Electrical computers and digital processing systems: memory – Address formation – Address mapping
Reexamination Certificate
2008-01-08
2008-01-08
Bataille, Pierre-Michel (Department: 2186)
Electrical computers and digital processing systems: memory
Address formation
Address mapping
C711S203000, C718S001000
Reexamination Certificate
active
10322003
ABSTRACT:
Methods and systems are provided to control the execution of a virtual machine (VM). A VM Monitor (VMM) accesses VM Control Structures (VMCS) indirectly through access instructions passed to a processor. In one embodiment, the access instructions include VMCS component identifiers used by the processor to determine the appropriate storage location for the VMCS components. The processor identifies the appropriate storage location for the VMCS component within the processor storage or within memory.
REFERENCES:
patent: 4037214 (1977-07-01), Birney et al.
patent: 4247905 (1981-01-01), Yoshida et al.
patent: 4278837 (1981-07-01), Best
patent: 4347565 (1982-08-01), Kaneda et al.
patent: 4366537 (1982-12-01), Heller et al.
patent: 4521852 (1985-06-01), Guttag
patent: 4571672 (1986-02-01), Hatada et al.
patent: 4814975 (1989-03-01), Hirosawa et al.
patent: 5022077 (1991-06-01), Bealkowski et al.
patent: 5075842 (1991-12-01), Lai
patent: 5079737 (1992-01-01), Hackbarth
patent: 5230069 (1993-07-01), Brelsford et al.
patent: 5255379 (1993-10-01), Melo
patent: 5293424 (1994-03-01), Hotley et al.
patent: 5319760 (1994-06-01), Mason et al.
patent: 5386552 (1995-01-01), Garney
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5437033 (1995-07-01), Inoue et al.
patent: 5455909 (1995-10-01), Blomgren et al.
patent: 5459869 (1995-10-01), Spilo
patent: 5473692 (1995-12-01), Davis
patent: 5479509 (1995-12-01), Ugon
patent: 5511217 (1996-04-01), Nakajima et al.
patent: 5522075 (1996-05-01), Robinson et al.
patent: 5568552 (1996-10-01), Davis
patent: 5615263 (1997-03-01), Takahashi
patent: 5621912 (1997-04-01), Borruso et al.
patent: 5628022 (1997-05-01), Ueno et al.
patent: 5657445 (1997-08-01), Pearce
patent: 5717903 (1998-02-01), Bonola
patent: 5729760 (1998-03-01), Poisner
patent: 5737604 (1998-04-01), Miller et al.
patent: 5737760 (1998-04-01), Grimmer, Jr. et al.
patent: 5757919 (1998-05-01), Herbert
patent: 5764969 (1998-06-01), Kahle et al.
patent: 5796845 (1998-08-01), Serikawa et al.
patent: 5805712 (1998-09-01), Davis
patent: 5835594 (1998-11-01), Albrecht et al.
patent: 5844986 (1998-12-01), Davis
patent: 5852717 (1998-12-01), Bhide et al.
patent: 5854913 (1998-12-01), Goetz et al.
patent: 5872994 (1999-02-01), Akiyama
patent: 5890189 (1999-03-01), Nozue et al.
patent: 5937063 (1999-08-01), Davis
patent: 5953502 (1999-09-01), Helbig, Sr.
patent: 5978481 (1999-11-01), Ganesan et al.
patent: 5987557 (1999-11-01), Ebrahim
patent: 6014745 (2000-01-01), Ashe
patent: 6055637 (2000-04-01), Hudson et al.
patent: 6058478 (2000-05-01), Davis
patent: 6075938 (2000-06-01), Bugnion et al.
patent: 6085296 (2000-07-01), Karkhanis et al.
patent: 6101584 (2000-08-01), Satou et al.
patent: 6125430 (2000-09-01), Noel et al.
patent: 6134602 (2000-10-01), Engstrom et al.
patent: 6148379 (2000-11-01), Schimmel
patent: 6158546 (2000-12-01), Hanson et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6182089 (2001-01-01), Ganapathy et al.
patent: 6192455 (2001-02-01), Bogin et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6249872 (2001-06-01), Wildgrube et al.
patent: 6272533 (2001-08-01), Browne
patent: 6272637 (2001-08-01), Little et al.
patent: 6282651 (2001-08-01), Ashe
patent: 6282657 (2001-08-01), Kaplan et al.
patent: 6292874 (2001-09-01), Barnett
patent: 6301646 (2001-10-01), Hostetter
patent: 6314409 (2001-11-01), Schneck et al.
patent: 6321314 (2001-11-01), VanDyke
patent: 6339815 (2002-01-01), Feng et al.
patent: 6339816 (2002-01-01), Bausch
patent: 6374317 (2002-04-01), Ajanovic et al.
patent: 6397242 (2002-05-01), Devine et al.
patent: 6499123 (2002-12-01), McFarland et al.
patent: 6505279 (2003-01-01), Phillips et al.
patent: 6732220 (2004-05-01), Babaian et al.
patent: 6760815 (2004-07-01), Traversat et al.
patent: 6785886 (2004-08-01), Lim et al.
patent: 6802062 (2004-10-01), Oyamada et al.
