Patents by Inventor Paul Durrant
Paul Durrant has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210182239Abstract: Methods and systems for performing file transfers across different domains hosted by a virtualization server are described herein. A trusted domain (Dom 0) may indicate that one or more files, directories, and/or volumes are available to a second domain (guest domain) by updating share information stored in a key value store. The guest domain may enumerate the shared files to appear as if within its own file system structure. The guest domain intercepts calls to its file system, determines whether the requested data is actually stored in its own file system or in trusted domain, and proxies the file system call to the trusted domain when the requested data is shared by the trusted domain. Key value store information and shared data information and contents may be communicated using one or more memories shared between the trusted domain and guest domain.Type: ApplicationFiled: January 29, 2021Publication date: June 17, 2021Inventors: Paul Durrant, Ben Chalmers
-
Patent number: 10929344Abstract: Methods and systems for performing file transfers across different domains hosted by a virtualization server are described herein. A trusted domain (Dom 0) may indicate that one or more files, directories, and/or volumes are available to a second domain (guest domain) by updating share information stored in a key value store. The guest domain may enumerate the shared files to appear as if within its own file system structure. The guest domain intercepts calls to its file system, determines whether the requested data is actually stored in its own file system or in trusted domain, and proxies the file system call to the trusted domain when the requested data is shared by the trusted domain. Key value store information and shared data information and contents may be communicated using one or more memories shared between the trusted domain and guest domain.Type: GrantFiled: May 30, 2018Date of Patent: February 23, 2021Assignee: Citrix Systems, Inc.Inventors: Paul Durrant, Ben Chalmers
-
Publication number: 20180276229Abstract: Methods and systems for performing file transfers across different domains hosted by a virtualization server are described herein. A trusted domain (Dom 0) may indicate that one or more files, directories, and/or volumes are available to a second domain (guest domain) by updating share information stored in a key value store. The guest domain may enumerate the shared files to appear as if within its own file system structure. The guest domain intercepts calls to its file system, determines whether the requested data is actually stored in its own file system or in trusted domain, and proxies the file system call to the trusted domain when the requested data is shared by the trusted domain. Key value store information and shared data information and contents may be communicated using one or more memories shared between the trusted domain and guest domain.Type: ApplicationFiled: May 30, 2018Publication date: September 27, 2018Inventors: Paul Durrant, Ben Chalmers
-
Patent number: 10013421Abstract: Methods and systems for performing file transfers across different domains hosted by a virtualization server are described herein. A trusted domain (Dom 0) may indicate that one or more files, directories, and/or volumes are available to a second domain (guest domain) by updating share information stored in a key value store. The guest domain may enumerate the shared files to appear as if within its own file system structure. The guest domain intercepts calls to its file system, determines whether the requested data is actually stored in its own file system or in trusted domain, and proxies the file system call to the trusted domain when the requested data is shared by the trusted domain. Key value store information and shared data information and contents may be communicated using one or more memories shared between the trusted domain and guest domain.Type: GrantFiled: July 18, 2014Date of Patent: July 3, 2018Assignee: Citrix Systems, Inc.Inventors: Paul Durrant, Ben Chalmers
-
Patent number: 9280458Abstract: A technique reclaims memory pages in a virtualization platform. The technique involves receiving, by a virtual machine of the virtualization platform, an inflate command which directs a balloon driver of the virtual machine to inflate. The technique further involves issuing, by the virtual machine and in response to the inflate command, a sweep request to a hypervisor. The sweep request directs the hypervisor to (i) perform a scan of memory pages allocated to the virtual machine for a predetermined pattern of characters, (ii) de-allocate memory pages having the predetermined pattern of characters from the virtual machine (e.g., zeroed pages), the de-allocated memory pages including super pages and regular pages, and (iii) update a list of memory page mappings to reflect the de-allocated memory pages. The technique further involves completing balloon driver inflation after the list of memory page mappings is updated.Type: GrantFiled: May 11, 2012Date of Patent: March 8, 2016Assignee: Citrix Systems, Inc.Inventor: Paul Durrant
