Of Instruction Patents (Class 703/26)
-
Patent number: 12242562Abstract: Embodiments use quantum conditional logic in the Quantum Phase Estimation Algorithm (QPEA) to compute eigenvalues prior to inversion. Embodiments estimate the eigenvalues of a unitary, U=eiÂt, generated by a N×N Hermitian matrix Â. The binary representations of the n-bit estimations of eigenvalues of  may be encoded in these states: |?i=|b1b2 . . . bn; ?i is an estimation of the i-th eigenvalue, excluding degeneracy, and .b1b2 . . . bn is its binary representation. To perform the eigenvalue inversion, an n-qubit controlled Ry rotation with angle ?i/2(n?1) conditioned on seeing |b1b2 . . . bn is applied for each possible n-bit binary string b1b2 . . . bn (2n values). The overall unitary is called a “uniformly controlled Ry rotation” in literature.Type: GrantFiled: May 26, 2021Date of Patent: March 4, 2025Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Romina Yalovetzky, Dylan Herman, Pierre Minssen, Marco Pistoia, Alexander Buts, Shaohan Hu
-
Patent number: 12229541Abstract: Using a common reference address when processing calls between a native application binary interface (ABI) and a foreign ABI. Based on a caller calling using a reference address, a lookup structure is used to determine whether the reference address is within a memory range storing native code and that the callee is native, or a memory range not storing native code and that the callee is foreign. Execution of a callee is initiated based on one of (i) calling the callee using the reference address within an emulator when the caller is native and the callee is foreign; (ii) calling an entry thunk when the caller is foreign and the callee is native; (iii) calling an exit thunk when the caller is native and the callee is foreign; or (iv) directly calling the callee using the reference address when the caller is native and the callee is native.Type: GrantFiled: June 13, 2023Date of Patent: February 18, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Pedro Miguel Sequeira De Justo Teixeira, Darek Josip Mihocka, Jon Robert Berry, Russell Charles Hadley, James David Cleary, Clarence Siu Yeen Dang
-
Patent number: 11961541Abstract: A system (200) for at least one of writing data to tape media (204) and reading data from the tape media (204) includes a client application (202); and a RESTful interface (212) through which the client application (202) transmits a request to at least one of write data to the tape media (204) and read data from the tape media (204) to a REST daemon (214), the RESTful interface (212) being integrated with a SCSI interface (210). The REST daemon (214) subsequently passes the request on to a data mover (208), which opens a second RESTful interface (220) with the client application (202). The client application (202) then sends the request to the data mover (208) via the second RESTful interface (220). The data mover (208) then performs the request by moving the data between the client application (202) and the tape media (204), with the data never landing on primary storage during such movement.Type: GrantFiled: February 8, 2023Date of Patent: April 16, 2024Assignee: Quantum CorporationInventors: Jeff Leuschner, Doug Burling, YingPing Lu
-
Patent number: 11947992Abstract: Implementations of the present specification provide a method and an apparatus for managing a TLB cache in a virtualization platform, where the virtualization platform runs a plurality of virtual machines, each virtual machine is allocated with a unique VPID, and all virtual logical processors in the virtual machine share the VPID; and a guest process running in the virtual machine is allocated with a PCID. An identifier field of a TLB entry in the TLB cache includes a VPID and a PCID.Type: GrantFiled: July 14, 2023Date of Patent: April 2, 2024Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Jian Feng Tan, Ti Wei Bie, An Qi Shen, Yong He, Xin Chen
-
Patent number: 11886605Abstract: Systems, methods, and machine-readable instructions stored on machine-readable media are disclosed for copying a first permission of a file to a second permission of the file, wherein the file is stored on a host file system. The first permission is changed to a third permission. A request is received to access the file from a container file system. In response to the request and before providing the container file system with access to the file, changing the third permission to the second permission. The file is provided to the container file system based on the second permission.Type: GrantFiled: September 30, 2019Date of Patent: January 30, 2024Assignee: RED HAT, INC.Inventor: Giuseppe Scrivano
-
Patent number: 11836495Abstract: The present invention provides a method of implementing an ARM64-bit floating point emulator on a Linux system, which includes: running an ARM64-bit instruction on the Linux system; applying an instruction classifier to a first feature code of a machine code indicated by the ARM64-bit instruction to determine whether the ARM64-bit instruction is an ARM64-bit floating point instruction; and, if the ARM64-bit instruction is an ARM64-bit floating point instruction, applying the instruction classifier to a second feature code of the machine code indicated by the ARM64-bit instruction to determine the ARM64-bit floating point instruction to be a specific ARM64-bit floating point instruction.Type: GrantFiled: May 4, 2022Date of Patent: December 5, 2023Assignee: AIROHA TECHNOLOGY (SUZHOU) LIMITEDInventors: Fei Yan, Peng Du
