
Inventor: GOVINDARAJAN PRIYA , CHIU CHUN-YANG , DURHAM DAVID M
IPC: H04L20060101 , H04L12/56 , H04L29/06
Abstract: Classification of network data packets includes a determination sets of one or more filter-identifiers where each set is associated with a respective data-packet classifier field. A result-set of filter-identifiers may be derived based on an intersection of the filter-identifier sets.
-
公开(公告)号:DE102019126125A1
公开(公告)日:2020-05-20
申请号:DE102019126125
申请日:2019-09-27
Applicant: INTEL CORP
Inventor: CHHABRA SIDDHARTHA , DURHAM DAVID M
Abstract: Bei einer Ausführungsform umfasst eine Vorrichtung einen Kern zum Ausführen von Anweisungen, wobei der Kern als Reaktion auf eine erste Anweisung eine verschlüsselte Binärdatei eines Anforderers von einem Quellenort erhalten und die verschlüsselte Binärdatei an einem Zielort speichern soll. Die Vorrichtung kann ferner eine mit dem Kern gekoppelte Speicherausführungsschaltung umfassen, die als Reaktion auf eine Anforderung vom Kern und auf der Basis der ersten Anweisung mindestens einen Integritätswert für die Binärdatei erzeugen und den mindestens einen Integritätswert in Assoziation mit der Binärdatei speichern soll.
-
公开(公告)号:GB2408169B
公开(公告)日:2007-02-28
申请号:GB0502953
申请日:2003-08-04
Applicant: INTEL CORP
Inventor: GOVINDARAJAN PRIYA , CHIU CHUN-YANG , DURHAM DAVID M
Abstract: Classification of network data packets includes a determination sets of one or more filter-identifiers where each set is associated with a respective data-packet classifier field. A result-set of filter-identifiers may be derived based on an intersection of the filter-identifier sets.
-
公开(公告)号:GB2408169A
公开(公告)日:2005-05-18
申请号:GB0502953
申请日:2003-08-04
Applicant: INTEL CORP
Inventor: GOVINDARAJAN PRIYA , CHIU CHUN-YANG , DURHAM DAVID M
Abstract: Classification of network data packets includes a determination sets of one or more filter-identifiers where each set is associated with a respective data-packet classifier field. A result-setof filter-identifiers may be derived based on an intersection of the filter-identifier sets.
-
公开(公告)号:GB2356316B
公开(公告)日:2003-09-10
申请号:GB0018983
申请日:2000-08-02
Applicant: HEWLETT PACKARD CO , INTEL CORP
Inventor: MAHON HUGH F , DURHAM DAVID M , FENGER RUSSELL J
Abstract: Method and apparatus for assigning policies [210] which are rules [210] that govern the use of or access to network [120] services. Each rule [210] defines conditions that when evaluated true trigger actions to allow or deny the service. Techniques are disclosed which provide for explicit, flexible, and centralized assignment of policy [210] to targets [110] which are specified network [120] services. These techniques include explicitly associating a policy [210] with a network [120] resource or process, grouping policy [210] related processes, grouping related targets [110] , associating groups of targets [300] not shown with groups of policies [400] not shown, mapping a user name [980] not shown contained in a policy [210] to an associated network address [690] such as an Internet Protocol (IP) address [690] , and providing dynamically mapped policy identified user and host names [980,680] not shown with associated network addresses [690] , such as IP addresses [690] , to client processes [660] .
-
-
-
-
-
-
-
-
-