JP5809362B2 - 仮想トラステッドランタイムbiosとの通信 - Google Patents
仮想トラステッドランタイムbiosとの通信 Download PDFInfo
- Publication number
- JP5809362B2 JP5809362B2 JP2014527137A JP2014527137A JP5809362B2 JP 5809362 B2 JP5809362 B2 JP 5809362B2 JP 2014527137 A JP2014527137 A JP 2014527137A JP 2014527137 A JP2014527137 A JP 2014527137A JP 5809362 B2 JP5809362 B2 JP 5809362B2
- Authority
- JP
- Japan
- Prior art keywords
- bios
- virtual
- trusted runtime
- runtime bios
- virtual trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000004891 communication Methods 0.000 title claims description 81
- 238000000034 method Methods 0.000 claims description 21
- 238000012546 transfer Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 2
- 230000006870 function Effects 0.000 description 13
- 230000007246 mechanism Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45541—Bare-metal, i.e. hypervisor runs directly on hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
Description
Claims (13)
- ハードウェアと、
仮想マシンモニタと、
該仮想マシンモニタにより管理される仮想トラステッドランタイムBIOSをホストするための特権ドメインと、
前記特権ドメインにより生成されるゲストドメインと、
前記ゲストドメインが前記仮想トラステッドランタイムBIOSと通信するための通信チャネルと
を備えており、
該通信チャネルがSSL(Secure Socket Layer)によりセキュアにされ、前記仮想トラステッドランタイムBIOSは、前記仮想マシンモニタを介して前記ハードウェア上の物理BIOSと通信するものである、コンピューティングシステム。 - 前記仮想トラステッドランタイムBIOSとのセキュアな通信を提供するための公開鍵及び秘密鍵を更に備えている、請求項1に記載のシステム。
- 前記通信チャネルがウェブ通信プロトコルに基づくものである、請求項1に記載のシステム。
- 前記通信チャネルが、HTTP(Hypertext Transfer Protocol)レイヤとTCP(Transport Control Protocol)レイヤとの間にある、請求項3に記載のシステム。
- リモートに配設された仮想トラステッドランタイムBIOSと通信するための送受信手段を更に備えている、請求項1に記載のシステム。
- コンピューティングシステムにおける仮想トラステッドランタイムBIOSとの通信をセキュアにする方法であって、
仮想マシンモニタが仮想トラステッドランタイムBIOSを管理し、
該仮想トラステッドランタイムBIOSと、該仮想トラステッドランタイムBIOSをホストするための特権ドメインにより生成されるゲストドメインとの間のセキュアな通信チャネルを、前記仮想トラステッドランタイムBIOS及び前記ゲストドメインが確立し、
前記ゲストドメインが、SSL(Secure Socket Layer)を使用し前記セキュアな通信チャネルを介して前記仮想トラステッドランタイムBIOSと通信し、
前記仮想トラステッドランタイムBIOSが前記仮想マシンモニタを介して物理BIOSと通信する、
という各ステップを含む、コンピューティングシステムにおける仮想トラステッドランタイムBIOSとの通信をセキュアにする方法。 - 前記ゲストドメインが、前記コンピューティングシステムからリモートに配設された仮想ランタイムBIOSと通信するステップを更に含む、請求項6に記載の方法。
- 前記仮想トラステッドランタイムBIOSと前記ゲストドメインとの通信がウェブ通信プロトコルである、請求項6に記載の方法。
- セキュアな通信チャネルを確立する前記ステップが、前記仮想トラステッドランタイムBIOSと前記ゲストドメインとの間における、公開鍵及び秘密鍵を使用したハンドシェイクを含む、請求項6に記載の方法。
- コードを含むコンピュータ読み取り可能媒体であって、該コードが、プロセッサにより実行された際に、
仮想トラステッドランタイムBIOSを管理し、
該仮想トラステッドランタイムBIOSと、該仮想トラステッドランタイムBIOSをホストするための特権ドメインにより生成されるゲストドメインとの間のセのセキュアな通信チャネルを確立し、
前記ゲストドメインが、SSL(Secure Socket Layer)を使用して前記セキュアな通信チャネルを介して前記仮想トラステッドランタイムBIOSと通信し、
前記仮想トラステッドランタイムBIOSが仮想マシンモニタを介して物理BIOSと通信する、
という各ステップをコンピューティングシステムに行わせるものである、コンピュータ読み取り可能媒体。 - 前記コンピューティングシステムからリモートに配設された仮想ランタイムBIOSと通信するステップを実行時にコンピューティング装置に行わせるコードを更に含む、請求項10に記載のコンピュータ読み取り可能媒体。
- ウェブ通信プロトコルを使用して前記仮想ランタイムBIOSと通信するステップを実行時にコンピューティング装置に行わせるコードを更に含む、請求項10に記載のコンピュータ読み取り可能媒体。
- 公開鍵及び秘密鍵を使用したハンドシェイクを含むセキュアな通信チャネルを確立するステップを実行時にコンピューティング装置に行わせるコードを更に含む、請求項10に記載のコンピュータ読み取り可能媒体。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2011/049677 WO2013032442A1 (en) | 2011-08-30 | 2011-08-30 | Virtual high privilege mode for a system management request |
USPCT/US2011/049677 | 2011-08-30 | ||
PCT/US2011/054045 WO2013032495A1 (en) | 2011-08-30 | 2011-09-29 | Communication with a virtual trusted runtime bios |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2014529130A JP2014529130A (ja) | 2014-10-30 |
