METHODS AND APPARATUS TO BYPASS OBJECT LOCKS
    11.
    发明申请
    METHODS AND APPARATUS TO BYPASS OBJECT LOCKS 有权
    旁路对象锁的方法和装置

    公开(公告)号:US20150169384A1

    公开(公告)日:2015-06-18

    申请号:US14635790

    申请日:2015-03-02

    Abstract: Example methods and apparatus to manage object locks are disclosed. A disclosed example method includes intercepting a processor request to apply the lock on the object, identifying a performance history of the object based on a number of instances of contention, reducing computing resources of the processor by, when the number of instances is below a threshold value, generating a lock bypass for the object to cause speculative execution of target code within the object, and preventing speculative execution by applying the lock on the object when the number of instances is above the threshold value.

    Abstract translation: 公开了用于管理对象锁的示例性方法和装置。 所公开的示例性方法包括拦截处理器请求以对对象施加锁定,基于竞争的多个实例来识别对象的性能历史,当实例数低于阈值时,减少处理器的计算资源 产生对象的锁旁路,以引起对象内的目标代码的推测执行,并且当实例数高于阈值时,通过对对象应用锁来防止推测执行。

    TECHNOLOGIES FOR UNTRUSTED CODE EXECUTION WITH PROCESSOR SANDBOX SUPPORT

    公开(公告)号:US20190102537A1

    公开(公告)日:2019-04-04

    申请号:US15720083

    申请日:2017-09-29

    Abstract: Technologies for untrusted code execution include a computing device having a processor with sandbox support. The computing device executes code included in a native domain in a non-privileged, native processor mode. The computing device may invoke a sandbox jump processor instruction during execution of the code in the native domain to enter a sandbox domain. The computing device executes code in the sandbox domain in a non-privileged, sandbox processor mode in response to invoking the sandbox jump instruction. While executing in the sandbox processor mode, the processor denies access to memory outside of the sandbox domain and may deny execution of one or more prohibited instructions. From the sandbox domain, the computing device may execute a sandbox exit instruction to exit the sandbox domain and resume execution in the native domain. The computing device may execute processor instructions to configure the sandbox domain. Other embodiments are described and claimed.

    Techniques for distributed operation of secure controllers

    公开(公告)号:US10185547B2

    公开(公告)日:2019-01-22

    申请号:US14751519

    申请日:2015-06-26

    Abstract: Various embodiments are generally directed to techniques for supporting the distributed execution of a task routine among multiple secure controllers incorporated into multiple computing devices. An apparatus includes a first processor component and first secure controller of a first computing device, where the first secure controller includes: a selection component to select the first secure controller or a second secure controller of a second computing device to compile a task routine based on a comparison of required resources to compile the task routine and available resources of the first secure controller; and a compiling component to compile the task routine into a first version of compiled routine for execution within the first secure controller by the first processor component and a second version for execution within the second secure controller by a second processor component in response to selection of the first secure controller. Other embodiments are described and claimed.

    SOFTWARE-DEFINED MICROSERVICES
    15.
    发明申请

    公开(公告)号:US20180329729A1

    公开(公告)日:2018-11-15

    申请号:US15590781

    申请日:2017-05-09

    Abstract: A microservice infrastructure that securely maintains the currency of computing platform microservices implemented within a process virtual machine is provided. The computing platform microservices maintained by the infrastructure may include protected methods that provide and control access to components of the underlying computing environment. These components may include, for example, storage devices, peripherals, and network interfaces. By providing a software-defined microservice layer between these hardware components and workflows that specify high-level application logic, the embodiments disclosed herein have enhanced flexibility and scalability when compared to conventional technology.

    DISTRIBUTED AND REDUNDANT FIRMWARE EVALUATION

    公开(公告)号:US20180227391A1

    公开(公告)日:2018-08-09

    申请号:US15428274

    申请日:2017-02-09

    CPC classification number: H04L67/34 H04L41/082 H04L63/123 H04L63/1433

    Abstract: An automated method for distributed and redundant firmware evaluation involves using a first interface that is provided by system firmware of a client device to obtain, at an evaluation server, a first firmware resource table (FRT) from the client device. The evaluation server also uses a second interface that is provided by a component of the client device other than the system firmware to obtain a second FRT from the client device. The evaluation server automatically uses the first and second FRTs to identify a trustworthy FRT among the first and second FRTs. The evaluation server automatically uses the trustworthy FRT to determine whether the client device should be updated. For instance, the evaluation server may automatically use the trustworthy FRT to determine whether firmware in the client device should be updated. Other embodiments are described and claimed.

    Custom class library generation method and apparatus

    公开(公告)号:US09632757B2

    公开(公告)日:2017-04-25

    申请号:US14778521

    申请日:2014-09-10

    Abstract: Apparatuses, methods and storage media associated with generating a custom class library are disclosed herein. In embodiments, an apparatus may include an analyzer configured to receive a workload for a device and a class library used by the workload, analyze the workload and class library, identify one or more workload full API call chains, and generate information about the one or more workload full API call chains. Further, the apparatus may include a generator to generate from the class library, a custom class library for the workload that is smaller than the class library, based at least in part on the one or more workload full API call chains. Other embodiments may be disclosed or claimed.

Patent Agency Ranking