US Patent No: 5,764,969

Number of patents in Portfolio can not be more than 2000

Method and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronization

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A method and system for enhanced system management operations in a superscalar data processing system. Those supervisory level instructions which execute selected privileged operations within protected memory space are first identified as not requiring a full context synchronization. Each time execution of such an instruction is initiated an enable special access (ESA) instruction is executed as an entry point to that instruction or group of instructions. A portion of the machine state register for the data processing system is stored and the machine state register is then modified as follows: a problem bit is set, changing the execution privilege state to 'supervisor;' external interrupts are disabled; and access privilege state bit is set; and, a special access mode bit is set, allowing execution of special instructions. The instructions which execute the selected privileged operations within the protected memory space are then executed. A disable special access (DSA) instruction is then executed which restores the bits within the machine state register which were modified during the ESA instruction. The ESA and DSA instructions are implemented without modifying the instruction stream by utilizing user level procedure calls, thereby reducing the overhead of the branch table necessary to determine the desired execution path.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Family

Loading Family data... loading....

Patent Owner(s)

  • INTERNATIONAL BUSINESS MACHINES CORPORATION

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Kahle, James Allan Austin, TX 135 1082
Loper, Albert J Austin, TX 20 171
Mallick, Soummya Austin, TX 48 910
Ogden, Aubrey Deene Round Rock, TX 10 259
Sell, John Victor Los Altos, CA 5 160