-
Patent number: 11734430Abstract: Examples include configuration of a memory controller for copy-on-write with a resource controller. Some examples include, in response to a determination to take a snapshot of memory accessible to a first component, a resource controller configuring a memory controller to treat location IDs, mapped to initial memory locations of the accessible memory, as copy-on-write for the first component and not for a second component independent of the resource controller after the configuring.Type: GrantFiled: April 22, 2016Date of Patent: August 22, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Nigel Edwards, Chris I. Dalton, Keith Mathew McAuliffe
-
Patent number: 11683234Abstract: One embodiment of the invention disclosed herein provides techniques for detecting and remediating an outlier server in a distributed computer system. A control server retrieves a group of time-series data sets associated with a first time period, where each time-series data set represents a performance metric for a different server in a group of servers. The control server generates a cluster that includes two or more of the time-series data sets, where the performance metric for each server that is associated with one of the time-series data sets in the cluster is within a threshold distance from the performance metric for the servers that are associated with the other time-series data sets in the cluster. The control server determines that a particular time-series data set corresponds to a server included in the group of servers and is not included in the cluster, and marks the server as an outlier server.Type: GrantFiled: February 11, 2016Date of Patent: June 20, 2023Assignee: NETFLIX, INC.Inventors: Roy Rapoport, Christopher Sanden, Cody Rioux, Gregory Burrell
-
Patent number: 11494170Abstract: A proxy compiler may be used within a native execution environment to enable execution of non-native instructions from a non-native execution environment as if being performed within the native execution environment. In particular, the proxy compiler coordinates creation of a native executable that is uniquely tied to a particular non-native image at the time of creation of the non-native image. This allows a trusted relationship between the native executable and the non-native image, while avoiding a requirement of compilation/translation of the non-native instructions for execution directly within the native execution environment.Type: GrantFiled: October 16, 2020Date of Patent: November 8, 2022Assignee: Unisys CorporationInventors: Andrew Ward Beale, Anthony P. Matyok, Clark C. Kogen, David Strong
-
Patent number: 11288361Abstract: The disclosed computer-implemented method for restoring applications may include (i) detecting an indication to restore a previous version of an application installed within a mobile operating system environment, (ii) retrieving the previous version of the application from a protected location within the mobile operating system environment where a sandboxing security component stored the previous version of the application, and (iii) executing the previous version of the application within a security sandbox managed by the sandboxing security component. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 29, 2019Date of Patent: March 29, 2022Assignee: NortonLifeLock Inc.Inventors: Jonathon Salehpour, Radoslav Stanev, Somard Kruayatidee
-
Patent number: 11231931Abstract: A processor includes a first core and a second core to execute computer instructions. Each of the cores includes its own private memory cache and speculative load queue. The speculative load queue stores cachelines for the computer instructions and data when the core is operating in a speculative state with respect to a process or thread. The processor includes a state tracking buffer having a state field to store a speculative exclusive ownership state for each cacheline in the speculative load queue when present therein.Type: GrantFiled: December 20, 2018Date of Patent: January 25, 2022Assignee: ADVANCED MICRO DEVICES, INC.Inventor: Sooraj Puthoor
-
Patent number: 11194756Abstract: Systems and methods for facilitating interactions with remote memory are disclosed. An observing task can execute in a first environment allocated to a first memory space, and a second memory space can be remote from the observing task. An interposition system proxy can invoke at least one function implemented using an ad hoc polymorphic programming language feature to facilitate requests from the observing task to the second memory space. This can include traversing a data structure for at least one target object, resolving an address in the second memory space based on the traversal, and at least one of reading data from and writing data to the resolved address in the second memory space.Type: GrantFiled: January 9, 2019Date of Patent: December 7, 2021Assignee: Zentific LLCInventor: Steven Maresca
-
Patent number: 11120106Abstract: The present disclosure relates to a system and method for monitoring system calls to an operating system kernel. A performance monitoring unit is used to monitor system calls and to gather information about each system call. The information is gathered upon interrupting the system call and can include system call type, parameters, and information about the calling thread/process, in order to determine whether the system call was generated by malicious software code. Potentially malicious software code is nullified by a malicious code counter-attack module.Type: GrantFiled: July 30, 2016Date of Patent: September 14, 2021Assignee: Endgame, Inc.Inventor: Matthew D. Spisak
