Author
Xin Wang
Bio: Xin Wang is an academic researcher from Wilmington University. The author has contributed to research in topics: On-the-fly encryption & Encryption. The author has an hindex of 1, co-authored 1 publications receiving 208 citations.
Papers
More filters
Patent•
26 Mar 2001TL;DR: An additive encryption scheme is a particular type of encryption scheme which preserves formatting of a digital work as mentioned in this paper, which enables the rendering or replay application to process the encrypted document into encrypted presentation data without decrypting it first.
Abstract: A method of protecting a digital work uses a format preserving encryption scheme to encrypt the digital work. This enables any native replay application or rendering application to transform an encrypted digital work into encrypted presentation data. The originator's digital content is protected in its original form by not being decrypted. This method enables the rendering or replay application to process the encrypted document into encrypted presentation data without decrypting it first. Encrypted presentation data is then decrypted just before it is displayed to the user. An additive encryption scheme is a particular type of encryption scheme which preserves formatting of a digital work.
208 citations
Cited by
More filters
Patent•
21 Nov 2001
TL;DR: In this paper, a set top box (STB) accesses a verification entity via a persistent network connection, and the STB receives an encrypted access key from an access key source corresponding to a segment of encrypted digital content.
Abstract: In response to a user request to view specific digital content, the user's set top box (STB) accesses a verification entity via a persistent network connection. The STB establishes the user's identity with the verification entity, for instance, by reading identity credentials from a smart card. In response to the verification entity having stored a license for the user to view the digital content, the STB receives a license key from the verification entity. In addition, the STB receives an encrypted access key from an access key source corresponding to a segment of encrypted digital content. The license key is used to decrypt the encrypted access key, which is, in turn, used to decrypt the segment of encrypted digital content. A user may transfer his or her license in whole or in part to another user by sending a transfer request to the verification entity.
281 citations
Patent•
13 Jun 2003TL;DR: In this article, fault information relating to a fault associated with the operation of guest software is received, and a determination is made as to whether the fault information satisfies one or more filtering criterion.
Abstract: In one embodiment, fault information relating to a fault associated with the operation of guest software is received. Further, a determination is made as to whether the fault information satisfies one or more filtering criterion. If the determination is positive, control remains with the guest software and is not transferred to the virtual machine monitor (VMM).
222 citations
Patent•
15 Aug 2001
TL;DR: In this article, the transitions among schedulable entities executing in a computer system are tracked in computer hardware or in a virtual machine monitor, and the virtual machine monitors derive scheduling information from the transitions to enable a VM system to guarantee adequate scheduling quality of service to real-time applications executing in virtual machines that contain both realtime and non-realtime applications.
Abstract: Transitions among schedulable entities executing in a computer system are tracked in computer hardware or in a virtual machine monitor. In one aspect, the schedulable entities are operating system processes and threads, virtual machines, and instruction streams executing on the hardware. In another aspect, the schedulable entities are processes or threads executing within the virtual machines under the control of the virtual machine monitor. The virtual machine monitor derives scheduling information from the transitions to enable a virtual machine system to guarantee adequate scheduling quality of service to real-time applications executing in virtual machines that contain both real-time and non-real-time applications. In still another aspect, a parent virtual machine monitor in a recursive virtualization system can use the scheduling information to schedule a child virtual machine monitor that controls multiple virtual machines.
206 citations
Patent•
26 Jun 2003TL;DR: In this article, a method, system, and apparatus for virtual machine management is described, where the processor state information associated with a processor is evaluated and used to manage one or more virtual machines.
Abstract: A method, system, and apparatus are provided for virtual machine management. According to one embodiment, processor state information associated with a processor is evaluated, and the processor state information is used to manage one or more virtual machines.
205 citations
Patent•
27 Dec 2000TL;DR: In this article, a method for supporting address translation in a virtual-machine environment includes creating a guest translation data structure to be used by a guest operating system for address translation operations, and creating an active translation data structures based on the guest data structure.
Abstract: In one embodiment, a method for supporting address translation in a virtual-machine environment includes creating a guest translation data structure to be used by a guest operating system for address translation operations, creating an active translation data structure based on the guest translation data structure, and periodically modifying the content of the active translation data structure to conform to the content of the guest translations data structure. The content of the active translation data structure is used by a processor to cache address translations in a translation-lookaside buffer (TLB).
160 citations