The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Dec. 31, 2013
Filed:
Apr. 18, 2008
Xinwen Zhang, San Jose, CA (US);
Liang Xie, State College, PA (US);
Jean-pierre Seifert, San Jose, CA (US);
Onur Aciicmez, San Jose, CA (US);
Afshin Latifi, San Jose, CA (US);
Xinwen Zhang, San Jose, CA (US);
Liang Xie, State College, PA (US);
Jean-Pierre Seifert, San Jose, CA (US);
Onur Aciicmez, San Jose, CA (US);
Afshin Latifi, San Jose, CA (US);
Samsung Electronics Company, Ltd., Suwon, KR;
Abstract
Techniques for managing and protecting computing environments are disclosed. A safe computing environment can be provided for ensuring the safety and/or management of a device. The safe computing environment can be secured by a safe component that isolates and protects it from unsafe computing environments which may also be operating. As a result, various security and management activities can be securely performed from a safe computing environment. A safe computing environment can, for example, be provided on a device as a safe virtual computing environment (e.g., a safe virtual machine) protected by a safe virtual computing monitor (e.g., a safe virtual machine monitor) from one or more other virtual computing environments that are not known or not believed to be safe for the device. It will also be appreciated that the safe components can, for example, be provided as trusted components for a device. As such, various trusted components (or agent) can operate in a trusted computing environment secured from interference by components that many not be trusted and perform various security and/or management tasks alone or in connection, for example, with other trusted components (e.g., trusted serves).