US Patent No: 5,764,969

Number of patents in Portfolio can not be more than 2000

Method and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronization

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A method and system for enhanced system management operations in a superscalar data processing system. Those supervisory level instructions which execute selected privileged operations within protected memory space are first identified as not requiring a full context synchronization. Each time execution of such an instruction is initiated an enable special access (ESA) instruction is executed as an entry point to that instruction or group of instructions. A portion of the machine state register for the data processing system is stored and the machine state register is then modified as follows: a problem bit is set, changing the execution privilege state to 'supervisor;' external interrupts are disabled; and access privilege state bit is set; and, a special access mode bit is set, allowing execution of special instructions. The instructions which execute the selected privileged operations within the protected memory space are then executed. A disable special access (DSA) instruction is then executed which restores the bits within the machine state register which were modified during the ESA instruction. The ESA and DSA instructions are implemented without modifying the instruction stream by utilizing user level procedure calls, thereby reducing the overhead of the branch table necessary to determine the desired execution path.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY41578

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Kahle, James Allan Austin, TX 98 1397
Loper, Albert J Cedar Park, TX 17 191
Mallick, Soummya Austin, TX 48 1020
Ogden, Aubrey Deene Round Rock, TX 10 274
Sell, John Victor Los Altos, CA 5 167

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
* 4,500,952 Mechanism for control of address translation by a program using a plurality of translation tables 32 1980
 
HEWLETT-PACKARD COMPANY (1)
* 4,809,160 Privilege level checking instruction for implementing a secure hierarchical computer system 143 1985
 
DIGITAL EQUIPMENT CORPORATION (1)
* 4,787,031 Computer with virtual machine mode and multiple protection rings 75 1985
 
MICROSOFT TECHNOLOGY LICENSING, LLC (1)
* 5,063,499 Method for a correlating virtual memory systems by redirecting access for used stock instead of supervisor stock during normal supervisor mode processing 54 1989
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
QUALCOMM INCORPORATED (1)
* 2007/0286,274 APPARATUS AND METHOD OF LOW LATENCY MULTI-HOP COMMUNICATION 1 2007
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (4)
* 5,996,085 Concurrent execution of machine context synchronization operations and non-interruptible instructions 24 1997
* 2004/0111,414 System and method for selective execution of statements with surrogate authority 3 2002
* 7,669,050 Method to enable user mode process to operate in a privileged execution mode 5 2004
* 2005/0289,545 Method to enable user mode process to operate in a privileged execution mode 4 2004
 
Other [Check patent profile for assignment information] (11)
* 2003/0196,100 Protection against memory attacks following reset 21 2002
* 2004/0064,813 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 4 2003
* 2004/0078,590 Controlling access to multiple memory zones in an isolated execution environment 3 2003
* 2005/0022,002 Protected configuration space in a protected environment 23 2004
* 2005/0182,940 System and method for execution of a secured environment initialization instruction 25 2005
* 2005/0283,660 Mechanism to handle events in a machine with isolated execution 10 2005
* 2006/0245,590 Method of confirming a secure key exchange 6 2006
* 2009/0006,805 Method and apparatus for supporting address translation in a virtual machine environment 12 2008
* 2008/0276,235 VIRTUAL MACHINE MANAGEMENT USING PROCESSOR STATE INFORMATION 8 2008
* 2009/0259,845 System and method for execution of a secured environment initialization instruction 2 2009
* 2011/0131,363 MECHANISM FOR REMAPPING POST VIRTUAL MACHINE MEMORY PAGES 0 2011
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (1)
* 7,478,394 Context-corrupting context switching 19 2001
 
MIPS TECHNOLOGIES, INC. (4)
* 7,185,183 Atomic update of CPO state 47 2001
7,634,638 Instruction encoding for system register bit set and clear 28 2002
7,600,100 Instruction encoding for system register bit set and clear 1 2006
* 2007/0234,020 INSTRUCTION ENCODING FOR SYSTEM REGISTER BIT SET AND CLEAR 4 2006
 
