This page is updated frequently with new Virtualization-related patent applications.
|Apparatus and providing virtualization service platform|
Disclosed is a technical idea of supporting such that a simulation service corresponding to an internet of things terminal is provided through a user terminal. An apparatus for providing a virtualization service platform according to an embodiment of the present invention includes a storage unit for storing a list of iot terminals; a processing unit for identifying an iot terminal selected from the list of the stored iot terminals; and a control unit for requesting that a cloud server provides a simulation service corresponding to the identified iot terminal, wherein the cloud server provides, as a response to the request, at least one virtualization object corresponding to the identified iot terminal to a user terminal..
|Virtualization of natural radio environments using field traces and a channel emulator|
Natural radio environments are emulated using field traces and a channel emulator to test radio devices. In one example, a test includes a field trace source to replay recorded field traces, a protocol tester to receive the replayed field traces to extract configuration parameters from the replayed field traces, to extract signals from the field traces, to send the signals to a device under test, and to receive signals from the device under test, and a channel emulator coupled to the field trace source, and between the protocol tester and the device under test, to receive the replayed field traces, to mix the replayed field traces with signals and to emulate the channel between the protocol tester and the device under test..
Intel Ip Corporation
Embodiments of an invention for virtualization exceptions are disclosed. In one embodiment, a processor includes instruction hardware, control logic, and execution hardware.
|Systems and methods for multi-root input/output virtualization-based management by single service processor|
In accordance with embodiments of the present disclosure, a system may include a chassis configured to receive a plurality of modular information handling systems, a switch configured to be communicatively coupled to modular information handling systems received in the chassis, and a physical service processor communicatively coupled to the switch. The physical service processor may be configured instantiate one or more virtual service processors, each of the one or more virtual service processors allocated to an associated modular information handling system received in the chassis and configured to provide for out-of-band management of its associated modular information handling system and instantiate one or more virtual functions, each of the one or more virtual functions allocated to an associated virtual service processor and associated modular information handling system received in the chassis and configured to provide a communications interface between its associated virtual service processor and associated modular information handling system..
Dell Products L.p.
|System and enabling service lifecycle based policy, licensing, and charging in a network function virtualization ecosystem|
Systems and computing devices may be configured to intelligently apply service-level policy, charging, licensing, and authorization controls in a telecommunication system that implements or uses network function virtualization technologies. A server computing device deployed in the telecommunication network may be configured to receive a policy request message relating to a network service lifecycle event from another network component, use the information included in the received policy request message to make a service-level policy decision, generate a trigger definition relating to the network service lifecycle event based on the policy decision, generate a policy response message that includes the trigger definition, and send the generated policy response message to the network component..
Openet Telecom Ltd.
|Technologies for end-to-end biometric-based authentication and platform locality assertion|
Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave.
|Method and capturing operation in a container-based virtualization system|
The present application discloses a method and apparatus for capturing an operation, and security control in a container-based virtualization system. A specific implementation of the method for capturing the operation includes: detecting, in a user mode, a process launch operation in a container of the container-based virtualization system; and performing, in a kernel mode, a step of capturing a signal processing operation, if the process launch operation is detected, the step of capturing the signal processing operation comprising: determining a presence of an unprocessed signal in the process; causing an executable instruction indicated by the unprocessed signal to jump to an entry address of a self-defined first function, and passing a signal number of the unprocessed signal to the first function, if the unprocessed signal exists; and capturing a signal processing operation corresponding to the passed signal number, if the first function is called.
Beijing Baidu Netcom Science And Technology Co., Ltd.
|Zero footprint application virtualization|
Systems, methods, and computer-readable media for delivering an interactively updated application to a browser without requiring end users to install software locally are provided. Browser capabilities are detected.
Cerner Innovation, Inc.
|Method for processing interrupt by virtualization platform, and related device|
A method for processing an interrupt by a virtualization platform, and a related device, where the method includes determining an nth physical central processing unit (pcpu) from u target pcpus when an ith physical interrupt occurs in a jth physical input/output device, setting the nth pcpu to process the ith physical interrupt, determining an ith virtual interrupt according to the ith physical interrupt, and determining an mth virtual central processing unit (vcpu) from v target vcpus such that a kth virtual machine (vm) uses the mth vcpu to execute the ith virtual interrupt, where u, v, i, j, k, m, and n are positive integers while u and v are greater than or equal to 1.. .