patent: 2001/0021969 (2001-09-01), Burger et al.
patent: 2001/0027527 (2001-10-01), Khidekel et al.
patent: 2001/0037450 (2001-11-01), Metlitski et al.
patent: 2002/0013802 (2002-01-01), Mori et al.
patent: 4217444 (1992-12-01), None
patent: 0600112 (1994-06-01), None
patent: 0930567 (1999-07-01), None
patent: 1030237 (2000-08-01), None
patent: 1146715 (2001-10-01), None
patent: 02000076139 (2000-03-01), None
patent: WO-97/29567 (1997-08-01), None
patent: WO-98/34365 (1998-08-01), None
patent: WO-98/44402 (1998-10-01), None
patent: WO-99/05600 (1999-02-01), None
patent: WO-99/09482 (1999-02-01), None
patent: WO-99/57863 (1999-11-01), None
patent: WO-00/62232 (2000-10-01), None
patent: WO-01/27723 (2001-04-01), None
patent: WO-01/27821 (2001-04-01), None
patent: WO-01/75564 (2001-10-01), None
patent: WO-01/75565 (2001-10-01), None
patent: WO-01/75595 (2001-10-01), None
patent: WO-02/17555 (2002-02-01), None
patent: WO-02/086684 (2002-10-01), None
“System/370 extended architecture: Facilities for Virtual Machine” P.H.Gum IBM J. Res. Develop., vol. 27, No. 6 Nov. 1983.
“Intel 386 DX Microprocessor 32-Bit CHMOS Microprocessor with Integrated Memory Management”, Intel Corporation,(Dec. 31, 1995),32-56; figs. 4-14.
“M68040 User's Manual”, Motorola, Inc.,(1993), 1-20.
“Trusted Computing Platform Alliance (TCPA)”,Main Specification Version 1.1a,Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation, (Dec. 2001), 1-321.
Berg, C., “How Do I Create a Signed Applet?”,Dr. Dobb's Journal, 22(8), M&T Publ., Redwood City, CA, (Aug. 1997), 109-111, 122.
Brands, Stefan, “Restrictive Blinding of Secret-Key Certificates”,L. C. Guillou et al., ed., Advances in Cryptology—EUROCRYPT '95, vol. 921 ofLecture Notes in Computer Science, Springer-Verlag,XP-002201306, (1995), 1-35.
Chien, Andrew A., et al., “Safe and Protected Execution for the Morph/AMRM Reconfigurable Processor”,7th Annual IEEE Symposium, FCCM '99 Proceedings,XP010359180, ISBN: 0-7695-0375-6, Los Alamitos, CA, (Apr. 21, 1999), 209-221.
Cramer, K D., “Information Display Technique for a Terminate Stay Resident Program”,IBM Technical Disclosure Bulletin, 34(7A), (Dec. 1, 1991), 156-158.
Davida, George I., et al., “Defending Systems Against Viruses through Cryptographic Authentication”,1989 IEEE Symposium on Security and Privacy, May 1-3, 1989, Oakland, CA, IEEE, 312-318.
Goldberg, R., “Survey of Virtual Machine Research”,IEEE Computer Magazine7(6), (1974), 34-45.
Gong, L., et al., “Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2”,Proceedings of the USENIX Symposium on the Internet Technologies and Systems,Monterey, CA, (Dec. 1997), 103-112.
Gum, P. H., “System/370 Extended Architecture: Facilities for Virtual Machines”,IBM J. Research Development, 27(6), (Nov. 1983), 530-544.
Heinrich, J., “MIPS R4000 Microprocessor User's Manual”,MIPS Technology, Inc.,Mountain View, CA; XP00218449, (Apr. 1, 1993), 61-97.
Heinrich, J., “MIPS R4000 Microprocessor User's Manual”,MIPS Technology, Inc.,Mountain View, CA, (1994), pp. 67-79.
Kargar, Paul A., et al., “A VMM Security Kernel for the VAX Architecture”,Proceedings of the Symposium on Research in Security and Privacy,Boxborough, MA, XP010020182, ISBN: 0-8186-2060-9, (May 7, 1990), 2-19.
Kashiwagi, Kazuhiko, et al., “Design and Implementation of Dynamically Reconstructing System Software”,3rd Asia-Pacific Software Engineering Conference(APSEC) '96, Dec. 4-7, 1996, Seoul, South Korea, 278-287.
Lawton, K., “Running Multiple Operating Systems Concurrently on an IA32 PC Using Virtualization Techniques”, http://www.plex86.org/research/paper.txt, (Aug. 9, 2001), 1-31.
Robin, John S., et al., “Analysis of the Pentium's Ability to Support a Secure Virtual Machine Monitor”,Proceedings fo the 9th Usenix Security Symposium,XP0022437347, Denver, CO, (Aug. 14, 2000), 1-17.
Rosenblum, M., “Vmware's Virtua
Bennett Steve M.
Boleyn Erich
Cota-Robles Erik C.
Glew Andrew
Jeyasingh Stalinselvaraj
Intel Corporation
Lane Thomas R.
LandOfFree
Methods and systems to control virtual machines does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems to control virtual machines, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems to control virtual machines will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3942370