INTEL CORPORATION (121)
7,356,817 Real-time scheduling of virtual machines 20 2000
7,089,418 Managing accesses in a processor for isolated execution 8 2000
7,073,071 Platform and method for generating and utilizing a protected audit log 8 2000
7,013,481 Attestation key memory device and bus 25 2000
6,996,710 Platform and method for issuing and certifying a hardware-protected attestation key 31 2000
6,990,579 Platform and method for remote attestation of a platform 23 2000
6,957,332 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 12 2000
6,760,441 Generating a key hieararchy for use in an isolated execution environment 42 2000
* 6,507,904 Executing isolated mode instructions in a secure system running in privilege rings 168 2000
6,754,815 Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set 29 2000
6,678,825 Controlling access to multiple isolated memories in an isolated execution environment 102 2000
6,633,963 Controlling access to multiple memory zones in an isolated execution environment 155 2000
7,082,615 Protecting software environment in isolated execution 35 2000
6,941,458 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 13 2000
7,793,111 Mechanism to handle events in a machine with isolated execution 0 2000
7,389,427 Mechanism to secure computer output from software attack using isolated execution 15 2000
6,795,905 Controlling accesses to isolated memory using a memory controller for isolated execution 22 2000
7,215,781 Creation and distribution of a secret value between two devices 1 2000
* 2002/0083,332 Creation and distribution of a secret value between two devices 1 2000
7,818,808 Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor 28 2000
7,117,376 Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations 26 2000
7,035,963 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 25 2000
6,769,058 Resetting a processor in an isolated execution environment 8 2000
7,194,634 Attestation key memory device and bus 15 2001
7,272,831 Method and apparatus for constructing host processor soft devices independent of the host processor operating system 33 2001
7,096,497 File checking using remote signing authority via a network 13 2001
* 2002/0144,140 File checking using remote signing authority via a network 2 2001
* 2002/0144,121 Checking file integrity using signature generated in isolated execution 17 2001
7,191,440 Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor 68 2001
7,024,555 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 26 2001
* 2003/0084,346 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 12 2001
7,103,771 Connecting a virtual token to a physical token 37 2001
* 2003/0115,453 Connecting a virtual token to a physical token 28 2001
* 2003/0126,454 Authenticated code method and apparatus 40 2001
7,308,576 Authenticated code module 3 2001
7,480,806 Multi-token seal and unseal 8 2002
* 2003/0163,711 Multi-token seal and unseal 33 2002
7,631,196 Method and apparatus for loading a trustable operating system 4 2002
7,069,442 System and method for execution of a secured environment initialization instruction 33 2002
7,028,149 System and method for resetting a platform configuration register 48 2002
7,076,669 Method and apparatus for communicating securely with a token 2 2002
7,058,807 Validation of inclusion of a platform within a data center 25 2002
* 2003/0196,088 Method and apparatus for communicating securely with a token 1 2002
7,127,548 Control register access virtualization performance improvement in the virtual-machine architecture 11 2002
* 2003/0229,794 System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container 56 2002
6,820,177 Protected configuration space in a protected environment 9 2002
7,142,674 Method of confirming a secure key exchange 11 2002
* 2003/0233,550 Method of confirming a secure key exchange 3 2002
7,392,415 Sleep protection 3 2002
* 2004/0003,321 Initialization of protected system 31 2002
7,296,267 System and method for binding virtual machines to hardware contexts 50 2002
7,165,181 System and method for establishing trust without revealing identity 28 2002
7,073,042 Reclaiming existing fields in address translation data structures to extend control over memory accesses 16 2002
7,318,235 Attestation using both fixed token and portable token 18 2002
* 2004/0117,625 Attestation using both fixed token and portable token 8 2002
* 2004/0117,318 Portable token controlling trusted environment launch 15 2002
7,318,141 Methods and systems to control virtual machines 3 2002
* 2004/0123,288 Methods and systems to manage machine state in virtual machine operations 26 2002
7,900,017 Mechanism for remapping post virtual machine memory pages 2 2002
* 2004/0128,469 Mechanism for remapping post virtual machine memory pages 3 2002
* 2004/0128,345 Dynamic service registry 57 2002
* 2004/0128,465 Configurable memory bus width 5 2002
7,415,708 Virtual machine management using processor state information 21 2003
* 2004/0268,347 Virtual machine management using processor state information 91 2003
7,424,709 Use of multiple virtual machine monitors to handle privileged events 18 2003
7,287,197 Vectoring an interrupt or exception upon resuming operation of a virtual machine 5 2003
* 2005/0060,703 Vectoring an interrupt or exception upon resuming operation of a virtual machine 0 2003
7,739,521 Method of obscuring cryptographic computations 0 2003
* 2005/0084,098 Method of obscuring cryptographic computations 8 2003
7,237,051 Mechanism to control hardware interrupt acknowledgement in a virtual machine system 15 2003