Huawei Technologies Co., Ltd.
|System and trusted operability when moving between network functions virtualization states|
A method of establishing trusted operability between virtualized states of a network functions virtualization (nfv) system providing a network service and operating in a virtual computing environment is disclosed. The method comprises receiving, by a physical server, a request to execute a trusted process, wherein the physical server comprises a processor with at least one core processing unit.
Sprint Communications Company L.p.
Programmable logic device virtualization
A device includes a programmable logic fabric. The programmable logic fabric includes a first area, wherein a first persona is configured to be programmed in the first area.
Apparatus and booting virtual machines
Disclosed herein are an apparatus and method for booting a virtual machine. The apparatus for booting a virtual machine includes: an access unit for accessing a virtual disk, corresponding to a virtual machine that exists in a virtualization area, using a trap generated by a trap generation unit, and for controlling the input and output of data stored in the virtual disk; an extraction unit for extracting data used for booting from the virtual disk; and a verification unit for extracting a trusted boot image from image storage and verifying the integrity of the data used for booting based on a result of comparing the trusted boot image with the data used for booting..
Electronics And Telecommunications Research Instit
Networking functions in a micro-services architecture
A method may include receiving a request to provide at least one application session, and generating a networking architecture that includes at least one virtual route reflector front end (vrr fe), at least one back end work unit, and at least one routing information base (rib) in a virtualization environment. The method includes implementing the at least one application session via the at least one vrr fe, the at least one back end work unit, and the at least one rib.
Verizon Patent And Licensing Inc.
Creating additional security containers for transparent network security for application containers based on conditions
A security container of a container environment monitors a resource load in a container environment, the container environment including a container service providing operating system-level virtualization for one or more application containers connected to a virtual switch within the container environment, the one or more application containers having their traffic intercepted by the security container for inspection. The security container activates, in response to determining that the monitored resource load meets a condition in a network load policy, a new security container.
Architecture of transparent network security for application containers
A system comprises one or more application containers, each application container including computer-readable instructions and initiated via a container service and isolated using operating system-level virtualization. The system also comprises one or more virtual switches configured to route traffic from the application containers.
Transparent network security for application containers
A security container of a container environment receives an indication of a new application container connected to a virtual switch of a server, the connection established by a container service providing operating system-level virtualization for each application container. The security container disconnects a first connection from the virtual switch to the application container at the application container.
Virtual network abstraction
A method of defining a virtual network across a plurality of physical hosts is provided. At least two hosts utilize network virtualization software provided by two different vendors.
Data retrieval/distribution method and apparatus, and storage medium
In a data retrieval/distribution apparatus which retrieves designated information from the collected data in accordance with a retrieval/distribution request sent from a data retrieval/distribution client, and sends a retrieval result to the data retrieval/distribution client, the data retrieval/distribution client sends, to the data retrieval/distribution server, the retrieval/distribution request including a first retrieval condition using a virtual data conversion definition, which is a virtualization of data conversion definitions as a definition for converting the collected data into a distribution format, a processing unit of the data retrieval/distribution apparatus generates a second retrieval condition using each of the data conversion definitions from the first retrieval condition, executes retrieval processing according to the generated second retrieval condition, and sends a retrieval result of the retrieval processing to the data retrieval/distribution client as a retrieval result according to the first retrieval condition.. .
Methods of cache preloading on a partition or a context switch
A scheme referred to as a “region-based cache restoration prefetcher” (recap) is employed for cache preloading on a partition or a context switch. The recap exploits spatial locality to provide a bandwidth-efficient prefetcher to reduce the “cold” cache effect caused by multiprogrammed virtualization.
