Xen-oriented memory sharing security isolation method for virtual machines
A memory sharing and security isolation technology, applied in the field of virtualization security, can solve problems such as incompleteness and inability to achieve complete isolation, and achieve good usability.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The following describes the implementation in detail in conjunction with the flow chart. It should be emphasized that the following description is only exemplary, and is not intended to limit the scope of the present invention and its application.
[0025] The security isolation of memory access in Xen is realized through the isolation of the authorization table mechanism, and the security isolation of memory sharing can be realized by extending the existing ACM management mechanism.
[0026] The principle of the scheme can be as figure 2 To describe, first complete the interception of the authorization table access when a memory table sharing request occurs, and then complete the validity verification of the authorization operation through the extended ACM control. When the verification is passed, the operation is released, and when the verification is not passed, the operation is rejected. operation performed. The security isolation of memory sharing between virtual...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com