Patents by Inventor Steven Grobman

Steven Grobman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9298911
    Abstract: Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to execution of at least one program, determining an operation associated with the security exception based, at least in part, on the policy information, and causing the operation to be performed, based at least in part, on a determination that the at least one security exception occurred.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 29, 2016
    Assignee: INTEL CORPORATION
    Inventors: Gal Chanoch, Eran Birk, Baiju Patel, Steven Grobman, Tobias Kohlenberg, Rajeev Gopalakrisha
  • Publication number: 20140282832
    Abstract: Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to execution of at least one program, determining an operation associated with the security exception based, at least in part, on the policy information, and causing the operation to be performed, based at least in part, on a determination that the at least one security exception occurred.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Intel Corporation
    Inventors: Gal Chanoch, Eran Birk, Baiju Patel, Steven Grobman, Tobias Kohlenberg, Rajeev Gopalakrisha
  • Patent number: 8191062
    Abstract: A method, apparatus and system enable processor frequency governors to comprehend virtualized platforms. Specifically, in one embodiment, the processor frequency governor in a virtual host may be para-virtualized. As a result, the processor frequency governor may run in a partition on the virtualized platform and nonetheless collect and process central processing utility (“CPU”) information on the virtualized platform based on the activity of a plurality of virtual machines on the virtual host.
    Type: Grant
    Filed: March 31, 2006
    Date of Patent: May 29, 2012
    Assignee: Intel Corporation
    Inventor: Steven Grobman
  • Patent number: 7971057
    Abstract: Executing a monitor on a platform, the monitor capable of providing exclusive, secure access to an audio I/O device of the platform, executing a first partition on the platform, providing an audio device model in the first partition by directly mapping the audio I/O device from the monitor to the first partition for applications executing in the first partition, and providing exclusive, secure access to the audio I/O device to a program performing an audio function in a secure mode in the first partition.
    Type: Grant
    Filed: April 2, 2010
    Date of Patent: June 28, 2011
    Assignee: Intel Corporation
    Inventors: Steven Grobman, David Grawrock, Narendar B. Sahgal, Joe Gruber
  • Patent number: 7845009
    Abstract: Detecting a rootkit in a computing system may be achieved by detecting, by a virtual machine monitor, a virtualization trap occurring as a result of an action by a rootkit executing in a computing system; and analyzing the virtualization trap to detect the presence of the rootkit in the computing system. Action may then be taken to block the rootkit activity to safeguard the computing system.
    Type: Grant
    Filed: May 16, 2006
    Date of Patent: November 30, 2010
    Assignee: Intel Corporation
    Inventor: Steven Grobman
  • Patent number: 7788713
    Abstract: A method, apparatus and system for virtualized proxy services are disclosed herein. Specifically, on one embodiment, a virtual proxy may be implemented in a virtual machine host. The virtual proxy may reside within a dedicated or shared virtual partition and may include a set of access restrictions. In one embodiment, a network including virtual machine hosts having virtual proxies may also provide additional peer-to-peer services. More specifically, a virtual proxy on a virtual host may be configured to broadcast/multicast content requests to other virtual hosts on the network prior to accessing the content from a remote location. If the content has previously been downloaded by another virtual host on the network, the virtual proxy on the requesting host may copy the content from the peer virtual host, instead of downloading the content from the remote location again. A variety of security measures may be implemented in one embodiment to ensure data integrity.
    Type: Grant
    Filed: June 23, 2004
    Date of Patent: August 31, 2010
    Assignee: Intel Corporation
    Inventors: Steven Grobman, Carl C. Jones
  • Publication number: 20100192150
    Abstract: Executing a monitor on a platform, the monitor capable of providing exclusive, secure access to an audio I/O device of the platform, executing a first partition on the platform, providing an audio device model in the first partition by directly mapping the audio I/O device from the monitor to the first partition for applications executing in the first partition, and providing exclusive, secure access to the audio I/O device to a program performing an audio function in a secure mode in the first partition.