-
Patent number: 11113058Abstract: Instructions to be executed by a processing unit that is configured to handle a predefined instruction set are prefetched. A set of instructions in the prefetched instructions to be combined as a macro instruction to be executed by a reconfigurable logic unit is identified. The macro instruction is issued to the reconfigurable logic unit rather than issuing the identified set of instructions to the processing unit.Type: GrantFiled: November 20, 2018Date of Patent: September 7, 2021Assignee: Facebook, Inc.Inventor: Ahmad Byagowi
-
Patent number: 11099851Abstract: Examples of techniques for branch prediction for indirect branch instructions are described herein. An aspect includes detecting a first register setting instruction in an instruction pipeline of a processor, wherein the first register setting instruction stores a target instruction address in a first register of the processor. Another aspect includes looking up the first register setting instruction in a first table. Another aspect includes, based on there being a hit for the first register setting instruction in the first table, determining instruction address data corresponding to a first indirect branch instruction that is associated with the first register setting instruction in a first entry in the first table. Another aspect includes updating a branch prediction for the first indirect branch instruction in a branch prediction logic of the processor based on the target instruction address.Type: GrantFiled: October 26, 2018Date of Patent: August 24, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Wolfgang Gellerich, Peter M. Held, Gerrit Koch, Martin Schwidefsky
-
Patent number: 11086647Abstract: A system configured to emulate a correlithm object processing system, includes a first input node, a second input node, and an output node. The first input node receives a first correlithm object and generates a first amplitude component of a frequency domain signal associated with the first correlithm object. The second input node receives a second correlithm object and generates a first phase component of the frequency domain signal associated with the second correlithm object. The output node receives the first amplitude component and the first phase component and generates a first real-world numeric value comprising the first amplitude component and the first phase component.Type: GrantFiled: January 3, 2020Date of Patent: August 10, 2021Assignee: Bank of America CorporationInventor: Patrick N. Lawrence
-
Patent number: 11086908Abstract: Computer technology for the provision and use of a computer code based ontology to index a repository of container images (for example, Docker container images). The ontology can then be used as an indexing mechanism to search the repository to find the best container image to use for a given set of needs and/or specifications.Type: GrantFiled: November 20, 2018Date of Patent: August 10, 2021Assignee: International Business Machines CorporationInventors: Wagner Lindberg Baccarin Arnaut, Zalkind Lincoln Dantas Rocha
-
Patent number: 11074114Abstract: The described system provides one or more processors and memory, coupled to the one or more processors, storing thereon a first OS kernel that receives a system call to access a second OS kernel function from a subsystem of the second OS retransmits the system call to one or more drivers of the first OS, support the subsystem. The system further comprises a subsystem of the second OS, comprising one or more user space components executing natively in a non-privileged mode of the one or more processors, a set of drivers associated with the second OS, the set of support components, and the one or more drivers of the first OS. The one or more drivers of the first OS receive the system call originating from the subsystem, wherein the system call is retransmitted by the first OS kernel and process the system call.Type: GrantFiled: December 29, 2017Date of Patent: July 27, 2021Assignee: VIRTUOZZO INTERNATIONAL GMBHInventors: Alexey Kostyushko, Alexey Kobets
-
Patent number: 11010165Abstract: A network processor provides for buffer allocation in a manner supporting virtual machines. Each memory allocation request is associated with an aura and a pool, which can be assigned to distinct virtual functions. When parsing a request, lookup tables for the auras and pools are generated and expanded as needed to accommodate any number of concurrent functions. Based on the identified pool of the request, a corresponding stack of pointers is accessed, and a pointer is returned to enable access to the memory.Type: GrantFiled: March 12, 2019Date of Patent: May 18, 2021Assignee: Marvell Asia Pte, Ltd.Inventors: Wilson P. Snyder, II, Shahe H. Krakirian
-
Patent number: 10970383Abstract: In an embodiment, an operating system includes a device manager that is a central repository of device information. Device drivers may communicate with the device manager over respective channels, and may request channel identifiers (Cids) to communicate with resources related to the respective devices. The device manager may provide values for resource access (or handles that the resources may use to access values). In an embodiment, the device drivers do not have the ability to allocate resources for a peripheral device. Accordingly, the security of the system may be increased. Furthermore, the resource allocation may be centrally located, simplifying the process of updating resource allocation when needed. Additionally, the device manager may delay response to requests from a given device driver until its dependencies are clear (e.g. other device drivers and hardware initializations). Thus, startup scripts may be avoided in some embodiments.Type: GrantFiled: August 30, 2018Date of Patent: April 6, 2021Assignee: Apple Inc.Inventors: Andrew C. Boyd, Denis J. Palmans, Peter H. van der Veen, Stephen J. McPolin, Gilberto Gemin, Stephane Couture, Joseph A. Sarlo
