Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for switching between virtualized system operation and non-virtualized system operation

A technology for virtualizing systems and operating systems, applied in the field of computer program products to achieve the effect of improving system performance

Active Publication Date: 2016-10-26
TELEFON AB LM ERICSSON (PUBL)
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Similarly, even with advanced hardware virtualization, performance loss may not be acceptable
Specifically, in extremely small embedded systems with very limited capacity, this is quite a problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for switching between virtualized system operation and non-virtualized system operation
  • Method for switching between virtualized system operation and non-virtualized system operation
  • Method for switching between virtualized system operation and non-virtualized system operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] This article is concerned with improving the performance of the system by enabling the system to switch between a virtualized mode (hereafter called protected mode since the hypervisor is activated when entering this mode) and a non-virtualized mode (hereafter called normal mode) Methods and mechanisms for the performance of a system capable of operating as a virtualized system or a non-virtualized system, wherein the system is run in a protected mode only when required to perform one or more safety-critical functions in a secure manner, while determining When it is no longer required to perform any safety-critical functions, the system operates in normal mode without any hypervisor involvement.

[0047] In order to obtain a method of selecting a protected mode only when the system actually requires it, according to figure 1 , the executable code of the system is suitable for: when safety-critical assisting is requested, the switch from normal mode 100 to protected mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method performed by an embedded system controlled by a CPU and capable of operating as a virtualized system under supervision of a hypervisor or as a non-virtualized system under supervision of an operating system, is provided. The embedded system is executed in a normal mode if no execution of any security critical function is required by the embedded system, where the normal mode execution is performed under supervision of the operating system. If a security critical function execution is required by the embedded system, where protected mode execution is performed under supervision of the hypervisor, the operating system is switching execution of the embedded system from normal mode to protected mode, by handing over the execution of the embedded system from the operating system to the hypervisor, and when execution of the security critical function is no longer required by the embedded system is switched from protected mode to normal mode, under supervision of the hypervisor.

Description

technical field [0001] The invention relates to a method for implementing virtualization on a system comprising one or more CPUs, a computer program for performing such a method, and a computer program product comprising such a computer program. Background technique [0002] Security has become a major differentiator when it comes to the design of various types of consumer electronic devices such as mobile and smart phones, media players, home gateways, and various types of networked sensors. Similarly, different types of embedded systems are used in vehicles and control systems (eg power plant control systems) to control various types of safety critical functions applied in both mobile and fixed networks. [0003] Security considerations for embedded systems may range from requiring reliability such as high uptime, robust operation, and reliable network access to efficient protection from software attacks including, for example, viruses and Trojan horses. [0004] What is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74
CPCG06F9/441G06F9/445G06F9/45533G06F9/45545G06F9/45558G06F21/53G06F21/54G06F2009/45587G06F2221/2105G06F9/4401
Inventor 克里斯蒂安·耶尔曼
Owner TELEFON AB LM ERICSSON (PUBL)