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (4)
* 4,500,952 Mechanism for control of address translation by a program using a plurality of translation tables 30 1980
* 4,787,031 Computer with virtual machine mode and multiple protection rings 70 1985
* 4,809,160 Privilege level checking instruction for implementing a secure hierarchical computer system 135 1985
* 5,063,499 Method for a correlating virtual memory systems by redirecting access for used stock instead of supervisor stock during normal supervisor mode processing 51 1989
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (98)
* 5,996,085 Concurrent execution of machine context synchronization operations and non-interruptible instructions 24 1997
7,356,817 Real-time scheduling of virtual machines 12 2000
7,111,176 Generating isolated bus cycles for isolated execution 6 2000
7,089,418 Managing accesses in a processor for isolated execution 5 2000
7,073,071 Platform and method for generating and utilizing a protected audit log 7 2000
7,013,481 Attestation key memory device and bus 18 2000
7,013,484 Managing a secure environment using a chipset in isolated execution mode 22 2000
6,996,710 Platform and method for issuing and certifying a hardware-protected attestation key 17 2000
6,990,579 Platform and method for remote attestation of a platform 16 2000
6,957,332 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 9 2000
6,760,441 Generating a key hieararchy for use in an isolated execution environment 34 2000
* 6,507,904 Executing isolated mode instructions in a secure system running in privilege rings 133 2000
6,754,815 Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set 25 2000
6,678,825 Controlling access to multiple isolated memories in an isolated execution environment 92 2000
6,633,963 Controlling access to multiple memory zones in an isolated execution environment 142 2000
7,085,935 Managing a secure environment using a chipset in isolated execution mode 3 2000
7,082,615 Protecting software environment in isolated execution 27 2000
6,941,458 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 8 2000
7,793,111 Mechanism to handle events in a machine with isolated execution 0 2000
7,389,427 Mechanism to secure computer output from software attack using isolated execution 11 2000
6,795,905 Controlling accesses to isolated memory using a memory controller for isolated execution 20 2000
7,215,781 Creation and distribution of a secret value between two devices 1 2000
7,818,808 Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor 15 2000
7,117,376 Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations 22 2000
7,035,963 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 24 2000
6,769,058 Resetting a processor in an isolated execution environment 7 2000
7,194,634 Attestation key memory device and bus 12 2001
7,272,831 Method and apparatus for constructing host processor soft devices independent of the host processor operating system 30 2001
7,096,497 File checking using remote signing authority via a network 11 2001
* 7,478,394 Context-corrupting context switching 17 2001
* 7,185,183 Atomic update of CPO state 23 2001
7,191,440 Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor 54 2001
7,024,555 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 21 2001
7,103,771 Connecting a virtual token to a physical token 33 2001
7,308,576 Authenticated code module 3 2001
7,480,806 Multi-token seal and unseal 8 2002
7,631,196 Method and apparatus for loading a trustable operating system 1 2002
7,069,442 System and method for execution of a secured environment initialization instruction 23 2002
7,028,149 System and method for resetting a platform configuration register 40 2002
7,076,669 Method and apparatus for communicating securely with a token 2 2002
7,058,807 Validation of inclusion of a platform within a data center 18 2002
7,127,548 Control register access virtualization performance improvement in the virtual-machine architecture 9 2002
6,820,177 Protected configuration space in a protected environment 8 2002
7,142,674 Method of confirming a secure key exchange 8 2002
7,392,415 Sleep protection 2 2002
7,124,327 Control over faults occurring during the operation of guest software in the virtual-machine architecture 18 2002
6,996,748 Handling faults associated with operation of guest software in the virtual-machine architecture 13 2002
7,296,267 System and method for binding virtual machines to hardware contexts 45 2002
7,634,638 Instruction encoding for system register bit set and clear 6 2002
7,165,181 System and method for establishing trust without revealing identity 22 2002
7,073,042 Reclaiming existing fields in address translation data structures to extend control over memory accesses 15 2002
7,318,235 Attestation using both fixed token and portable token 17 2002
7,318,141 Methods and systems to control virtual machines 3 2002
7,900,017 Mechanism for remapping post virtual machine memory pages 1 2002
7,415,708 Virtual machine management using processor state information 20 2003
7,424,709 Use of multiple virtual machine monitors to handle privileged events 17 2003
7,287,197 Vectoring an interrupt or exception upon resuming operation of a virtual machine 4 2003
7,739,521 Method of obscuring cryptographic computations 0 2003
7,610,611 Prioritized address decoder 1 2003
7,366,305 Platform and method for establishing trust without revealing identity 4 2003
7,237,051 Mechanism to control hardware interrupt acknowledgement in a virtual machine system 12 2003
7,177,967 Chipset support for managing hardware interrupts in a virtual machine system 13 2003
7,020,738 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 9 2003
6,934,817 Controlling access to multiple memory zones in an isolated execution environment 18 2003
7,636,844 Method and system to provide a trusted channel within a computer system for a SIM device 6 2003
8,156,343 Accessing private data about the state of a data processing machine from storage that is publicly accessible 0 2003
8,037,314 Replacing blinded authentication authority 2 2003
7,802,085 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 4 2004
7,356,735 Providing support for single stepping a virtual machine in a virtual machine environment 6 2004
7,620,949 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 2 2004
7,490,070 Apparatus and method for proving the denial of a direct proof signature 9 2004
* 7,669,050 Method to enable user mode process to operate in a privileged execution mode 4 2004
7,366,849 Protected configuration space in a protected environment 5 2004
7,305,592 Support for nested fault in a virtual machine environment 16 2004
7,840,962 System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time 2 2004
8,146,078 Timer offsetting mechanism in a virtual machine environment 5 2004
8,533,777 Mechanism to determine trust of out-of-band management agents 0 2004
7,395,405 Method and apparatus for supporting address translation in a virtual machine environment 5 2005
7,313,669 Virtual translation lookaside buffer 4 2005
7,546,457 System and method for execution of a secured environment initialization instruction 6 2005
7,809,957 Trusted platform module for generating sealed data 6 2005
7,302,511 Chipset support for managing hardware interrupts in a virtual machine system 7 2005
7,516,330 Platform and method for establishing provable identities while maintaining privacy 2 2005
7,921,293 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 0 2006
8,014,530 Method and apparatus for authenticated, recoverable key distribution with no database secrets 0 2006
7,600,100 Instruction encoding for system register bit set and clear 0 2006
7,454,611 System and method for establishing trust without revealing identity 3 2007
7,836,275 Method and apparatus for supporting address translation in a virtual machine environment 3 2008
8,296,762 Virtual machine management using processor state information 1 2008
8,185,734 System and method for execution of a secured environment initialization instruction 1 2009
7,861,245 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 0 2009
8,407,476 Method and apparatus for loading a trustable operating system 0 2009
8,386,788 Method and apparatus for loading a trustable operating system 0 2009
8,639,915 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 0 2010
8,671,275 Mechanism to handle events in a machine with isolated execution 0 2010
8,522,044 Mechanism to handle events in a machine with isolated execution 0 2010
8,195,914 Mechanism for remapping post virtual machine memory pages 0 2011
8,645,688 System and method for execution of a secured environment initialization instruction 0 2012
* Cited By Examiner