-
Patent number: 10956133Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: obtaining a native code having a large number of counters embedded for profiling. Use cases that is serviced by the native code is identified and respective use case profiles representing performance characteristics of a corresponding use case are created. Best predictors identifying one of the use case profiles are determined and variants for a production code is created with only the best predictors instead of the large number of counters. The variants are produced with the use case profiles to to a production environment for performing the use cases.Type: GrantFiled: November 28, 2018Date of Patent: March 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Geza Geleji, Martin A. Ross, Craig Stirling, Christopher J. Poole, Fiona M. Crowther
-
Patent number: 10896118Abstract: Verifying architectural compliance of a processor core using processor-sparing functions. A simulation of a model for a register-transfer level design of the processor core is performed. A first state of the model is dumped, when no error exists. An error is injected in the model. A second state of the model is dumped, after the injected error is detected in the simulation. Upon dumping the second state, the model is reset and initialized with the first state. State information of the second state is loaded in the reset and initialized model.Type: GrantFiled: March 29, 2019Date of Patent: January 19, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ophir Erez, Bodo Hoppe, Divya K. Joshi, Gerrit Koch, Parminder Singh
-
Patent number: 10839628Abstract: An access control system for a building or campus includes an access control host and a mobile device. The access control host is configured to interact with one or more physical control panels to monitor and control physical access to one or more locations of the building or campus. The mobile device includes a virtual panel configured to emulate one or more of the physical control panels to the access control host and perform one or more access control functions of the physical control panels. The virtual panel configures the mobile device to operate as a portable control panel in the access control system.Type: GrantFiled: November 1, 2018Date of Patent: November 17, 2020Assignee: Johnson Controls Technology CompanyInventors: Timothy S. Berg, Michael J. Kuzminski, Trivikram R. Ravada, Richard C. Sample, Jonathan L. Polack, David C. Haxton
-
Patent number: 10812362Abstract: A client device and method for analysis of a predetermined set of parameters associated with a radio coupling to a WLAN is provided. The client device includes a memory and a radio coupled to at least one processor. The at least one processor executes in the memory a first client Wireless Local Area Network (WLAN) stack having a plurality of layers configured to couple the radio to a WLAN. The at least one processor also executes in the memory a second client WLAN stack emulating the plurality of layers of the first client WLAN stack. The at least one processor is configured to receive, at the second client WLAN stack, data from the plurality of layers of the first client WLAN stack and analyze a predetermined set of WLAN parameters of the client device based on the data received from the plurality of layers of the first client WLAN stack.Type: GrantFiled: May 12, 2017Date of Patent: October 20, 2020Assignee: Symbol Technologies, LLCInventors: Ohad Shatil, Subramani Rajendiran
-
Patent number: 10776217Abstract: Scalable architectures, systems, and services are provided herein for creating manifest-based snapshots in distributed computing environments. In some embodiments, responsive to receiving a request to create a snapshot of a data object, a master node identifies multiple slave nodes on which a data object is stored in the cloud-computing platform and creates a snapshot manifest representing the snapshot of the data object. The snapshot manifest comprises a file including a listing of multiple file names in the snapshot manifest and reference information for locating the multiple files in the distributed database system. The snapshot can be created without disrupting I/O operations, e.g., in an online mode by various region servers as directed by the master node. Additionally, a log roll approach to creating the snapshot is also disclosed in which log files are marked. The replaying of log entries can reduce the probability of causal consistency in the snapshot.Type: GrantFiled: May 25, 2017Date of Patent: September 15, 2020Assignee: Cloudera, Inc.Inventors: Jonathan Ming-Cyn Hsieh, Matteo Bertozzi
-