-
Publication number: 20140330868Abstract: Methods and systems for performing file transfers across different domains hosted by a virtualization server are described herein. A trusted domain (Dom 0) may indicate that one or more files, directories, and/or volumes are available to a second domain (guest domain) by updating share information stored in a key value store. The guest domain may enumerate the shared files to appear as if within its own file system structure. The guest domain intercepts calls to its file system, determines whether the requested data is actually stored in its own file system or in trusted domain, and proxies the file system call to the trusted domain when the requested data is shared by the trusted domain. Key value store information and shared data information and contents may be communicated using one or more memories shared between the trusted domain and guest domain.Type: ApplicationFiled: July 18, 2014Publication date: November 6, 2014Inventors: Paul Durrant, Ben Chalmers
-
Patent number: 8819090Abstract: Methods and systems for performing file transfers across different domains hosted by a virtualization server are described herein. A trusted domain (Dom 0) may indicate that one or more files, directories, and/or volumes are available to a second domain (guest domain) by updating share information stored in a key value store. The guest domain may enumerate the shared files to appear as if within its own file system structure. The guest domain intercepts calls to its file system, determines whether the requested data is actually stored in its own file system or in trusted domain, and proxies the file system call to the trusted domain when the requested data is shared by the trusted domain. Key value store information and shared data information and contents may be communicated using one or more memories shared between the trusted domain and guest domain.Type: GrantFiled: April 23, 2012Date of Patent: August 26, 2014Assignee: Citrix Systems, Inc.Inventors: Paul Durrant, Ben Chalmers
-
Publication number: 20130282776Abstract: Methods and systems for performing file transfers across different domains hosted by a virtualization server are described herein. A trusted domain (Dom 0) may indicate that one or more files, directories, and/or volumes are available to a second domain (guest domain) by updating share information stored in a key value store. The guest domain may enumerate the shared files to appear as if within its own file system structure. The guest domain intercepts calls to its file system, determines whether the requested data is actually stored in its own file system or in trusted domain, and proxies the file system call to the trusted domain when the requested data is shared by the trusted domain. Key value store information and shared data information and contents may be communicated using one or more memories shared between the trusted domain and guest domain.Type: ApplicationFiled: April 23, 2012Publication date: October 24, 2013Applicant: CITRIX SYSTEMS, INC.Inventors: Paul Durrant, Ben Chalmers
-
Publication number: 20120290765Abstract: A technique reclaims memory pages in a virtualization platform. The technique involves receiving, by a virtual machine of the virtualization platform, an inflate command which directs a balloon driver of the virtual machine to inflate. The technique further involves issuing, by the virtual machine and in response to the inflate command, a sweep request to a hypervisor. The sweep request directs the hypervisor to (i) perform a scan of memory pages allocated to the virtual machine for a predetermined pattern of characters, (ii) de-allocate memory pages having the predetermined pattern of characters from the virtual machine (e.g., zeroed pages), the de-allocated memory pages including super pages and regular pages, and (iii) update a list of memory page mappings to reflect the de-allocated memory pages. The technique further involves completing balloon driver inflation after the list of memory page mappings is updated.Type: ApplicationFiled: May 11, 2012Publication date: November 15, 2012Applicant: Citrix Systems, Inc.Inventor: Paul Durrant
-
