2188 patents
Page 46 of 110
Utility
Using a Trusted Execution Environment for a Cryptographic Key Wrapping Scheme That Verifies Remote Device Capabilities
16 Jun 22
The technology disclosed herein provides a cryptographic key wrapping system for verifying device capabilities.
Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
Filed: 28 Feb 22
Utility
Removable data volume management
14 Jun 22
A method performed by a computing system includes detecting that a removable data volume has been attached to the computing system, the removable data volume being identified by a unique label.
Huamin Chen, Stephen Watt, James R. Curtis
Filed: 29 Feb 16
Utility
qu18vdwbsm3w7p4dzzmgbsl2ywenl1
14 Jun 22
A system includes a memory including a plurality of memory pages, a processor in communication with the memory, and a supervisor.
Michael Tsirkin, Karen Lee Noel
Filed: 28 Sep 20
Utility
wy58uf4osv fo58c8yoyhdokix300w80wcy67jghst5vf
14 Jun 22
A quantum message bus using superdense encoding to provide communications between services running on quantum computing devices and/or classical computing devices is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 29 Mar 21
Utility
zlzmzocnmlxptv6wsxe3872pht914rbeunvzbf40lskynmehu3j5w4c
14 Jun 22
The subject matter of this specification can be implemented in, among other things, a method that includes pre-registering, at a client device, one or more input/output (IO) buffers for a remote direct memory access (RDMA) interface at the client device.
Mohammed Rafi Kavungal Chundattu Parambil, Raghavendra Talur
Filed: 13 Jul 20
Utility
kk1onjfl041kmlbflojlq1frj6s1r98blfneer2gnuj5oyibz1cp1j0
14 Jun 22
A network packet is received from a network interface card (NIC).
Jesper Brouer, Michael Tsirkin
Filed: 3 Apr 20
Utility
u1i4w29plc8d91hxjsc6j6zsgwl4i1ct7dcnorja1
9 Jun 22
Methods and systems for improved live migration of computing processes with guaranteed maximum downtime are provided.
Michael Tsirkin, Amnon Ilan
Filed: 4 Dec 20
Utility
ecwca yky3njqcn44pvgug
9 Jun 22
In one embodiment, a system receives an exec function invocation request from a second application to run a first application from an executable file.
Ulrich Drepper
Filed: 3 Dec 20
Utility
w0idbbgfv2lilwslq0ol8azrf906z03bbha8999b5j7svl 4rzau
9 Jun 22
A system includes a distributed saga log, a first service, a second service, a first saga execution coordinator (SEC) instance collocated to the first service, and a second SEC instance collocated to the second service.
Ondrej Chaloupka, Martin Stefanko
Filed: 24 Feb 22
Utility
l6bhn8cobvpc34y83a2vot7lbijsegm86
9 Jun 22
Concealed monitor communications from a task in a trusted execution environment (TEE) are disclosed.
Michael H. M. Bursell
Filed: 28 Feb 22
Utility
epyotybjklk0we8tmvz81x5m03c
9 Jun 22
Various techniques and systems are described herein for anonymization of basic service set identifiers (BSSIDs) for wireless access points (WAPs).
Daniel Williams
Filed: 4 Dec 20
Utility
evykves86nt1zc57zxfrtogv6sm1v8kho91d91sczw9
7 Jun 22
Systems and methods for performing data duplication on data that was previously consolidated (e.g., deduplicated or merged).
Henri Han Van Riel, Michael Tsirkin
Filed: 21 Jul 17
Utility
orm7dhppt1kvj4bkmehpcifuvhb0bcf0zrh vft
7 Jun 22
The disclosed techniques relate to validating and optimizing a quantum computing simulator.
Luigi Zuccarelli, Leigh Griffin
Filed: 16 Oct 18
Utility
9kej7v4gts3q0p 2699h2ir7nh2q1jhquvc97somiou8zpyv77fmyt
7 Jun 22
A method includes receiving a message at a network bridge from a computer system where the network bridge stores a forwarding table.
Michael Tsirkin
Filed: 26 Mar 20
Utility
0jwctn4fnc6ge1f7n67ndotu6 ykc1pwqla1cx2jb
7 Jun 22
According to one example, a method includes, with a serverless function infrastructure, associated a routing secret with a function sequence.
Huamin Chen, Michael Bursell
Filed: 22 Nov 19
Utility
1jj2buzb2fags30ewgy6psz1y45lrtssrhud3cx
7 Jun 22
Cyber-attacks can be mitigated by automatically coordinating responses from cyber-security tools.
Alessandro Perilli
Filed: 5 Aug 20
Utility
7ge11cvwjq1mxawlfmqq3i3fuwfqq4q2k2fabfm1
7 Jun 22
Aspects of the disclosure provide for mechanisms for memory protection of virtual machines in a computer system.
David Gilbert, Paolo Bonzini
Filed: 14 Sep 20
Utility
1n3g5yybo5yqe cg97he5vq7m6qapak84pmf4s82g3wze692g
7 Jun 22
Distributed timer task execution management is disclosed.
Paul M. Ferraro, Radoslav Husar
Filed: 20 Aug 19
Utility
n1ifqbgsqzirbis3ww6faqf38bzmpgq7tl6c2oje
7 Jun 22
Secure backwards compatible orchestration of isolated guests is disclosed.
Huamin Chen
Filed: 6 Aug 20
Utility
qg5l6et921rii2gmjuntznpfqw
7 Jun 22
Live process migration in response to real-time performance-based metrics is disclosed.
Steven E. Rosenberg
Filed: 18 Mar 20