Patent number: 10768930Abstract: A method provides for decoding, in a microprocessor, an instruction into data identifying a first register, a second register, an immediate value, and an opcode identifier. The opcode identifier is interpreted as indicating that an arithmetic operation is to be performed on the first register and the second register, and that the microprocessor is to perform a change of control operation in response to the addition of the first register and the second register causing overflow or underflow. The change of control operation is to a location in a program determined based on the immediate value. A processor can be provided with a decoder and other supporting circuitry to implement such method. Overflow/underflow can be checked on word boundaries of a double-word operation.Type: GrantFiled: February 2, 2015Date of Patent: September 8, 2020Assignee: MIPS Tech, LLCInventor: Ranganathan Sudhakar
-
Patent number: 10754732Abstract: A storage system may include an interface configured to connect with a mainframe computing system. The interface converts the protocol used by the mainframe computing system to another protocol. Once the data, which may be present in a backup data stream, from the mainframe computing system is converted, the storage system may direct or transmit the backup data stream for further processing such as deduplication and/or compression. The de-duplicated and/or compressed backup data stream is then stored to storage of the storage system.Type: GrantFiled: September 30, 2016Date of Patent: August 25, 2020Assignee: EMC IP HOLDING COMPANY LLCInventors: Ian Wigmore, Bruce Ferjulian, Stephen Smaldone, Arieh Don
-
Patent number: 10733103Abstract: A computer implemented method for managing cache requests includes creating a transient table including records corresponding to one or more participant caches in a system, receiving a new request with respect to an address, wherein the request includes one or more controller actions to be executed, and wherein the request corresponds to one of the one or more participant caches in the system, determining whether an entry exists in the directory table corresponding to the address indicated by the received request, determining whether an entry exists in the transient table for the address indicated by the received request, processing the transient entry indicated by the index in the directory entry to provide a current state of the address indicated by the received request, and appropriating requested controller actions according to the directory table entry, the transient entry, and the received request.Type: GrantFiled: December 13, 2017Date of Patent: August 4, 2020Assignee: International Business Machines CorporationInventor: Burkhard Steinmacher-Burow
-
Patent number: 10698472Abstract: A heterogeneous processor system includes a first processor implementing an instruction set architecture (ISA) including a set of ISA features and configured to support a first subset of the set of ISA features. The heterogeneous processor system also includes a second processor implementing the ISA including the set of ISA features and configured to support a second subset of the set of ISA features, wherein the first subset and the second subset of the set of ISA features are different from each other. When the first subset includes an entirety of the set of ISA features, the lower-feature second processor is configured to execute an instruction thread by consuming less power and with lower performance than the first processor.Type: GrantFiled: October 27, 2017Date of Patent: June 30, 2020Assignee: ADVANCED MICRO DEVICES, INC.Inventors: Elliot H. Mednick, Edward McLellan
-
Patent number: 10693736Abstract: A method for monitoring at least one simulation program includes capturing, by a computer, a plurality of simulation data from the at least one simulation program, the capturing is performed in real time while the at least one simulation program is continuously streaming the plurality of simulation data, analyzing, by the computer, the captured plurality of simulation data using a streaming data software, identifying a plurality of predefined criteria within the analyzed plurality of simulation data, the plurality of predefined criteria includes at least one of an event, a result and a variable, and providing feedback to the at least one simulation program to modify a plurality of simulation parameters according to the at least one identified event, result and variable.Type: GrantFiled: October 16, 2014Date of Patent: June 23, 2020Assignee: International Business Machines CorporationInventors: Alain E. Biem, Bruce G. Elmegreen, Tayfun Gokmen
-
Patent number: 10671400Abstract: A system includes a processor configured to: initiate atomic execution of a plurality of instruction units in a thread, starting with a beginning instruction unit in the plurality of instruction units, wherein the plurality of instruction units in the thread are not programmatically specified to be executed atomically, and wherein the plurality of instruction units includes one or more memory modification instructions; in response to executing an instruction to commit inserted into the plurality of instructions units, incrementally commit a portion of the one or more memory modification instructions that have been atomically executed so far; and subsequent to incrementally committing the portion of the memory modification instructions that have been atomically executed so far, continue atomic execution of the plurality of instruction units. The system further includes a memory coupled to the processor, configured to provide the processor with the plurality of instruction units.Type: GrantFiled: February 15, 2018Date of Patent: June 2, 2020Assignee: Azul Systems, Inc.Inventors: Gil Tene, Michael A. Wolf, Cliff N. Click, Jr.