JP5809362B2 true JP5809362B2 (ja) | 2015-11-10 |
Family
ID=54328041
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2014527137A Expired - Fee Related JP5809362B2 (ja) | 2011-08-30 | 2011-09-29 | 仮想トラステッドランタイムbiosとの通信 |
Country Status (9)
Country | Link |
---|---|
US (4) | US9275230B2 (ja) |
EP (1) | EP2771783B1 (ja) |
JP (1) | JP5809362B2 (ja) |
CN (2) | CN103748556B (ja) |
BR (1) | BR112014003389B1 (ja) |
DE (1) | DE112011105568T5 (ja) |
GB (1) | GB2507015B (ja) |
TW (1) | TWI464680B (ja) |
WO (2) | WO2013032495A1 (ja) |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9148428B1 (en) * | 2011-05-25 | 2015-09-29 | Bromium, Inc. | Seamless management of untrusted data using virtual machines |
JP6063941B2 (ja) | 2011-08-30 | 2017-01-18 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. | システム管理要求のための仮想高特権モード |
WO2013032495A1 (en) * | 2011-08-30 | 2013-03-07 | Hewlett-Packard Development Company , L.P. | Communication with a virtual trusted runtime bios |
DE112011105752T5 (de) * | 2011-10-21 | 2014-10-02 | Hewlett-Packard Development Company, L.P. | Webbasierte Schnittstelle zum Zugriff auf eine Funktion eines Basic Input/Output-Systems |
IN2014DN03052A (ja) | 2011-10-21 | 2015-05-08 | Hewlett Packard Development Co | |
US9253185B2 (en) * | 2012-12-12 | 2016-02-02 | Nokia Technologies Oy | Cloud centric application trust validation |
US9497266B2 (en) * | 2013-02-22 | 2016-11-15 | International Business Machines Corporation | Disk mirroring for personal storage |
US10049217B2 (en) | 2013-11-13 | 2018-08-14 | Via Technologies, Inc. | Event-based apparatus and method for securing bios in a trusted computing system during execution |
US9547767B2 (en) | 2013-11-13 | 2017-01-17 | Via Technologies, Inc. | Event-based apparatus and method for securing bios in a trusted computing system during execution |
US9779242B2 (en) | 2013-11-13 | 2017-10-03 | Via Technologies, Inc. | Programmable secure bios mechanism in a trusted computing system |
US10055588B2 (en) | 2013-11-13 | 2018-08-21 | Via Technologies, Inc. | Event-based apparatus and method for securing BIOS in a trusted computing system during execution |
US9798880B2 (en) | 2013-11-13 | 2017-10-24 | Via Technologies, Inc. | Fuse-enabled secure bios mechanism with override feature |
US9367689B2 (en) | 2013-11-13 | 2016-06-14 | Via Technologies, Inc. | Apparatus and method for securing BIOS in a trusted computing system |
US9779243B2 (en) | 2013-11-13 | 2017-10-03 | Via Technologies, Inc. | Fuse-enabled secure BIOS mechanism in a trusted computing system |
US9767288B2 (en) | 2013-11-13 | 2017-09-19 | Via Technologies, Inc. | JTAG-based secure BIOS mechanism in a trusted computing system |
US9129113B2 (en) | 2013-11-13 | 2015-09-08 | Via Technologies, Inc. | Partition-based apparatus and method for securing bios in a trusted computing system during execution |
US10095868B2 (en) | 2013-11-13 | 2018-10-09 | Via Technologies, Inc. | Event-based apparatus and method for securing bios in a trusted computing system during execution |
