Patents by Inventor Steven Grobman

Steven Grobman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070006228
    Abstract: In some embodiments, the invention involves saving limited context information when transitioning between virtual machines. A predetermined set of instructions and events cause a trap. A bit or flag is set to indicate that the event has occurred within a virtual machine. The virtual machine monitor determines whether specific register sets must be saved or restored upon a context switch, based on whether the flag has been set. Other embodiments are described and claimed.
    Type: Application
    Filed: July 1, 2005
    Publication date: January 4, 2007
    Inventors: Steven Grobman, Michael Kinney
  • Publication number: 20060259674
    Abstract: A method and apparatus for granting access to a hardware interface shared between multiple software drivers are described. In one embodiment, the apparatus includes an interface to provide access to a hardware function or a resource. As described herein, the hardware function or resource is shared between at least two software entities, such as, for example, device drivers. In one embodiment, access verification logic denies an access request for the hardware function, unless the key associated with the access request matches a stored key semaphore. In one embodiment, a key size may be relatively large to provide a very low probability that a malicious software entity could accidentally or maliciously gain access to the software. Other embodiments are described and claimed.
    Type: Application
    Filed: May 12, 2005
    Publication date: November 16, 2006
    Inventors: Robert Dunstan, Steven Grobman, David Poisner
  • Publication number: 20060070066
    Abstract: In some embodiments, the invention involves protecting network communications in a virtualized platform. An embodiment of the present invention is a system and method relating to protecting network communication flow using packet encoding/certification and the network stack. One embodiment uses a specialized engine or driver in the network stack to encode packets before being sent to physical network controller. The network controller may use a specialized driver to decode the packets, or have a hardware implementation of a decoder. If the decoded packet is certified, the packet is transmitted. Otherwise, the packet is dropped. An embodiment of the present invention utilizes virtualization architecture to implement the network communication paths. Other embodiments are described and claimed.
    Type: Application
    Filed: September 30, 2004
    Publication date: March 30, 2006
    Inventor: Steven Grobman
  • Publication number: 20060005003
    Abstract: A method includes performing a file system integrity validation on a host machine having a hypervisor architecture when a file system of a second process is mounted on a file system of a first process. The file system integrity validation occurs independently of booting the host machine.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventor: Steven Grobman
  • Publication number: 20050289648
    Abstract: A method, apparatus and system for virtualized proxy services are disclosed herein. Specifically, on one embodiment, a virtual proxy may be implemented in a virtual machine host. The virtual proxy may reside within a dedicated or shared virtual partition and may include a set of access restrictions. In one embodiment, a network including virtual machine hosts having virtual proxies may also provide additional peer-to-peer services. More specifically, a virtual proxy on a virtual host may be configured to broadcast/multicast content requests to other virtual hosts on the network prior to accessing the content from a remote location. If the content has previously been downloaded by another virtual host on the network, the virtual proxy on the requesting host may copy the content from the peer virtual host, instead of downloading the content from the remote location again. A variety of security measures may be implemented in one embodiment to ensure data integrity.
    Type: Application
    Filed: June 23, 2004
    Publication date: December 29, 2005
    Inventors: Steven Grobman, Carl Jones
  • Publication number: 20050273636
    Abstract: A processor-based system accessing a performance profile for a program executing on a predetermined data set, executing the program on the predetermined data set, and governing processor speed in a predictive manner based at least in part on the performance profile.
    Type: Application
    Filed: June 7, 2004
    Publication date: December 8, 2005
    Inventor: Steven Grobman
  • Publication number: 20050254435
    Abstract: A method and system for selecting network connections in a multi-network environment is described.
    Type: Application
    Filed: April 25, 2005
    Publication date: November 17, 2005
    Inventors: George Moakley, Steven Grobman
  • Publication number: 20050203993
    Abstract: A system and method for optimizing data store selection for write operations are described herein. In one embodiment the method includes receiving a first request to perform a write operation on one of a plurality of multi-master data stores, wherein the one of the plurality of multi-master data stores is undetermined, and wherein the first request includes an optimization technique identifier. The method also includes creating a second request, wherein the second request requests performance of the write operation. The method further includes determining the one of the plurality of multi-master data stores to which the second request will be transmitted, and wherein the determining includes using an optimization technique associated with the optimization technique identifier. The method further includes transmitting the second request to the one of the plurality of multi-master data stores.
    Type: Application
    Filed: December 31, 2003
    Publication date: September 15, 2005
    Inventors: Steven Grobman, Craig Owen
  • Publication number: 20050135265
    Abstract: A method and system for enabling applications to optimize communications in a network environment is described. The method includes determining a set of application parameters for an application on a user device, determining one or more communications pathways coupled to the user device, determining a plurality of pathway parameters associated with each communications pathway, and selecting the communications pathway with pathway parameters that best match the application parameters of the application.
    Type: Application
    Filed: December 23, 2003
    Publication date: June 23, 2005
    Inventors: George Moakley, Steven Grobman
  • Publication number: 20050091171
    Abstract: The present disclosure relates to the authenticating a client against a pool of servers utilizing a secure authentication protocol, and, more specifically, to the authenticating a client against a pool of servers providing a common service, utilizing the Kerberos secure authentication protocol.
    Type: Application
    Filed: October 28, 2003
    Publication date: April 28, 2005
    Inventor: Steven Grobman
  • Publication number: 20040010543
    Abstract: A document may be received over a network that contains a link to a resource. Various contexts, including Internet browsers, can operate more effectively, and make better use of available bandwidth, by caching network resources so that repeated requests for cached resources can be satisfied from a local cache and avoid a duplicative transfer from a server. Instead of utilizing typical cache operations, such as taught in Request For Comments (RFC) 2616, where the server hosting the resource is queried to resolve cache correctness, instead a link to a resource is constructed so that it contains all information necessary to make a cache correctness decision without having to query the server hosting the linked resource. In addition, the link may be constructed so that the cache determination is made with respect to the contents of the linked resource, rather than with respect to metadata about the resource, e.g., name, creation date, location, etc.
    Type: Application
    Filed: July 15, 2002
    Publication date: January 15, 2004
    Inventor: Steven Grobman