G06F9/45537

Apparatus and method for handling page protection faults in a computing system

Method and apparatus for handling page protection faults in combination particularly with the dynamic conversion of binary code executable by a one computing platform into binary code executed instead by another computing platform. In one exemplary aspect, a page protection fault handling unit is used to detect memory accesses, to check page protection information relevant to the detected access by examining the contents of a page descriptor store, and to selectively allow the access or pass on page protection fault information in accordance with the page protection information.

Video game overlay

A video server is configured to provide streaming video to players of computer games over a computing network. The video server can provided video of different games to different players simultaneously. This is accomplished by rendering several video streams in parallel using a single GPU (Graphics Processing Unit). The output of the GPU is provided to graphics processing pipelines that are each associated with a specific client/player and are dynamically allocated as needed. A client qualifier may be used to assure that only clients capable of presenting the streaming video to a player at a minimum level of quality receive the video stream. Video frames provided by the video server optionally include overlays added to the output of the GPU. These overlays can include voice data received from another game player.

Dynamic functional partitioning for WiFi protected access 2 (WPA2) pass-through virtual network function (VNF)
11096119 · 2021-08-17 · ·

A service provider (SP) network device or system can operate to enable a WiFi protected access 2 (WPA2) pass-through with a user equipment (UE) and further define various partitions between a physical access point (pAP) and a virtual AP (vAP) according to one or more VNFs based on one or more communication link parameters (e.g., latency). The WPA2 pass-through can be an interface connection that passes through a computer premise equipment (CPE) or wireless residential gateway (GW) without the CPE or GW modifying or affecting the data traffic such as by authentication or security protocol. The SP network device can receive traffic data from a UE through or via the WPA 2 pass-through from a UE of a community Wi-Fi network at a home, residence, or entity network.

Trust-based resource allocation

Methods and systems for provisioning computing resource instances among implementation resources based on trust to reduce interference between computing resource instances implemented by the same implementation resources. In an embodiment, a trust rating is determined for a computing resource instance based at least in part on one or more trust factors. The suitability of an implementation resource to implement the given computing resource instance may be evaluated based at least in part on the trust rating of the computing resource instance and a trust rating of the implementation resource. In some embodiments, the trust rating of the implementation resource may be predefined or based on trust ratings of computing resource instances that are currently implemented by the implementation resource. An implementation resource may be selected to implement the computing resource instance based at least in part on its suitability thus determined.

ASSIGNING DEVICES TO VIRTUAL MACHINES IN VIEW OF POWER STATE INFORMATION
20210173693 · 2021-06-10 ·

In one implementation, a method of sharing a physical device between multiple virtual machines is provided. The method includes receiving, from a first virtual machine, a request to access a physical device of a computing device. The method also includes assigning, by a processing device, the physical device to the first virtual machine in view of power state information associated with the physical device of the computing device, wherein the power state information is received from one or more other virtual machines of the computing device.

LOW LATENCY LAUNCH FOR TRUSTED EXECUTION ENVIRONMENTS
20210263757 · 2021-08-26 ·

A system includes an application trusted execution environment (“TEE”) instance and an escrow TEE instance. The escrow TEE instance is hosted along with the application TEE instance and is outside the control of a TEE instance owner. The system also includes a server, which is configured to receive a request to start the application TEE instance. The server is also configured to launch the escrow TEE instance. The escrow TEE instance is validated by the TEE instance owner. Additionally, the escrow TEE instance is configured to obtain a key for the application TEE instance, validate the application TEE instance, and provide the key to the application TEE instance.

GAME EXECUTION ENVIRONMENTS
20210162301 · 2021-06-03 ·

Systems and methods are provided for cloud gaming. One system includes a plurality of computing resources in one or more data centers. The plurality of computing resources is configured to execute instances of games for client devices that are remote from the one or more data centers. Each instance for an executable game is associated with a processor, a graphics processing unit (GPU), and memory for storing video frames generated for the executable game. The video frames are compressed for video game streaming to one or more client devices. The executable game provides video and audio and receives input from said one or more client devices. The input is provided to control interactivity of the executable game during said video game streaming. The cloud gaming system uses said received input from said one or more client devices to drive instances of the executable game when executed by the computing resources of the one or more data centers.

Generalized application virtualization method for business use on the web and the mini server using this method
11010799 · 2021-05-18 · ·

A generalized application virtualization platform and method are provided for business use on the web and a mini server. The method includes: (1) Initializing, application monitoring, registration and login; (2) Accessing to a server via Access protocol from a client-side SOD (software on-demand) controller; (3) Content selecting via keyword search, with the selected contents provided by a content management protocol; (4) Choosing one of the available application virtualization methods according to bandwidth needed by the user and the resources consumed in a data center; (5) Binding of the executable software for the application virtualization method and the contents selected, and running the executable software; and (6) Metering and billing: Meter the start and end time of the execution of application virtualization method and calculate the billing.

EXTENDING SERVER-BASED DESKTOP VIRTUAL MACHINE ARCHITECTURE TO CLIENT MACHINES

A server-based desktop-virtual machines architecture may be extended to a client machine. In one embodiment, a user desktop is remotely accessed from a client system. The remote desktop is generated by a first virtual machine running on a server system, which may comprise one or more server computers. During execution of the first virtual machine, writes to a corresponding virtual disk are directed to a delta disk file or redo log. A copy of the virtual disk is created on the client system. When a user decides to “check out” his or her desktop, the first virtual machine is terminated (if it is running) and a copy of the delta disk is created on the client system. Once the delta disk is present on the client system, a second virtual machine can be started on the client system using the virtual disk and delta disk to provide local access to the user's desktop at the client system. This allows the user to then access his or her desktop without being connected to a network.

Information processing device, information processing method and program
10990422 · 2021-04-27 · ·

There is provided an information processing device including a receiving unit for receiving a command to be input to a first operating system and a command to be input to a second operating system different from the first operating system, a storage unit for storing a table in which given information included in the given command received by the receiving unit and information for identifying an application are related to each other, a generation unit for generating an application selection command for selectively executing the application based on the given command received by the receiving unit and the table stored in the storage unit, and an execution unit for executing the application selection command generated by the generation unit to selectively execute the application.