    Type: Application
    Filed: April 2, 2010
    Publication date: July 29, 2010
    Inventors: Steven Grobman, David Grawrock, Narendar B. Sahgal, Joe Gruber
  • Patent number: 7752436
    Abstract: Executing a monitor on a platform, the monitor capable of providing exclusive, secure access to an audio I/O device of the platform, executing a first partition on the platform, providing an audio device model in the first partition by directly mapping the audio I/O device from the monitor to the first partition for applications executing in the first partition, and providing exclusive, secure access to the audio I/O device to a program performing an audio function in a secure mode in the first partition.
    Type: Grant
    Filed: August 9, 2005
    Date of Patent: July 6, 2010
    Assignee: Intel Corporation
    Inventors: Steven Grobman, David Grawrock, Narendar B. Sahgal, Joe Gruber
  • Publication number: 20080244080
    Abstract: A processor includes non-volatile memory into which streamed application components may be pre-fetched from a slower storage medium in order to decrease stall times during execution of the application. Alternatively, the application components pre-fetched into the non-volatile memory may be from a traditionally-loaded application rather than a streamed application. The order in which components of the application are prefetched into the non-volatile memory may be based on load order hints. For at least one embodiment, the load order hints are derived from sever-side load ordering logic. For at least one other embodiment, the load order hints are provided by the application itself via a mechanism such as an application programming interface. For at least one other embodiment, the load order hints are generated by the client using profile data. Or, a combination of such approaches may be used. Other embodiments are also described and claimed.
    Type: Application
    Filed: March 29, 2007
    Publication date: October 2, 2008
    Inventors: Thomas H. James, Steven Grobman
  • Publication number: 20070271610
    Abstract: Detecting a rootkit in a computing system may be achieved by detecting, by a virtual machine monitor, a virtualization trap occurring as a result of an action by a rootkit executing in a computing system; and analyzing the virtualization trap to detect the presence of the rootkit in the computing system. Action may then be taken to block the rootkit activity to safeguard the computing system.
    Type: Application
    Filed: May 16, 2006
    Publication date: November 22, 2007
    Inventor: Steven Grobman
  • Publication number: 20070234357
    Abstract: A method, apparatus and system enable processor frequency governors to comprehend virtualized platforms. Specifically, in one embodiment, the processor frequency governor in a virtual host may be para-virtualized. As a result, the processor frequency governor may run in a partition on the virtualized platform and nonetheless collect and process central processing utility (“CPU”) information on the virtualized platform based on the activity of a plurality of virtual machines on the virtual host.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Inventor: Steven Grobman
  • Publication number: 20070150893
    Abstract: A method, apparatus and system enable enhanced processor frequency governors to comprehend virtualized platforms and utilize predictive information to enhance performance in virtualized platforms. Specifically, in one embodiment, an enhanced frequency governor in a virtual host may run within a virtual machine on the host and interact with a virtual machine manager to collect predictive information from application(s) running within each virtual machine on the host. The enhanced frequency governor may then utilize the predictive information to determine future CPU frequency requirements and raise or lower the CPU frequency and/or voltage in anticipation of the needs of the various applications.
    Type: Application
    Filed: September 7, 2006
    Publication date: June 28, 2007
    Inventor: Steven Grobman
  • Publication number: 20070127723
    Abstract: The present disclosure relates to the authenticating a client against a pool of servers utilizing a secure authentication protocol, and, more specifically, to the authenticating a client against a pool of servers providing a common service, utilizing the Kerberos secure authentication protocol.
    Type: Application
    Filed: January 5, 2007
    Publication date: June 7, 2007
    Inventor: Steven Grobman
  • Publication number: 20070050767
    Abstract: A method, apparatus and system enable a virtual diskless architecture on a virtual machine (“VM”) host. In one embodiment, a partition on the VM host may be designated a management VM and the storage controller (coupled to a storage device) on the host VM may be dedicated to this management VM. Thereafter, a second VM on the host may connect to management VM via a virtual network connection and access data on the “remote” storage device via the virtual network connection.