US9183394B2 (en) | 2013-11-13 | 2015-11-10 | Via Technologies, Inc. | Secure BIOS tamper protection mechanism |
US9507942B2 (en) | 2013-11-13 | 2016-11-29 | Via Technologies, Inc. | Secure BIOS mechanism in a trusted computing system |
EP3085007B1 (en) | 2013-12-20 | 2023-03-15 | Nokia Technologies Oy | Push-based trust model for public cloud applications |
US20150304343A1 (en) | 2014-04-18 | 2015-10-22 | Intuit Inc. | Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment |
US10757133B2 (en) | 2014-02-21 | 2020-08-25 | Intuit Inc. | Method and system for creating and deploying virtual assets |
US10121007B2 (en) | 2014-02-21 | 2018-11-06 | Intuit Inc. | Method and system for providing a robust and efficient virtual asset vulnerability management and verification service |
US20150271195A1 (en) * | 2014-03-18 | 2015-09-24 | Intuit Inc. | Method and system for providing temporary secure access enabled virtual assets |
US11294700B2 (en) | 2014-04-18 | 2022-04-05 | Intuit Inc. | Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets |
US10102082B2 (en) | 2014-07-31 | 2018-10-16 | Intuit Inc. | Method and system for providing automated self-healing virtual assets |
CN105988830B (zh) * | 2015-02-04 | 2019-07-26 | 联想(北京)有限公司 | 信息处理方法及电子设备 |
US10375088B2 (en) | 2015-06-04 | 2019-08-06 | Vm-Robot, Inc. | Routing systems and methods |
US9749294B1 (en) * | 2015-09-08 | 2017-08-29 | Sprint Communications Company L.P. | System and method of establishing trusted operability between networks in a network functions virtualization environment |
US10542115B1 (en) | 2015-10-01 | 2020-01-21 | Sprint Communications Company L.P. | Securing communications in a network function virtualization (NFV) core network |
US9781016B1 (en) | 2015-11-02 | 2017-10-03 | Sprint Communications Company L.P. | Dynamic addition of network function services |
US10740710B2 (en) | 2016-03-25 | 2020-08-11 | Nebbiolo Technologies, Inc. | Fog computing facilitated flexible factory |
US10250498B1 (en) | 2016-10-03 | 2019-04-02 | Sprint Communications Company L.P. | Session aggregator brokering of data stream communication |
US10798063B2 (en) * | 2016-10-21 | 2020-10-06 | Nebbiolo Technologies, Inc. | Enterprise grade security for integrating multiple domains with a public cloud |
US11231448B2 (en) | 2017-07-20 | 2022-01-25 | Targus International Llc | Systems, methods and devices for remote power management and discovery |
US10979368B2 (en) | 2017-08-02 | 2021-04-13 | Nebbiolo Technologies, Inc. | Architecture for converged industrial control and real time applications |
US10348488B1 (en) | 2017-08-25 | 2019-07-09 | Sprint Communications Company L.P. | Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network |
US10838707B2 (en) | 2018-07-20 | 2020-11-17 | Dell Products L.P. | Runtime update of intel server platform services' node manager settings in bios EEPROM |
EP3908948A4 (en) * | 2019-04-18 | 2022-08-24 | Hewlett-Packard Development Company, L.P. | SERVICE TRUST STATE |
CA3148974C (en) | 2019-08-22 | 2024-06-25 | Targus International Llc | Systems and methods for participant-controlled video conferencing |
