Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure access of virtual machine memory suitable for ai assisted automotive applications

A virtual machine manager, virtual machine technology, applied in the direction of instrumentation, software simulation/interpretation/simulation, data processing input/output process, etc.

Pending Publication Date: 2021-04-30
NVIDIA CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This presents a security risk because if the virtualization software is compromised, it is possible for a malicious actor to read the memory allocated to any virtual machine through the host controller interface

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access of virtual machine memory suitable for ai assisted automotive applications
  • Secure access of virtual machine memory suitable for ai assisted automotive applications
  • Secure access of virtual machine memory suitable for ai assisted automotive applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Disclosed herein is a system and method related to using a host controller's trusted firmware to authenticate one or more commands that read virtual machine memory (e.g., dedicated to or allocated to a virtual machine) system memory) and / or commands to read data from virtual machine memory to prevent inappropriate access to data in system memory. As a result, if the virtualization software is compromised, malicious actors can be prevented from accessing virtual machine memory at will.

[0013] In various embodiments, the virtualization software and one or more virtual machine managers (VMMs) of the VF may be used to facilitate the connection between the virtual machine and another entity (e.g., external virtual machine, external device), such as the host Another entity within the system (such as another virtual machine), or an entity external to the host system. A virtual machine manager may or may not include a virtual machine hypervisor of the host system. To facili...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In various examples, access to VM memory by virtualization software is secured using a trusted firmware of a host controller to validate one or more of a command to read a VM's memory and / or the data read from VM memory in order to protect against improper access to data in VM memory. If validation fails, the firmware may refrain from reading the data and / or from providing the virtualization software with access to the data. The data may include a request command from a VM regarding establishing or modifying a connection using the host controller to another entity, such as another device within or outside of the virtualization environment. The virtualization software may use the request command to facilitate the connection. The host controller may provide an eXtensible Host Controller Interface (xHCI) or a different type of interface for the connection.

Description

Background technique [0001] Virtualization allows multiple virtual machines (VMs), typically used to host an operating system instance (OSI), to run concurrently within a single host system. The default interface (virtualization without interface) presented by the host controller to the host system may comprise a physical function (PF) or a host controller interface. Examples of host controller interfaces include interfaces for Universal Serial Bus (USB), FireWire, Bluetooth, Ethernet, Peripheral Component Interconnect (PCI), or other types of communications. For example, the Extensible Host Controller Interface (xHCI) can be used to support USB communications. Virtualization of the host controller interface enables multiple virtual functions (VFs) to share a single PF. To minimize hardware requirements, the physical interface presented by a VF usually only includes a subset of the physical interface presented by the corresponding PF, and virtualization software is relied on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45583G06F2009/45587G06F21/53G06F21/79G05D1/0088G06F3/0659G06F3/0622G06F2009/45595G06F3/067G06F3/0662
Inventor A·K·古普塔V·塔米尼迪D·利姆A·杰哈
Owner NVIDIA CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products