Unlock instant, AI-driven research and patent intelligence for your innovation.

Field-programmable gate array virtualization

A gate-array, field-based technology used in bootloaders, program control design, climate sustainability, etc., to solve problems such as inability to exploit virtualization, vulnerability to security vulnerabilities, and high cost

Active Publication Date: 2019-09-03
MICROSOFT TECH LICENSING LLC
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Nonetheless, some of the conventional technologies used to implement virtualization are expensive, vulnerable to security vulnerabilities, or tied to specific host device hardware configurations
Therefore, many applications may not be able to take advantage of virtualization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Field-programmable gate array virtualization
  • Field-programmable gate array virtualization
  • Field-programmable gate array virtualization

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0102]Example 1. A method implemented by a computing device, the method comprising: obtaining a unique device identifier corresponding to a device configured to provide one or more functionalities; identifying a field programmable gate associated with the unique device identifier an array (FPGA) program configured to program the host's FPGA as a device to provide one or more functionalities; determining whether the FPGA program is permitted to be accessed by checking the FPGA program against one or more security policies associated with the host Loaded to program the host's FPGA, the security policy is at least one of the following: lists permitted devices or prohibited devices by unique device identifiers, or indicates configuration criteria for allowing unlisted devices; responds to the FPGA program a determination that is allowed to load to program the FPGA, allocate at least a portion of the FPGA to the device; load the FPGA program to program the allocated portion of the F...

example 2

[0103] Example 2. The method of example 1, wherein obtaining the unique device identifier comprises receiving a request for the device from at least one of the virtual machines, the request including the unique device identifier.

example 3

[0104] Example 3. The method of example 1, further comprising mapping inputs and outputs of the virtual device to corresponding inputs and outputs programmed to the allocated portion of the FPGA.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Techniques for field-programmable gate array (FPGA) virtualization are described herein. In one or more implementations, an FPGA virtualization manager of a host device receives a request from a virtual machine for a device, such as for a compression engine. The FPGA virtualization manager identifies an FPGA program associated with the request and configured to program FPGAs of the host as the requested device. The FPGA virtualization manager also checks the FPGA program against security policies of the host to determine whether to allow the FPGA program to program the FPGAs. If the programming is allowed, the FPGA virtualization manager allocates at least a portion of the FPGAs to the requested device and loads the FPGA program to program the allocated portion of FPGAs. The FPGA virtualization manager generates a virtual device to furnish the functionality of the programmed device to the requesting virtual machine.

Description

Background technique [0001] Generally speaking, virtualization technology cuts off the one-to-one link between physical computing devices and operating systems by abstracting physical resources into virtualized resources. Virtualization allows multiple operating system instances or application instances to co-exist on the same physical machine and be isolated from each other. Virtualization also enables multiple operating system instances to share the resources of a physical device to share storage devices, compression engines, network devices, and more. These advances have led to the centralization of many computing resources, enabling various computing tasks to be performed "through the cloud." [0002] By way of example, individuals associated with a business may be given accounts that allow them to access a desktop interface configured by the business - the desktop interface may be configured to provide productivity tools of choice by the business, storage hosted by the b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F15/78G06F9/4401G06F9/455
CPCG06F15/7871G06F9/45558G06F2009/45587Y02D10/00G06F21/604
Inventor H·M·霍佩特
Owner MICROSOFT TECH LICENSING LLC