Virtual computer system, virtual computer control method, virtual computer control program, and semiconductor integrated circuit

A virtual computer and program technology, applied in program control design, computer security device, computing, etc., can solve problems such as authenticated application program attacks

Active Publication Date: 2013-01-02
SUN PATENT TRUST
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] Therefore, in the conventional virtual computer system, when an unauthenticated application executed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual computer system, virtual computer control method, virtual computer control program, and semiconductor integrated circuit
  • Virtual computer system, virtual computer control method, virtual computer control program, and semiconductor integrated circuit
  • Virtual computer system, virtual computer control method, virtual computer control program, and semiconductor integrated circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0042]

[0043] Hereinafter, as an embodiment of the virtual computer system of the present invention, a virtual computer system including a processor having a user mode for executing an application program and a supervisor higher than the user mode will be described. In the two program execution modes, the manager executed in the supervisor mode of the processor performs time-sharing execution control on a plurality of operating systems executed in the supervisor mode of the processor.

[0044] This virtual computer system includes, in addition to the processor, a memory protection unit that controls access from the virtual computer to the storage area of ​​the memory. Furthermore, the manager executed by the processor cooperates with the memory protection unit to control access to the storage area of ​​the memory so that access to a predetermined area is prohibited for each virtual computer.

[0045] Therefore, each virtual computer executed by the virtual computer system ...

Embodiment approach 2

[0201]

[0202] Hereinafter, as an embodiment of the virtual computer system of the present invention, a virtual computer system 1500 in which a part of the virtual computer system 100 in Embodiment 1 is modified will be described.

[0203] The hardware configuration of the virtual computer system 1500 according to the second embodiment is partially modified from the virtual computer system 100 according to the first embodiment, and part of the executed software is partially modified from the virtual computer system 100 according to the first embodiment.

[0204] The virtual computer system 100 of the first embodiment is an example of a configuration including the memory protection unit 107 for controlling access to the storage area of ​​the memory 102, but the second embodiment is an example of a case where the virtual computer system 1500 does not have a hardware The memory protection unit, a manager executed by the processor, has a function of controlling access to the sto...

Embodiment approach 3

[0222]

[0223] Hereinafter, as an embodiment of the virtual computer system of the present invention, a modified virtual computer system in which a part of the virtual computer system 100 in Embodiment 1 is modified will be described.

[0224] The hardware configuration of the modified virtual computer system according to the third embodiment is the same as that of the virtual computer system 100 according to the first embodiment, but part of the executed software is partially modified from the virtual computer system 100 according to the first embodiment.

[0225] This modified virtual computer system is an example of a virtual computer system configured such that even when a plurality of virtual computers are executed, only one virtual computer (here, the first virtual computer) among the executed virtual computers directly controls the display. , keyboard, and other devices, and other virtual computers indirectly control the devices by delegating control of the devices to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention is provided with a memory protection unit for controlling access to a memory region from virtual computers. The memory protection unit and a hypervisor executed by a processor operate in coordination with each other, whereby access to a memory storage region is controlled for the virtual computers so that access to a predetermined region is prohibited in a corresponding manner. Each of the virtual computers is thereby prevented from accessing programs, data, and other information recorded in the region to which access is prohibited.

Description

technical field [0001] The present invention relates to a virtual computer system, in particular to a control technology for accessing from a virtual computer to a storage area. Background technique [0002] Conventionally, a system for controlling the execution of a plurality of virtual computers is known as a virtual computer system. [0003] In such a virtual computer system, as a technique for improving the utilization efficiency of hardware resources, there is a technique of dynamically controlling the generation and termination of a virtual computer according to the processing load of the virtual computer system. [0004] For example, Patent Document 1 discloses a technique for generating a child virtual computer by forking a parent virtual computer, and Patent Document 2 discloses a technique based on Request to copy (clone, clone) the virtual computer to generate a sub-virtual computer. [0005] prior art literature [0006] patent documents [0007] Patent Docum...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F9/46G06F9/50
CPCG06F12/1491G06F21/00G06F9/5077G06F2212/151G06F21/53
Inventor 谷川忠雄
Owner SUN PATENT TRUST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products