Patent number: 7783784Abstract: A method for configuring a link aggregation module, including configuring the link aggregation module to use an initial network interface card (NIC) selection algorithm, servicing a first plurality of packets using a plurality of NICs in an aggregation group, wherein the initial NIC selection algorithm is used to select the one of the plurality of NICs to service at least one of the first plurality of packets, collecting a plurality of first packet distribution statistics for the aggregation group corresponding to the servicing of the first plurality of packets, and selecting a first alternate NIC selection algorithm based on the plurality of first packet distribution statistics.Type: GrantFiled: August 31, 2004Date of Patent: August 24, 2010Assignee: Oracle America, Inc.Inventors: Nicolas G. Droux, Sunay Tripathi, Paul Durrant
-
Patent number: 7616653Abstract: In general, in one aspect, the invention relates to a network interface card (NIC) aggregation framework, including a plurality of providers each configured to publish at least one port, a MAC client configured to send a packet to the at least one port, and a media access control (MAC) service module configured to map the at least one port to one of the plurality of providers, wherein the MAC service module comprises a client interface configured to interface with the MAC client and a provider interface configured to interface with each of the plurality of providers.Type: GrantFiled: September 2, 2004Date of Patent: November 10, 2009Assignee: Sun Microsystems, Inc.Inventors: Nicolas G. Droux, Sunay Tripathi, Paul Durrant
-
Patent number: 7487514Abstract: A method for obtaining a capability of a network interface card (NIC). The method includes sending a first data link provider interface (DLPI) request to the NIC and sending a DLPI acknowledgement to an operating system, where the DLPI acknowledgement includes the capability of the NIC. The method further includes enabling the capability on the operating system and establishing a direct communication channel between the NIC and the operating system using the capability.Type: GrantFiled: August 31, 2004Date of Patent: February 3, 2009Assignee: Sun Microsystems, Inc.Inventors: Yuzo Watanabe, Sunay Tripathi, Paul Durrant
-
Patent number: 7457316Abstract: A method for processing a chain of packets involving obtaining the chain of packets from a network, obtaining destination information from a first packet in the chain of packets, determining whether destination information of the first packet matches destination information of a second packet in the chain of packets, aggregating the first packet and the second packet to obtain an aggregated chain of packets, if destination information of the second packet matches the destination information of the first packet, hashing destination information to obtain a hash value, and forwarding the aggregated chain of packets to at least one client using the hash value.Type: GrantFiled: August 31, 2004Date of Patent: November 25, 2008Assignee: Sun Microsystems, Inc.Inventors: Paul Durrant, Yuzo Watanabe, Nicolas G. Droux
-
Patent number: 7234038Abstract: A method for managing virtual memory including placing a first virtual memory page in a physical memory page to create a virtual-to-physical memory mapping, associating a first page mapping cookie value with the virtual-to-physical memory mapping, determining whether the virtual-to-physical memory mapping is valid using the first page mapping cookie value, and performing a memory operation addressing the first virtual memory page if the virtual-to-physical memory mapping is valid.Type: GrantFiled: May 28, 2004Date of Patent: June 19, 2007Assignee: Sun Microsystems, Inc.Inventor: Paul Durrant
-
Patent number: 7171566Abstract: In a computer processing apparatus, when writing data to, and/or reading data from, memory, one or more instruction bits are associated with the memory address for the data to specify how encryption or decryption is to be performed. The bit(s) may be part of the memory address or separate therefrom, for example as a data header. Multiple data paths provided to write data to, and read data from, memory. On at least one of the paths is hardware operable to perform encryption or decryption. Preferably at least one path is a non-encryption/decryption path. The path to be used to write the data to, or read the data from, memory is chosen in accordance with the instruction bits associated with the memory address.Type: GrantFiled: July 11, 2002Date of Patent: January 30, 2007Assignee: Sun Microsystems, Inc.Inventor: Paul Durrant
-