-
Patent number: 10664287Abstract: Disclosed embodiments relate to systems and methods for implementing chained tile operations. In one example, a processor includes fetch circuitry to fetch one or more instructions until a plurality of instructions has been fetched, each instruction to specify source and destination tile operands, decode circuitry to decode the fetched instructions, and execution circuitry, responsive to the decoded instructions, to: identify first and second decoded instructions belonging to a chain of instructions, dynamically select and configure a SIMD path comprising first and second processing engines (PE) to execute the first and second decoded instructions, and set aside the specified destination of the first decoded instruction, and instead route a result of the first decoded instruction from the first PE to be used by the second PE to perform the second decoded instruction.Type: GrantFiled: March 30, 2018Date of Patent: May 26, 2020Assignee: Intel CorporationInventors: Christopher J. Hughes, Alexander F. Heinecke, Robert Valentine, Bret Toll, Jesus Corbal, Elmoustapha Ould-Ahmed-Vall
-
Patent number: 10649787Abstract: A data processing system includes exception handling circuitry to detect attempted execution of an exception-triggering processing operation which includes transfer of a data value with a given register of a register bank. Upon detection of such an exception-triggering processing operation, syndrome data is stored within a syndrome register characterising the exception-triggering processing operation with that syndrome data including the data value. The value may be stored into the syndrome register upon occurrence of the exception in the case of an aborting write instruction. The data value may be stored into the syndrome register by emulating code triggered by exception in the case of an aborting read instruction.Type: GrantFiled: September 9, 2016Date of Patent: May 12, 2020Assignee: ARM LimitedInventors: Jason Parker, Richard Roy Grisenthwaite
-
Patent number: 10641609Abstract: A route extraction apparatus includes a processor, a position measurement unit that measures a position, and a storage unit. The processor executes storage processing of storing, in the storage unit, a moving history, from a starting position to a current position, measured by the position measurement unit, and route extraction processing of extracting, based on the moving history stored in the storage unit, an actually passed shortest route among a plurality of routes from the current position to the starting position.Type: GrantFiled: October 4, 2017Date of Patent: May 5, 2020Assignee: CASIO COMPUTER CO., LTD.Inventor: Masao Sambongi
-
Patent number: 10635465Abstract: Methods and apparatuses relating to preventing the execution of a modified instruction. In one embodiment, an apparatus includes a hardware binary translator to translate an instruction to a translated instruction, and a consistency hardware manager to prevent execution of the translated instruction by a hardware processor on detection of a modification to a virtual to physical address mapping of the instruction after the translation.Type: GrantFiled: March 28, 2015Date of Patent: April 28, 2020Assignee: INTEL CORPORATIONInventors: Polychronis Xekalakis, Jamison D. Collins, Jason M. Agron
-
Patent number: 10635452Abstract: A vehicle system virtualizing add-on device hardware for a vehicle application. The system includes a computer-readable storage device comprising a client application, middleware components, kernel-space components, and a vehicle application. The client application communicates with an add-on-device server application for virtualizing the add-on-device hardware component at the vehicle. The middleware, in various embodiments, includes an emulated system-call application-program-interface module that receives add-on-device-hardware data from the client application, sends the data to the kernel-space components after processing, and receives the data having been processed at the kernel space. The middleware includes a frameworks-and-abstraction module that receives add-on-device-hardware data, having been processed at the kernel space and the emulated system-call-application-program-interface module and after processing sends the data for use at the vehicle application.Type: GrantFiled: April 10, 2017Date of Patent: April 28, 2020Assignee: GM Global Technology Operations LLCInventors: Fan Bai, John Sergakis, Lakshmi V. Thanayankizil, David P. Pop, Xin Yu
-
Patent number: 10586047Abstract: Securely sending a complete initialization package in one example implementation can include adding a resource identifier that includes a mapping of a driver to a hardware component included in a physical machine hosting VMs to an initial random-access memory (RAM) file system (INITRAMFS) stored in memory of the physical machine to form a complete initialization package, sending the complete initialization package from read-only memory (ROM) of the physical machine to a location in RAM of the physical machine accessible by a hypervisor, and authenticating that the complete initialization package is secure.Type: GrantFiled: June 30, 2014Date of Patent: March 10, 2020Assignee: Hewlett-Packard Development Company, L.P.Inventor: Richard A. Bramley, Jr.
