1
Etay Bogner: Trusted local single sign-on. Intel Corporation, Blakely Sokoloff Taylor & Zafman, January 29, 2013: US08365266 (49 worldwide citation)

A method includes running on a computer a first operating environment for performing general-purpose operations and a second operating environment, which is configured exclusively for interacting with multiple servers in respective secure communication sessions and is isolated from the first operati ...


2
Yoav Weiss, Etay Bogner: Stateless attestation system. Intel Corporation, Blakely Sokoloff Taylor & Zafman, June 25, 2013: US08474037 (3 worldwide citation)

A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the trustworthiness level is sent from the first server to the user computer, for storage by the user computer. A request is sent from the user co ...


3
Etay Bogner, Yoav Weiss: System and method for physical to virtual disk re-layout. Intel Corporation, Blakely Sokoloff Taylor & Zafman, June 25, 2013: US08473731 (2 worldwide citation)

A method and device may, in a computing system executing a operating system and having a mass storage device, rewrite the boot sector of the operating system on the storage device to execute a hypervisor operating system in a boot process, copy a file including the hypervisor kernel to a first sub-a ...


4
Ariel Maislos, Etay Bogner, Muli Ben Yehuda, Shlomo Matichin, Benoit Guillaume Charles Hudzia, Rom Freiman: Live migration of virtual machines that use externalized memory pages. STRATO SCALE, D KLIGLER IP SERVICES, May 17, 2016: US09342346 (1 worldwide citation)

A method includes running a Virtual Machine (VM) on a first compute node in a plurality of compute nodes that communicate with one another over a communication network. The VM is migrated from the first compute node to a second compute node in the plurality by generating, for memory pages accessed b ...


5
Etay Bogner: Data distribution using DNS. Intel Corporation, Blakely Sokoloff Taylor & Zafman, July 26, 2011: US07987291 (1 worldwide citation)

A method for distributing data includes selecting for transmission to a client a plurality of data items from a data set. The selected data items are encapsulated in multiple CNAME-type resource records, each such resource record containing an artificial domain name including one or more of the data ...


6
Etay Bogner: System for extranet security. Intel Corporation, Blakely Sokoloff Taylor & Zafman, June 18, 2013: US08468235

A system for communication with a server includes a user computer, which is configured to run first and second operating environments. The first operating environment is arranged to perform general-purpose operations. The second operating environment is configured expressly for interacting with the ...


7
Etay Bogner: Protection against impersonation attacks. Intel Corporation, Blakely Sokoloff Taylor & Zafman, October 23, 2012: US08296844

A computing method includes running on a user computer a first operating environment for performing general-purpose operations and a second operating environment, which is configured expressly for interacting with a server in a protected communication session and is isolated from the first operating ...


8
Yoav Weiss, Etay Bogner: Stateless attestation system. Intel Corporation, Blakely Sokoloff Taylor & Zafman, November 15, 2016: US09497210

A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the trustworthiness level is sent from the first server to the user computer, for storage by the user computer. A request is sent from the user co ...


9
Yoav Weiss, Etay Bogner: Stateless attestation system. Intel Corporation, Blakely Sokoloff Taylor & Zafman, May 17, 2016: US09342683

A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the trustworthiness level is sent from the first server to the user computer, for storage by the user computer. A request is sent from the user co ...


10
Abel Gordon, Muli Ben Yehuda, Benoit Guillaume Charles Hudzia, Etay Bogner: Scanning memory for de-duplication using RDMA. Strato Scale, D Kligler IP Services, August 28, 2018: US10061725

A method for storage includes storing multiple memory pages in a memory of a first compute node. Using a second compute node that communicates with the first compute node over a communication network, duplicate memory pages are identified among the memory pages stored in the memory of the first comp ...