7,177,967 Chipset support for managing hardware interrupts in a virtual machine system 17 2003
7,020,738 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 9 2003
* 2005/0080,934 Invalidating translation lookaside buffer entries in a virtual machine (VM) system 15 2003
6,934,817 Controlling access to multiple memory zones in an isolated execution environment 21 2003
7,636,844 Method and system to provide a trusted channel within a computer system for a SIM device 6 2003
* 2005/0108,534 Providing services to an open platform implementing subscriber identity module (SIM) capabilities 17 2003
* 2005/0108,171 Method and apparatus for implementing subscriber identity module (SIM) capabilities in an open platform 23 2003
8,156,343 Accessing private data about the state of a data processing machine from storage that is publicly accessible 2 2003
8,037,314 Replacing blinded authentication authority 3 2003
7,802,085 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 6 2004
* 2005/0216,920 Use of a virtual machine to emulate a hardware device 24 2004
7,356,735 Providing support for single stepping a virtual machine in a virtual machine environment 6 2004
* 2005/0240,819 Providing support for single stepping a virtual machine in a virtual machine environment 5 2004
7,620,949 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 2 2004
* 2005/0240,700 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 2 2004
7,490,070 Apparatus and method for proving the denial of a direct proof signature 11 2004
7,366,849 Protected configuration space in a protected environment 5 2004
* 2005/0288,056 System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module 7 2004
7,305,592 Support for nested fault in a virtual machine environment 18 2004
* 2006/0005,084 Support for nested faults in a virtual machine environment 1 2004
7,840,962 System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time 4 2004
* 2006/0075,402 Providing support for a timer associated with a virtual machine monitor 21 2004
8,146,078 Timer offsetting mechanism in a virtual machine environment 9 2004
8,924,728 Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information 0 2004
8,533,777 Mechanism to determine trust of out-of-band management agents 0 2004
7,395,405 Method and apparatus for supporting address translation in a virtual machine environment 17 2005
7,313,669 Virtual translation lookaside buffer 6 2005
7,546,457 System and method for execution of a secured environment initialization instruction 13 2005
* 2005/0188,198 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 7 2005
7,809,957 Trusted platform module for generating sealed data 8 2005
7,302,511 Chipset support for managing hardware interrupts in a virtual machine system 12 2005
7,516,330 Platform and method for establishing provable identities while maintaining privacy 2 2005
7,921,293 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 0 2006
8,014,530 Method and apparatus for authenticated, recoverable key distribution with no database secrets 4 2006
7,454,611 System and method for establishing trust without revealing identity 3 2007
* 2007/0113,077 System and Method for Establishing Trust Without Revealing Identity 0 2007
7,836,275 Method and apparatus for supporting address translation in a virtual machine environment 3 2008
8,296,762 Virtual machine management using processor state information 2 2008
8,185,734 System and method for execution of a secured environment initialization instruction 3 2009
7,861,245 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 0 2009
8,407,476 Method and apparatus for loading a trustable operating system 0 2009
8,386,788 Method and apparatus for loading a trustable operating system 0 2009
8,639,915 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 0 2010
8,671,275 Mechanism to handle events in a machine with isolated execution 0 2010
8,522,044 Mechanism to handle events in a machine with isolated execution 0 2010
8,195,914 Mechanism for remapping post virtual machine memory pages 1 2011
9,009,483 Replacing blinded authentication authority 0 2011
9,348,767 Accessing private data about the state of a data processing machine from storage that is publicly accessible 0 2012
8,645,688 System and method for execution of a secured environment initialization instruction 1 2012
9,087,000 Accessing private data about the state of a data processing machine from storage that is publicly accessible 1 2013
9,361,121 System and method for execution of a secured environment initialization instruction 0 2014
 
Micron Technology, Inc. (2)
7,610,611 Prioritized address decoder 2 2003
* 2005/0086,508 Prioritized address decoder 1 2003
 
BEIJING XIAOMI MOBILE SOFTWARE CO., LTD. (1)
7,366,305 Platform and method for establishing trust without revealing identity 4 2003
 
BROADCOM CORPORATION (1)
* 2008/0155,571 Method and System for Host Software Concurrent Processing of a Network Connection Using Multiple Central Processing Units 2 2007
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
* 2004/0168,047 Processor and compiler for creating program for the processor 10 2004
 
ALIBABA GROUP HOLDING LIMITED (5)
7,111,176 Generating isolated bus cycles for isolated execution 8 2000
7,013,484 Managing a secure environment using a chipset in isolated execution mode 29 2000
7,085,935 Managing a secure environment using a chipset in isolated execution mode 7 2000
7,124,327 Control over faults occurring during the operation of guest software in the virtual-machine architecture 19 2002
6,996,748 Handling faults associated with operation of guest software in the virtual-machine architecture 16 2002
* Cited By Examiner