-
Patent number: 10579753Abstract: A method implemented by a data processing system for processing data items of a stream of data items, including: accessing a specification that represents the executable logic, wherein a state of the specification for a particular value of the key specifies one or more portions of the executable logic that are executable in that state; receiving, over an input device or port, data items of a stream of data; for a first one of the data items of the stream, identifying a first state of the specification for a value of the key associated with that first one of the data items; processing, by the data processing system, the first one of the data items according to one or more portions of executable logic that are represented in the specification as being associated with the first state.Type: GrantFiled: December 12, 2016Date of Patent: March 3, 2020Assignee: Ab Initio Technology LLCInventors: Joel Gould, Scott Studer, Craig W. Stanfill
-
Patent number: 10559055Abstract: A programmable execution unit of a graphics processor that executes program instructions to perform graphics shading operations can use at least two different register file mapping configurations for mapping registers to execution threads. When a shader program is to be executed, how the shader program will use the registers is considered and the register file mapping configuration to use for the shader program is then selected based on the assessment of the register use by the shader program. Appropriate state information is then set to cause the threads being executed by the programmable execution unit to use the registers according to the selected register file mapping configuration when executing the shader program.Type: GrantFiled: July 23, 2016Date of Patent: February 11, 2020Assignee: Arm LimitedInventor: Jorn Nystad
-
Patent number: 10514926Abstract: A microprocessor implemented method for performing early dependency resolution and data forwarding is disclosed. The method comprises mapping a plurality of instructions in a guest address space into a corresponding plurality of instructions in a native address space. For each current guest branch instruction in the native address space fetched during execution, performing (a) determining a youngest prior guest branch target stored in a guest branch target register, wherein the guest branch register is operable to speculatively store a plurality of prior guest branch targets corresponding to prior guest branch instructions; (b) determining a current branch target for a respective current guest branch instruction by adding an offset value for the respective current guest branch instruction to the youngest prior guest branch target; and (c) creating an entry in the guest branch target register for the current branch target.Type: GrantFiled: March 14, 2014Date of Patent: December 24, 2019Assignee: INTEL CORPORATIONInventor: Mohammad A. Abdallah
-
Patent number: 10509707Abstract: Described are techniques for mirroring data that may include issuing, by an application on a host, a write operation that writes first data to a primary storage entity having data stored in accordance with a first format and first structure; intercepting, on the host, the write operation; and performing, on the host, first processing to process the write operation. The first processing may include: sending the write operation to a data storage system including the primary storage entity; determining whether the primary storage entity is mirrored as a second storage entity having data stored in a second format and second structure different from the first format and first structure; and responsive to determining the primary storage entity is mirrored as the second storage entity, issuing one or more second write operations to mirror the first data on the second storage entity in accordance with the second format and second structure.Type: GrantFiled: December 15, 2016Date of Patent: December 17, 2019Assignee: EMC IP Holding Company LLCInventors: Douglas E. LeCrone, Paul A. Linstead
-
Systems and methods for reducing latency when transferring I/O between an emulator and target device
Patent number: 10509877Abstract: Systems, methods, and products having pipelined inputs to and outputs from an emulator are disclosed. Using a pipeline may allow the round trip cable delay (RTCD) to be spread across two or more clock cycles. In an embodiment, an emulation system may store input data received from a target device during a first clock cycle at a target timing domain interfacing component (TTD), and transmit the stored input data during a second clock cycle after the first clock cycle. In another embodiment, the emulation system may delay transmitting the input data received at the TTD during the first clock cycle such that that the input data reaches the emulator at a predetermined time during the second clock cycle. As the RTCD is spread across multiple clock cycles, the emulation system may implement faster clocks.Type: GrantFiled: December 9, 2016Date of Patent: December 17, 2019Assignee: Cadence Design Systems, Inc.Inventors: Mitchell G. Poplack, Viktor Salitrennik, Gavin Zawalski -
Patent number: 10445928Abstract: A system and method for generating a high-density three-dimensional (3D) map are disclosed. The system comprises acquiring at least one high density image of a scene using at least one passive sensor; acquiring at least one new set of distance measurements of the scene using at least one active sensor; acquiring a previously generated 3D map of the scene comprising a previous set of distance measurements; merging the at least one new set of distance measurements with the previous set of upsampled distance measurements, wherein merging the at least one new set of distance measurements further includes accounting for a motion transformation between a previous high-density image frame and the acquired high density image and the acquired distance measurements; and overlaying the new set of distance measurements on the high-density image via an upsampling interpolation, creating an output 3D map.Type: GrantFiled: February 8, 2018Date of Patent: October 15, 2019Assignee: VAYAVISION LTD.Inventors: Youval Nehmadi, Shmuel Mangan, Shahar Ben-Ezra, Anna Cohen, Ronny Cohen, Lev Goldentouch, Shmuel Ur
-
