Patents by Inventor Amy Santoni

Amy Santoni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200201787
    Abstract: A processor includes a processor core to execute an application; a key attribute table (KAT) register to store a plurality of key identifiers (KeyIDs) associated with the application, wherein a KeyID identifies an encryption key; a selection circuit coupled to the KAT register to select the KeyID from the KAT register based on a KeyID selector (KSEL), wherein the KSEL is associated with a page of memory to which access is performed; a cache coupled to the processor core, the cache to store a physical address, data, and the KeyID of the page of memory, wherein the KeyID is an attribute associated with the page of memory; and a memory controller coupled to the cache to encrypt, based on the encryption key identified by the KeyID, the data of the page of memory stored in the cache as it is evicted from the cache to main memory.
    Type: Application
    Filed: December 20, 2018
    Publication date: June 25, 2020
    Inventors: Vedvyas Shanbhogue, Stephen R. Van Doren, Gilbert Neiger, Barry E. Huntley, Amy Santoni, Raghunandan Makaram, Rajat Agarwal, Ronald Perez, Hormuzd Khosravi, Manjula Peddireddy, Siddhartha Chhabra
  • Patent number: 7383374
    Abstract: A method for managing virtual memory addresses includes associating a guest identifier (ID) with a virtual machine accessing a virtual memory address. A physical memory address is retrieved corresponding to the virtual memory address utilizing the guest ID. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 31, 2005
    Date of Patent: June 3, 2008
    Assignee: Intel Corporation
    Inventors: Koichi Yamada, Felix Leung, Amy Santoni, Asit Mallick, Rohit Seth, Gary Hammond
  • Publication number: 20060236094
    Abstract: A technique to improve the performance of virtualized input/output (I/O) resources of a microprocessor within a virtual machine environment. More specifically, embodiments of the invention enable accesses of virtualized I/O resources to be made by guest software without necessarily invoking host software. Furthermore, embodiments of the invention enable more efficient delivery of interrupts to guest software by alleviating the need for host software to be invoked in the delivery process.
    Type: Application
    Filed: January 19, 2005
    Publication date: October 19, 2006
    Inventors: Hin Leung, Kushagra Vaid, Amy Santoni, Dale Morris, Jonathan Ross
  • Publication number: 20060224816
    Abstract: A method for managing virtual memory addresses includes associating a guest identifier (ID) with a virtual machine accessing a virtual memory address. A physical memory address is retrieved corresponding to the virtual memory address utilizing the guest ID. Other embodiments are described and claimed.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Inventors: Koichi Yamada, Felix Leung, Amy Santoni, Asit Mallick, Rohit Seth, Gary Hammond
  • Publication number: 20060161917
    Abstract: Embodiments of apparatuses and methods for improving performance in a virtualization architecture are disclosed. In one embodiment, an apparatus includes a processor and a processor abstraction layer. The processor abstraction layer includes instructions that, when executed by the processor, support techniques to improve the performance of the apparatus in a virtualization architecture.
    Type: Application
    Filed: January 19, 2005
    Publication date: July 20, 2006
    Inventors: Hin Leung, Amy Santoni, Gary Hammond, William Greene, Kushagra Vaid, Dale Morris, Jonathan Ross
  • Publication number: 20060031672
    Abstract: In one embodiment of the present invention, a computer-implemented method is provided for use in a computer system including a plurality of resources. The plurality of resources include protected resources and unprotected resources. The unprotected resources include critical resources and non-critical resources. The method includes steps of: (A) receiving a request from a software program to access a specified one of the unprotected resources; (B) granting the request if the computer system is operating in a non-protected mode of operation; and (C) if the computer system is operating in a protected mode of operation, performing a step of denying the request if the computer system is not operating in a protected diagnostic mode of operation.
    Type: Application
    Filed: August 3, 2004
    Publication date: February 9, 2006
    Inventors: Donald Soltis, Rohit Bhatia, Eric DeLano, Bill Greene, Amy Santoni