International Business Machines Corporation
Managing virtual machine instances utilizing an offload device
Generally described, the present application relates to systems and methods for the managing virtual machines instances using a physical computing device and an offload device. The offload device can be a separate computing device that includes computing resources (e.g., processor and memory) separate from the computing resources of the physical computing device.
Amazon Technologies, Inc.
Method and light-weight virtualization contexts
A processor comprises a register to store a first pointer to a context data structure specifying a virtual machine context, the context data structure comprising a first field to store a second pointer to a plurality of realm switch control structures (rscss), and an execution unit comprising a logic circuit to execute a virtual machine (vm) according to the virtual machine context, wherein the vm comprises a guest operating system (os) comprising a plurality of kernel components, and wherein each rscs of the plurality of rscss specifies a respective component context associated with a respective kernel component of the plurality of kernel components, and execute a first kernel component of the plurality of kernel components using a first component context specified by a first rscs of the plurality of rscss.. .
Dirty memory tracking with assigned devices by exitless paravirtualization
An example method of tracking memory modified by an assigned device includes allocating, by a hypervisor running a virtual machine, guest memory to a guest running on the virtual machine, where a device is assigned to the virtual machine. The method also includes reading, while the virtual machine is running on the hypervisor, a first input/output (i/o) state that indicates whether the device is currently processing one or more i/o requests, where the first i/o state is writable by the guest.
Red Hat Israel, Ltd.
Technologies for multi-level virtualization
Technologies for multi-level virtualization include a computing device having a processor that supports a root virtualization mode and a non-root virtualization mode. A non-root hypervisor determines whether it is executed under control of a root hypervisor, and if so, registers a callback handler and trigger conditions with the root hypervisor.
3d model generation from map data
Methods and systems are described for generating a three dimensional (3d) model from map data, for example, for 3d printing, 3d virtualization, etc. In one aspect, a method for generating a 3d model may include obtaining map data corresponding to an area or volume, for example, based on a selection of an area of a map.
Microsoft Technology Licensing, Llc
Core testing machine
A core testing executor/processor for testing a plurality of devices simultaneously using virtualization containers to connect to interfaces of corresponding devices under test is disclosed.. .
Method to virtualize large files in a sandbox
There is provided a method and system with an improved bitmap access control method of file virtualization for large files in sandbox. The process divides a large file to pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk.
Reliability resource allocation method and apparatus
The present disclosure provides a reliability resource allocation method and apparatus. The method includes: receiving, by an nfvo (network functions virtualization orchestrator), a reliability requirement of a user for an application service; decomposing, by the nfvo, the reliability requirement to determine a reliability requirement of a virtual machine providing the application service; selecting, by the nfvo from a preset reliability information base according to the reliability requirement of the virtual machine, a reliability resource that meets the reliability requirement of the virtual machine; and sending, by the nfvo, the reliability resource to a vim (virtualized infrastructure manager), so that the vim starts the reliability resource.
Huawei Technologies Co., Ltd.
Adaptive dynamic selection and application of multiple virtualization techniques
Autonomous selection between multiple virtualization techniques implemented in a virtualization layer of a virtualized computer system. The virtual machine monitor implements multiple virtualization support processors that each provide for the comprehensive handling of potential virtualization exceptions.
Dynamic register virtualization
Aspects of the disclosure are related to a method, apparatus, and system for dynamic register virtualization, comprising: detecting a subroutine call; generating a register virtualization mapping for the subroutine call; applying the register virtualization mapping to instructions within the subroutine call; detecting a return of the subroutine call; and stopping the register virtualization mapping for the subroutine call at the return of the subroutine call.. .
Method, apparatus, and system for implementing virtualized network management
A method, an apparatus, and a system for implementing virtualized network management are provided, where the method includes: setting, by a network function virtualization orchestrator or an operation support system, configuration information of virtualized network management, where the configuration information includes at least one or a combination of the following configuration information: configuration information of a network management function, configuration information of a topology relationship between a network management function and another virtualized network entity, configuration information of a network management related interface, configuration information of a life cycle, configuration information of a network management performance requirement, or configuration information of a deployment policy; and instructing, by the network function virtualization orchestrator or the operation support system, a network management virtualization manager to complete, according to the configuration information, network management function virtualization. According to this technical solution, low-cost and fast network management deployment can be implemented..
