-
公开(公告)号:US11363067B2
公开(公告)日:2022-06-14
申请号:US16439239
申请日:2019-06-12
Applicant: Microsoft Technology Licensing, LLC
Inventor: Hari R. Pulapaka , Margarit Simeonov Chenchev , Benjamin M. Schultz , Jonathan David Wiswall , Frederick Justus Smith , John A. Starks , Richard O. Wolcott , Michael Bishop Ebersol
IPC: G06F9/455 , H04L9/40 , G06F9/50 , G06F9/54 , H04L41/5025 , H04L41/5009
Abstract: Distribution and management of services in virtual environments is described herein. In one or more implementations, a service distribution and management model is implemented in which system services and applications are seamlessly distributed across multiple containers which each implement a different runtime environment. In one or more implementations, a system for distributing access to services in a host operating system of a computing device includes a host operating system configured to implement a host runtime environment, and one or more services implemented by the host operating system. The system further includes a service control manager configured to enable communication between a client stub of a service implemented in a client runtime environment and a service provider of the service that is implemented in a service runtime environment that is separate from the first client runtime environment.
-
公开(公告)号:US11228483B2
公开(公告)日:2022-01-18
申请号:US17242964
申请日:2021-04-28
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Mohit Garg , Benjamin M. Schultz , Poornananda R. Gaddehosur
IPC: G06F15/173 , H04L12/24 , H04L12/26
Abstract: Disclosed herein are systems, methods, computer media, and apparatuses for providing resource tracking, such as in a data center environment. A control and monitoring node receives updates indicating instantiation of resources in the computing system network. The control and monitoring node determines that there are duplicate resources in the network, and then determines which of the duplicate resources to provide connectivity to. The control and monitoring node provides network configuration updates to various networking resources in the network to provide network connectivity to the one of the duplicate resources in the network.
-
公开(公告)号:US10855725B2
公开(公告)日:2020-12-01
申请号:US15171917
申请日:2016-06-02
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navin Narayan Pai , Charles G. Jeffries , Giridhar Viswanathan , Benjamin M. Schultz , Frederick J. Smith , Lars Reuther , Michael B. Ebersol , Gerardo Diaz Cuellar , Ivan Dimitrov Pashov , Poornananda R. Gaddehosur , Hari R. Pulapaka , Vikram Mangalore Rao
Abstract: A host operating system running on a computing device monitors network communications for the computing device to identify network resources that are requested by the computing device. The host operating system compares requested network resources against security policies to determine if the requested network resources are trusted. When an untrusted network resource is identified, the host operating system accesses the untrusted network resource within a container that is isolated from the host operating system kernel using techniques discussed herein. By restricting access to untrusted network resources to isolated containers, the host operating system is protected from even kernel-level attacks or infections that may result from an untrusted network resource.
-
公开(公告)号:US20190370436A1
公开(公告)日:2019-12-05
申请号:US15994928
申请日:2018-05-31
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ahmed Saruhan Karademir , Sudeep Kumar Ghosh , Ankit Srivastava , Michael Trevor Pashniak , Benjamin M. Schultz , Balaji Balasubramanyan , Hari R. Pulapaka , Tushar Suresh Sugandhi , Matthew David Kurjanowicz , Giridhar Viswanathan
Abstract: Techniques for memory assignment for guest operating systems are disclosed herein. In one embodiment, a method includes generating a license blob containing data representing a product key copied from a record of license information in the host storage upon receiving a user request to launch an application in the guest operating system. The method also includes storing the generated license blob in a random memory location accessible by the guest operating system. The guest operating system can then query the license blob for permission to launch the application and launching the application in the guest operating system without having a separate product key for the guest operating system.
-
公开(公告)号:US10404791B2
公开(公告)日:2019-09-03
申请号:US14960218
申请日:2015-12-04
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ranjit Puri , Benjamin M. Schultz , David G. Thaler
IPC: G06F15/173 , G06F15/16 , H04L29/08 , H04L12/26 , G06F9/50
Abstract: A load balancer receives a client request from a client device for a connection to an application. The load balancer queries a monitoring server for a list of one or more application servers associated with the application. The monitoring server determines, based on cache state information of the plurality of application servers, the list of one or more application servers. The load balancer establishes a connection on behalf of the client device to one of the application servers.