Patent number: 10437998Abstract: A combination of hardware monitoring and binary translation software allow detection of return-oriented programming (ROP) exploits with low overhead and low false positive rates. Embodiments may use various forms of hardware to detect ROP exploits and indicate the presence of an anomaly to a device driver, which may collect data and pass the indication of the anomaly to the binary translation software to instrument the application code and determine whether an ROP exploit has been detected. Upon detection of the ROP exploit, the binary translation software may indicate the ROP exploit to an anti-malware software, which may take further remedial action as desired.Type: GrantFiled: October 26, 2015Date of Patent: October 8, 2019Assignee: McAfee, LLCInventors: Palanivelrajan Rajan Shanmugavelayutham, Koichi Yamada, Vadim Sukhomlinov, Igor Muttik, Oleksandr Bazhaniuk, Yuriy Bulygin, Dmitri Dima Rubakha, Jennifer Eligius Mankin, Carl D. Woodward, Sevin F. Varoglu, Dima Mirkin, Alex Nayshtut
-
Patent number: 10432459Abstract: A method for the automatic configuration of portable terminals, comprises the steps of detecting the geographical position of at least two portable terminals (T1-T7) and configuring said at least two portable terminals (T1-T7) on the basis of the respective geographical position which has been detected. The configuration of said at least two portable terminals (T1-T7) comprises: configuring at least one first terminal (T1; T7) with predetermined configuration parameters selected on the basis of the respective geographical position, detecting a condition of geographical proximity of at least one second terminal (T2-T6) with respect to said at least one first terminal (T1; T7) and at least partially cloning said at least one first terminal (T1; T7) into said at least one second terminal (T2-T6).Type: GrantFiled: December 24, 2012Date of Patent: October 1, 2019Assignee: DATALOGIC IP TECH, S.R.L.Inventors: Marco Guerrero, Stefano Amorosi, Elva Martinez-Ballesteros
-
Patent number: 10425279Abstract: Example methods are provided for a network management entity to implement distributed network emulation in a virtualized computing environment. The method may comprise: generating a translated network emulation rule by translating a source identifier and a destination identifier in a network emulation rule to respective source network address and destination network address, and configuring a source host or destination host to apply the translated network emulation rule to emulate a desired network condition for one or more first packets from the source network address to the destination network address. The method may further comprise: in response to detecting that the source network address or destination network address has been updated, updating the source network address or destination network address in the translated network emulation rule; and reconfiguring the source host or destination host to apply the updated translated network emulation rule.Type: GrantFiled: March 13, 2017Date of Patent: September 24, 2019Assignee: NICIRA, INC.Inventors: Ziyou Wang, Hua Wang, Jianjun Shen, Donghai Han
-
Patent number: 10372622Abstract: Mechanisms are provided, in a data processing system having a processor and a cache subsystem, for providing software controlled cache segmentation and cache segment utilization. The mechanisms segment a cache memory of the cache subsystem such that the cache memory comprises a plurality of cache segments. Each cache segment in the plurality of cache segments is associated with a different data property of data stored in the cache segment. The mechanisms configure software executing on the data processing system to direct cache accesses to one of the cache segments based on a corresponding data property of the cache accesses by the software. The mechanisms process, by the processor, a data access operation from software executing on the processor, based on an identifier of a cache segment in one of an effective address provided by the software or a page table entry corresponding to the effective address provided by the software.Type: GrantFiled: January 27, 2017Date of Patent: August 6, 2019Assignee: International Business Machines CorporationInventor: Shajith Chandran
-
Patent number: 10362053Abstract: A computer security threat sharing technology is described. A computer security threat is recognized at an organization. A partner network graph is queried for security nodes connected to a first security node representing the organization. The first security node is connected to at least a second security node representing a trusted security partner of the organization. The second security node is associated with identification information. The computer security threat recognized by the organization is communicated to the trusted security partner using the identification information associated with the second security node.Type: GrantFiled: April 26, 2016Date of Patent: July 23, 2019Assignee: Amazon Technologies, Inc.Inventors: Thomas Charles Stickle, Carl Jay Moses, Ryan Christopher Holland
-
Patent number: 10339533Abstract: At least some of the illustrative embodiments are methods including: executing a test program on a computer system coupled to a server, the test program emulating virtual users by instantiating a first user instance by calling a first reentrant function, the first user instance exiting the first reentrant function upon encountering a blocking statement in the first reentrant function; instantiating a second user instance by calling the first reentrant function, the second user instance exiting the first reentrant function upon encountering a blocking statement in the first callable function; reentering the first user instance by again calling the first reentrant function, the first reentrant function resuming execution within the reentrant function after the first blocking statement; and reentering the second user instance by calling the first reentrant function, the first reentrant function resuming execution within the reentrant function after the second blocking statement.Type: GrantFiled: July 31, 2013Date of Patent: July 2, 2019Assignee: Spirent Communications, Inc.Inventor: Jin J. Qian
-
Patent number: 10338943Abstract: Computer-implemented systems, methods, and media are provided for emulating microprocessor instructions. The computer-implemented systems, methods, and media may, for example, identify an instruction of a first software application using a second software application that emulates instructions of a type of microprocessor, add an additional bit to a length of an operation code of the instruction to create an extended operation code, wherein the extended operation code is represented in an operation code table of the second software application, and emulate execution of the instruction using the second software application and the extended operation code.Type: GrantFiled: September 17, 2015Date of Patent: July 2, 2019Assignee: SYMANTEC CORPORATIONInventors: Mircea Ciubotariu, Costin Ionescu