Huawei Technologies Co., Ltd.
A network virtualization authority (nva) device generates a virtual network virtualization edge (nve) device for members of a link aggregation group and assigns an internet protocol (ip) address to the virtual nve.. .
Hangzhou H3c Technologies Co., Ltd.
Input/output signal bridging and virtualization in a multi-node network
In an aspect, an integrated circuit obtains a set of general purpose input/output (gpio) signals for one or more peripheral devices, obtains a first virtual gpio packet that includes the set of gpio signals independent of a central processing unit, and transmits the first virtual gpio packet to the one or more peripheral devices over an i3c bus independent of the central processing unit. The integrated circuit may further obtain a set of configuration signals for configuring one or more gpio pins of the one or more peripheral devices, obtain a second virtual gpio packet that includes the set of configuration signals independent of the central processing unit, and transmit the second virtual gpio packet to the one or more peripheral devices over the i3c bus independent of the central processing unit..
Systems and methods for offloading link aggregation to a host bus adapter (hba) in single root i/o virtualization (sriov) mode
A new approach is proposed to offload of link aggregation from a host to a hba in sriov mode. The hba first creates one or more link aggregation offload engines each having one or more physical ports and to establish a first link between a vm running on the host and one of the link aggregation offload engines for network data transmission with the vm.
Hybrid backup and recovery management system for database versioning and virtualization with data transformation
A hybrid backup and recovery management system for database versioning and virtualization with data transformation is disclosed. The hybrid backup and recovery management system includes at least one original storage device, at least one target storage device, a database managing sub-system, and a conversion module.
Prophetstor Data Services, Inc.
Installing software where operating system prerequisities are unmet
A method for installing a computer program is provided, which includes: determining at a beginning of an installation procedure of the computer program whether an operating system being executed on the computer systems supports a prerequisite component for installing and executing the computer program by using operating system support information corresponding to the computer program. Based on determining that the prerequisite component is not supported by the operating system, performing: setting up a container comprising the prerequisite component using operating system level virtualization, installing the computer program in the container, and providing information on how to access the computer program being executed on the container..
International Business Machines Corporation
Method and virtual channel station information based wireless radio access network virtualization
Disclosed within is a communication architecture for medium access control (mac) layer virtualization, where the architecture is made up of: a mac layer, a plurality of physical resource blocks (rbs) associated with the mac layer, a plurality of virtual medium access control (vmac) layers (each vmac layer corresponding to a separate service group, where each service group programs its own scheduling logic in each vmac instance), a plurality of virtual resource blocks (vrbs) associated with each vmac layer (the vrbs filled with data packets according to the scheduling logic in each vmac instance), where the mac layer virtualizes the rbs as vrbs and assigns them to each vmac layer.. .
Visualization for network virtualization platform
Concepts and technologies disclosed herein are directed to visualizations for network virtualization platforms (“nvps”). According to one aspect disclosed herein, a computer system executing a visualization component can obtain data associated with a nvp.
At&t Intellectual Property I, L.p.
System and radio access virtualization
A method embodiment includes defining, by a network controller, one or more operation modes for a radio node in a network. The one or more operation modes includes a hyper transceiver mode, where the hyper transceiver mode configures a virtual transmission point to cooperatively communicate with a virtual reception point in accordance with neighborhood relations of a target radio node.
Huawei Technologies Co., Ltd.
Driving device for display panel, and display panel
A driving device for a display panel and a display panel relate to the technical field of display. virtualization algorithm and backlight adjustment algorithm are integrated in the driving integrated unit (12), so that a single processing system can realize both a virtual display function and a backlight adjustment function.
Beijing Boe Optoelectronics Technology Co., Ltd.
Systems and methods involving features of hardware virtualization, hypervisor, pages of interest, and/or other features
Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or memory access. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a detection mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or notification of, and action by a monitoring guest upon access by a monitored guest to predetermined physical memory locations..
Lynx Software Technologies, Inc.