WO2021150219A1 (en) | 2020-01-22 | 2021-07-29 | Hewlett-Packard Development Company, L.P. | Customized thermal and power policies in computers |
US20220156381A1 (en) * | 2020-11-19 | 2022-05-19 | Moxa Inc. | Method of Handling Security of an Operating System |
US12073205B2 (en) | 2021-09-14 | 2024-08-27 | Targus International Llc | Independently upgradeable docking stations |
US12105806B2 (en) * | 2022-01-27 | 2024-10-01 | Hewlett Packard Enterprise Development Lp | Securing communications with security processors using platform keys |
CN114244515B (zh) * | 2022-02-25 | 2022-06-28 | 中瓴智行(成都)科技有限公司 | 基于Hypervisor的虚拟机通信方法、装置、可读存储介质及电子设备 |
Family Cites Families (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5230052A (en) * | 1990-10-01 | 1993-07-20 | International Business Machines Corp. | Apparatus and method for loading bios into a computer system from a remote storage location |
US5574920A (en) | 1994-10-25 | 1996-11-12 | Microsoft Corporation | Method for controlling power down of a hard disk drive in a computer |
US5701477A (en) * | 1995-03-30 | 1997-12-23 | Cirrus Logic, Inc. | Method and apparatus for master boot record shadowing |
US5844986A (en) * | 1996-09-30 | 1998-12-01 | Intel Corporation | Secure BIOS |
WO1998029807A1 (en) | 1996-12-30 | 1998-07-09 | Cirrus Logic, Inc. | Real time services in backwardly compatible operating systems |
US6003065A (en) | 1997-04-24 | 1999-12-14 | Sun Microsystems, Inc. | Method and system for distributed processing of applications on host and peripheral devices |
US20030229794A1 (en) | 2002-06-07 | 2003-12-11 | Sutton James A. | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container |
US7024550B2 (en) * | 2002-06-28 | 2006-04-04 | Hewlett-Packard Development Company, L.P. | Method and apparatus for recovering from corrupted system firmware in a computer system |
US7337309B2 (en) * | 2003-03-24 | 2008-02-26 | Intel Corporation | Secure online BIOS update schemes |
US7032108B2 (en) * | 2003-05-02 | 2006-04-18 | Egenera, Inc. | System and method for virtualizing basic input/output system (BIOS) including BIOS run time services |
US7380136B2 (en) * | 2003-06-25 | 2008-05-27 | Intel Corp. | Methods and apparatus for secure collection and display of user interface information in a pre-boot environment |
EP1530339B1 (en) * | 2003-11-07 | 2008-03-05 | Harman Becker Automotive Systems GmbH | Method and apparatuses for access control to encrypted data services for a vehicle entertainment and information processing device |
US7418584B1 (en) * | 2004-05-11 | 2008-08-26 | Advanced Micro Devices, Inc. | Executing system management mode code as virtual machine guest |
US8271976B2 (en) | 2004-06-30 | 2012-09-18 | Microsoft Corporation | Systems and methods for initializing multiple virtual processors within a single virtual machine |
US7757231B2 (en) * | 2004-12-10 | 2010-07-13 | Intel Corporation | System and method to deprivilege components of a virtual machine monitor |
US7334076B2 (en) | 2005-03-08 | 2008-02-19 | Microsoft Corporation | Method and system for a guest physical address virtualization in a virtual machine environment |
