Patents by Inventor Ross Philipson

Ross Philipson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9286094
    Abstract: Methods and systems for performing device virtualization are described herein. Hardware devices may be virtualized for use by multiple operating system instances executing on a single device. The device may be virtualized by detecting input at the device, notifying a control domain of the input, the control domain determining a virtual machine (e.g., a guest domain) for which the input is intended, and passing the input from the control domain to the guest domain. There may be multiple guest domains on the device, each capable of receiving input from the hardware being virtualized. The virtualized hardware may include, e.g., a digitizer such as a touch digitizer capable of recognizing multiple concurrent inputs. Other hardware devices can also be virtualized. Virtualization may be performed using device emulation in the control domain, or using USB passthrough, among other techniques.
    Type: Grant
    Filed: September 26, 2013
    Date of Patent: March 15, 2016
    Assignee: Citrix Systems, Inc.
    Inventors: Ross Philipson, Jennifer Herbert, Jean-Edouard Lejosne
  • Publication number: 20140109091
    Abstract: Methods and systems for performing device virtualization are described herein. Hardware devices may be virtualized for use by multiple operating system instances executing on a single device. The device may be virtualized by detecting input at the device, notifying a control domain of the input, the control domain determining a virtual machine (e.g., a guest domain) for which the input is intended, and passing the input from the control domain to the guest domain. There may be multiple guest domains on the device, each capable of receiving input from the hardware being virtualized. The virtualized hardware may include, e.g., a digitizer such as a touch digitizer capable of recognizing multiple concurrent inputs. Other hardware devices can also be virtualized. Virtualization may be performed using device emulation in the control domain, or using USB passthrough, among other techniques.
    Type: Application
    Filed: September 26, 2013
    Publication date: April 17, 2014
    Applicant: Citrix Systems, Inc.
    Inventors: Ross Philipson, Jennifer Herbert, Jean-Edouard Lejosne
  • Patent number: 8689213
    Abstract: The methods and systems described herein provide for establishing a secure communication channel between a non-trusted virtual machine and a trusted virtual machine, in a computing device executing a hypervisor hosting the trusted virtual machine, the non-trusted virtual machine, and a third virtual machine. The method includes writing, by a non-trusted virtual machine, a first string of data to a region of memory of the computing device. The method also includes detecting, by a trusted virtual machine, the first string of data written to the region of memory. The method further includes establishing a communication channel between the trusted virtual machine and the non-trusted virtual machine by locking, by the trusted virtual machine and responsive to the detection, the region of memory for the duration of the communication to prevent a third virtual machine from accessing the region of memory.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: April 1, 2014
    Assignee: Citrix Systems, Inc.
    Inventors: Ross Philipson, Steven Smith, James McKenzie, Jean Guyader
  • Publication number: 20110145821
    Abstract: The methods and systems described herein provide for establishing a secure communication channel between a non-trusted virtual machine and a trusted virtual machine, in a computing device executing a hypervisor hosting the trusted virtual machine, the non-trusted virtual machine, and a third virtual machine. The method includes writing, by a non-trusted virtual machine, a first string of data to a region of memory of the computing device. The method also includes detecting, by a trusted virtual machine, the first string of data written to the region of memory. The method further includes establishing a communication channel between the trusted virtual machine and the non-trusted virtual machine by locking, by the trusted virtual machine and responsive to the detection, the region of memory for the duration of the communication to prevent a third virtual machine from accessing the region of memory.
    Type: Application
    Filed: December 14, 2010
    Publication date: June 16, 2011
    Inventors: Ross Philipson, Steven Smith, James McKenzie, Jean Guyader