    Type: Application
    Filed: August 31, 2005
    Publication date: March 1, 2007
    Inventors: Steven Grobman, David Poisner
  • Publication number: 20070038997
    Abstract: Executing a monitor on a platform, the monitor capable of providing exclusive, secure access to an audio I/O device of the platform, executing a first partition on the platform, providing an audio device model in the first partition by directly mapping the audio I/O device from the monitor to the first partition for applications executing in the first partition, and providing exclusive, secure access to the audio I/O device to a program performing an audio function in a secure mode in the first partition.
    Type: Application
    Filed: August 9, 2005
    Publication date: February 15, 2007
    Inventors: Steven Grobman, David Grawrock, Narendar Sahgal, Joe Gruber
  • Publication number: 20070011444
    Abstract: A method, apparatus and system enable a virtual and a non-virtual component to be bundled together in a single binary. According to an embodiment of the present invention, an operating system may boot directly on host hardware or on a virtual machine manager. If the operating system boots directly on host hardware, the binary is capable of executing the non-virtual (“physical”) component code in the binary. If, on the other hand, the operating system boots onto a virtual machine manager, the binary is further capable of executing the virtual component code in the binary. In one embodiment, the virtual component may be para-virtualized, i.e., the component may be aware that it is running in a virtual environment.
    Type: Application
    Filed: June 9, 2005
    Publication date: January 11, 2007
    Inventors: Steven Grobman, Michael Kinney, Jeffrey Jackson
  • Publication number: 20070006228
    Abstract: In some embodiments, the invention involves saving limited context information when transitioning between virtual machines. A predetermined set of instructions and events cause a trap. A bit or flag is set to indicate that the event has occurred within a virtual machine. The virtual machine monitor determines whether specific register sets must be saved or restored upon a context switch, based on whether the flag has been set. Other embodiments are described and claimed.
    Type: Application
    Filed: July 1, 2005
    Publication date: January 4, 2007
    Inventors: Steven Grobman, Michael Kinney
  • Publication number: 20060259674
    Abstract: A method and apparatus for granting access to a hardware interface shared between multiple software drivers are described. In one embodiment, the apparatus includes an interface to provide access to a hardware function or a resource. As described herein, the hardware function or resource is shared between at least two software entities, such as, for example, device drivers. In one embodiment, access verification logic denies an access request for the hardware function, unless the key associated with the access request matches a stored key semaphore. In one embodiment, a key size may be relatively large to provide a very low probability that a malicious software entity could accidentally or maliciously gain access to the software. Other embodiments are described and claimed.
    Type: Application
    Filed: May 12, 2005
    Publication date: November 16, 2006
    Inventors: Robert Dunstan, Steven Grobman, David Poisner
  • Publication number: 20060070066
    Abstract: In some embodiments, the invention involves protecting network communications in a virtualized platform. An embodiment of the present invention is a system and method relating to protecting network communication flow using packet encoding/certification and the network stack. One embodiment uses a specialized engine or driver in the network stack to encode packets before being sent to physical network controller. The network controller may use a specialized driver to decode the packets, or have a hardware implementation of a decoder. If the decoded packet is certified, the packet is transmitted. Otherwise, the packet is dropped. An embodiment of the present invention utilizes virtualization architecture to implement the network communication paths. Other embodiments are described and claimed.
    Type: Application
    Filed: September 30, 2004
    Publication date: March 30, 2006
    Inventor: Steven Grobman
  • Publication number: 20060005003
    Abstract: A method includes performing a file system integrity validation on a host machine having a hypervisor architecture when a file system of a second process is mounted on a file system of a first process. The file system integrity validation occurs independently of booting the host machine.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventor: Steven Grobman