Patent number: 7137039Abstract: A device driver (GRAPHICS, NETWORK, H2IO, IO2L, SERIAL) for use in a computer system comprising a processor (P), memory (M) and a device (GRAPHICS, NETWORK, H2IO, IO2L, SERIAL) operatively coupled to the computer system, the device driver being operable to control the device to monitor an operational status of the device, and consequent upon a change in the operational status to generate a fault report data indicating whether the change of status was caused internally within the device or externally by another connected device which caused the change of operational status to occur. The fault reports may also include an indication of the operational status of the device. Furthermore, if the fault report data indicates that the change of status was caused externally, the device driver may generate fault direction information indicative of an apparent direction on a connection between the device and the other device suspected as causing the indicated external fault.Type: GrantFiled: February 14, 2002Date of Patent: November 14, 2006Assignee: Sun Microsystems, Inc.Inventors: Paul Durrant, Stephen R Hanson, David S Gordon, Jeremy Harris
-
Patent number: 7100006Abstract: A method and mechanism for generating a snapshot in a computing system. On initiating a snapshot of a first storage, the content of a portion of the first storage that includes at least one block is copying to snapshot storage and a copied indication for each copied block is recording in a copy map. Responsive to any write request to a block for which no copied indication has been recorded in the copy map, the content of the block is copied to the snapshot storage, prior to writing to that block. The content of other blocks for which no copied indication has been recorded in the copy map is successively copied to the snapshot storage. A copied indication for each copied block is recorded in the copy map. The successive copying can be performed as a background task.Type: GrantFiled: January 18, 2002Date of Patent: August 29, 2006Assignee: Sun Microsystems, Inc.Inventors: Paul Durrant, Stephen R Hanson
-
Patent number: 7096387Abstract: A computer system compnses a processor (2), memory (4) and a plurality of devices (6, 8, 12), the processor (2) and the memory (4) being operable to effect the operation of a fault response processor (AFR), and a device driver (GRAPHICS, NETWORK, H2IO, IO2L, SERIAL) for each of the devices. The fault response processor (AFR) is operable to generate a model which represents the processor (2), the memory (4) and the devices (6, 8, 12) of the computer system and the inter-connection of the processor (2), memory (4) and the devices (GRAPHICS, NETWORK, H2IO, IO2L, SERIAL). The device driver (GRAPHICS, NETWORK, H2IO, IO2L, SERIAL) for each of the devices (6, 8, 12) is arranged, consequent upon a change of operational status of the device, to generate fault report data indicating whether the change of status was caused internally within the device or externally by another connected device. The devices of the computer system may be formed as a plurality of Field Replaceable Units (FRU).Type: GrantFiled: March 8, 2002Date of Patent: August 22, 2006Assignee: Sun Microsystems, Inc.Inventors: Paul Durrant, Stephen R Hanson, David S Gordon, Hossein Moiin
-
Patent number: 6795939Abstract: Resource access control is provided in a manner that avoids unnecessary resource accesses where a resource is already known to be faulty. The resource can be a memory location, a peripheral or any other addressable system component. A resource access mechanism in a processor controls access to resources. The resource access mechanism includes an address control mechanism having a plurality of address control entries, each address control entry providing fake response identification indicating whether or not a response for the corresponding address is to be faked. The resource access mechanism also includes a fake response generator for selectively generating a faked response for an address in response to the fake response identification of the corresponding address control entry indicating that a response is to be faked.Type: GrantFiled: February 13, 2001Date of Patent: September 21, 2004Assignee: Sun Microsystems, Inc.Inventors: Jeremy Graham Harris, Paul Durrant
-
Patent number: 6795938Abstract: A memory controller controls access to one or more memory units. The memory controller includes access control logic operable to receive a memory access request that references at least one memory address. It further includes a fake response record operable to record a fake response indication for an address for which a response is to be faked. The access control logic is operable on receipt of a memory access request to access the fake response record and to fake a response where a fake response indication for an address indicates that a response is to be faked. By providing such a faked response, an embodiment of the invention is able avoid multiple exceptions for the same memory location in a CPU. Also, by providing such a faked response, multiple bus errors for a memory location can also be avoided where a bus supports Direct Memory Access (DMA). The memory controller can be implemented in an integrated circuit.Type: GrantFiled: February 13, 2001Date of Patent: September 21, 2004Assignee: Sun Microsystems, Inc.Inventors: Jeremy Graham Harris, Paul Durrant