Universal vnfm and managing vnf
A universal virtual network function manager (vnfm) in accordance with an embodiment of the present invention includes: an orchestrator-linked interface block configured to receive a command for a virtual network function (vnf) management from a network function virtualization orchestrator (nfvo) and to analyze the command; and a vnf management block configured to manage a plurality of vnfs, each produced by a different vendor, according to the command.. .
Electronics And Telecommunications Research Institute
System for consolidating heterogeneous data centers through virtualization of services
A system for resource provisioning for content delivery of multiple services is disclosed. The system may be configured to offer multiple services, wherein at least one first offered service is delivery of prerecorded content and at least one second offered service is content delivered according to a deadline.
At&t Intellectual Property I, L.p.
Contactless communication interface systems and methods
Embodiments discussed herein refer to systems, methods, and circuits for managing and establishing contactless communications lanes between two contactlessly coupled systems. A contactless communication lane can be formed for each coupled pair of contactless communication units existing in the two systems.
Keyssa Systems, Inc.
System and tunnel stitching transport
A first network element (ne) implemented as a network virtualization edge (nve) includes a receiver configured to receive a packet comprising a destination address, a processor coupled to the receiver and configured to obtain a tunnel identifier of an overlay tunnel that communicatively couples a second ne to a third ne on an overlay path toward the destination address, add the tunnel identifier to an encapsulation header of the packet, and add an address of the second ne to an outer header of the packet, and a transmitter coupled to the processor and configured to transmit the packet to the second ne, wherein the packet is forwarded from the second ne to the third ne via the overlay tunnel identified by the tunnel identifier.. .
Futurewei Technologies, Inc.
System and network function virtualization resource management
Systems and methods for network function virtualization (nfv) resource management are disclosed that include receiving, by a network functions virtualization orchestrator (nfvo), a reuse requirement for a first network service (ns) and determining, by the nfvo, that at least one constituent virtual network function (vnf) instance in the first ns is retainable for reuse in a second ns according to the reuse requirement when the first ns is to be terminated. In some embodiments, these systems and methods also include retaining, by the nfvo, the at least one constituent vnf instance in the first ns for reuse in the second ns..
Futurewei Technologies, Inc.
Virtualization of networking services
A method of configuring a virtual network comprises: running a user-interactive business requirements wizard from a server, the wizard collecting business requirements from a user; translating the business requirements into technical requirements for a network configuration using the server; selecting a network configuration from a network configuration database using the server, the selecting utilizing the technical requirements; testing the network configuration using a processor; monitoring the testing and generating new facts regarding performance of the network configuration, using the processor; feeding back the new facts to the server for use by the server in the selecting; and repeating the selecting, testing, monitoring and generating, and feeding back, until the server determines a criterion for network stability has been reached. The method may include automatically discovering local network characteristics using a networking device, prior to the selecting, sending the characteristics to the server for use by the server in the selecting..
Aerohive Networks, Inc.
Method and sve redundancy
Systems and methods for providing service virtualization endpoint (sve) redundancy in a two-node, active-standby form. An active-standby pair of sves register with a cloud-centric-network control point (ccn-cp) as a single service node (sn) using a virtual ip address for both a control-plane and a data-plane.
Cisco Technology, Inc.
Network functions virtualization network system and data processing method, and apparatus
Embodiments of the present invention provide a network functions virtualization network system, method, and an apparatus. An nso node is connected to a first network node by using an operation support-network service orchestration interface, the nso node is connected to an ro node by using a network service orchestration-resource management orchestration interface, and the nso node is connected to a catalog; the ro node is connected to a first network node by using an operation support-resource management orchestration interface, the ro node is connected to a vnfm node, the ro node is connected to a vim node, and the ro node is separately connected to the catalog, a network functions virtualization instance, and a network functions virtualization infrastructure resource.
Huawei Technologies Co., Ltd.
Graphical User Interface
Follow us on Twitter
This listing is a sample listing of patent applications related to Virtualization for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Virtualization with additional patents listed. Browse our RSS directory or Search for other possible listings.