-
公开(公告)号:US10380081B2
公开(公告)日:2019-08-13
申请号:US15476641
申请日:2017-03-31
Applicant: Microsoft Technology Licensing, LLC
Inventor: Kyle Thomas Brady , John C. Gordon , Benjamin M. Schultz , Ali Hajy , Morakinyo Korede Olugbade , Hari R. Pulapaka , Paul McAlpin Bozzay , Frederick Justus Smith , Mehmet Iyigun
Abstract: A container for one or more scheduled meeting is pre-built for the meeting prior to the meeting occurring. The container can be built in a variety of manners, including using both static and dynamic techniques. Dynamic techniques for building a container allows a pre-build system to include more pertinent data in the container whereas static techniques reduce computing workload and allow for pre-building containers for unscheduled meetings. A combination of static and dynamic building techniques can be applied using a layer repository. Alternately, a static base layer can be used and customized for scheduled meetings.
-
公开(公告)号:US10044525B2
公开(公告)日:2018-08-07
申请号:US15859247
申请日:2017-12-29
Applicant: Microsoft Technology Licensing, LLC
Inventor: Poornananda R. Gaddehosur , Benjamin M. Schultz
Abstract: Template-driven locally calculated policy updates for virtualized machines in a datacenter environment are described. A central control and monitoring node calculates and pushes down policy templates to local control and monitoring nodes. The templates provide boundaries and/or a pool of networking resources, from which the local control and monitoring node is enabled to calculate policy updates for locally instantiated virtual machines and containers.
-
公开(公告)号:US20170269978A1
公开(公告)日:2017-09-21
申请号:US15076277
申请日:2016-03-21
Applicant: Microsoft Technology Licensing, LLC
Inventor: Jeffrey M. Engel , Frederick J. Smith , Hari R. Pulapaka , Benjamin M. Schultz , Mehmet Iyigun , John Richardson , Taylor Stark
CPC classification number: G06F9/541 , G06F8/65 , G06F9/445 , G06F9/44536 , G06F9/45558 , G06F2009/45579
Abstract: Techniques for implementing operating system layering are described herein. In one example, a method includes managing one or more container temporary storage spaces and one or more container runtime environments. Furthermore, the method includes loading, one or more drivers to provide compatibility between a container operating system and a host operating system, the one or more drivers comprising application program interface (API) compatibility libraries to enable API compatibility between the container operating system and the host operating system; metadata arbitration logic to enable compatibility between the container operating system and the host operating system by modifying container operating system references; and file arbitration logic to modify operating system file locations accessed by the container operating system and the host operating system.
-
公开(公告)号:US12225050B2
公开(公告)日:2025-02-11
申请号:US17706567
申请日:2022-03-28
Applicant: Microsoft Technology Licensing, LLC
Inventor: Hari R. Pulapaka , Margarit Simeonov Chenchev , Benjamin M. Schultz , Jonathan David Wiswall , Frederick Justus Smith , John A. Starks , Richard O. Wolcott , Michael Bishop Ebersol
IPC: H04L9/40 , G06F9/455 , G06F9/50 , G06F9/54 , G06F21/53 , H04L41/5009 , H04L41/5025
Abstract: Distribution and management of services in virtual environments is described herein. In one or more implementations, a service distribution and management model is implemented in which system services and applications are seamlessly distributed across multiple containers which each implement a different runtime environment. In one or more implementations, a system for distributing access to services in a host operating system of a computing device includes a host operating system configured to implement a host runtime environment, and one or more services implemented by the host operating system. The system further includes a service control manager configured to enable communication between a client stub of a service implemented in a client runtime environment and a service provider of the service that is implemented in a service runtime environment that is separate from the first client runtime environment.
-
公开(公告)号:US11797328B2
公开(公告)日:2023-10-24
申请号:US16601483
申请日:2019-10-14
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Margarit Chenchev , Benjamin M. Schultz , Gopikrishna Kannan , Graham Wong , Harish Srinivasan , Arup Roy , Hari Pulapaka
CPC classification number: G06F9/45558 , G06F9/5077 , G06F2009/4557
Abstract: A virtualization partition (VP) is executed by a virtualization layer. The VP contains guest software that executes in isolation within the VP. The guest software has a background task (BT) that needs to be performed in the future. The BT is virtualized by a BT service that executes outside of the VP. The guest software registers the BT, through the virtualization layer, with a BT virtualization service. An event occurs outside of the VP that triggers the BT. The BT virtualization service responds to the event by assuring that the VP is available (executing), and optionally triggers (possibly indirectly) the execution of code in the application.
-
-
-
-
-
-
-
-
-