US7937701B2 (en) | 2005-06-30 | 2011-05-03 | Intel Corporation | ACPI communication between virtual machine monitor and policy virtual machine via mailbox |
US20070055968A1 (en) | 2005-09-07 | 2007-03-08 | Rader Shawn T | Reliable BIOS updates |
CN100437420C (zh) | 2005-09-30 | 2008-11-26 | 联想(北京)有限公司 | 计算机系统及其安全加固方法 |
US7676666B2 (en) | 2006-02-02 | 2010-03-09 | Dell Products L.P. | Virtual BIOS firmware hub |
JP4542514B2 (ja) * | 2006-02-13 | 2010-09-15 | 株式会社日立製作所 | 計算機の制御方法、プログラム及び仮想計算機システム |
US7840398B2 (en) * | 2006-03-28 | 2010-11-23 | Intel Corporation | Techniques for unified management communication for virtualization systems |
US8341416B2 (en) | 2006-05-21 | 2012-12-25 | International Business Machines Corporation | Assertion message signatures |
US20080082976A1 (en) * | 2006-09-29 | 2008-04-03 | Matthias Steinwagner | Usage of virtualization software for shipment of software products |
US9280659B2 (en) * | 2006-12-29 | 2016-03-08 | Intel Corporation | Methods and apparatus for remeasuring a virtual machine monitor |
CN101241445B (zh) | 2007-02-08 | 2011-07-27 | 联想(北京)有限公司 | 虚拟机系统及其访问显卡的方法 |
US8060876B2 (en) * | 2007-08-10 | 2011-11-15 | Intel Corporation | Methods and apparatus for creating an isolated partition for a virtual trusted platform module |
US8064605B2 (en) * | 2007-09-27 | 2011-11-22 | Intel Corporation | Methods and apparatus for providing upgradeable key bindings for trusted platform modules |
US20090125901A1 (en) | 2007-11-13 | 2009-05-14 | Swanson Robert C | Providing virtualization of a server management controller |
US20110040812A1 (en) | 2007-12-20 | 2011-02-17 | Virtual Computer, Inc. | Layered Virtual File System |
US8584229B2 (en) * | 2007-12-21 | 2013-11-12 | Intel Corporation | Methods and apparatus supporting access to physical and virtual trusted platform modules |
JP2009176213A (ja) * | 2008-01-28 | 2009-08-06 | Hitachi Software Eng Co Ltd | ネットワークブート方式 |
US20090198988A1 (en) * | 2008-01-31 | 2009-08-06 | Inventec Corporation | Method for verifying refreshed bios content |
JP2009230433A (ja) * | 2008-03-21 | 2009-10-08 | Toshiba Corp | ネットワークブート装置、プログラム及び方法 |
US8117435B2 (en) | 2008-06-30 | 2012-02-14 | Intel Corporation | Method and system for secured dynamic bios update |
TWI460657B (zh) | 2008-09-05 | 2014-11-11 | Asustek Comp Inc | 更新與修復基本輸入輸出系統的方法 |
CN101409714A (zh) * | 2008-11-18 | 2009-04-15 | 华南理工大学 | 一种基于虚拟机的防火墙系统 |
CN101739283B (zh) * | 2008-11-20 | 2013-12-25 | 联想(北京)有限公司 | 一种计算机及虚拟系统直接访问计算机硬件的方法 |
US20110055299A1 (en) | 2008-12-18 | 2011-03-03 | Virtual Computer, Inc. | Managing User Data in a Layered Virtual Workspace |
US8799691B2 (en) | 2009-01-07 | 2014-08-05 | Hewlett-Packard Development Company, L.P. | Hierarchical power management |
US8166288B2 (en) | 2009-01-30 | 2012-04-24 | Hewlett-Packard Development Company, L.P. | Managing requests of operating systems executing in virtual machines |
US8918488B2 (en) | 2009-02-04 | 2014-12-23 | Citrix Systems, Inc. | Methods and systems for automated management of virtual resources in a cloud computing environment |
US8245086B2 (en) * | 2009-06-26 | 2012-08-14 | International Business Machines Corporation | Visual feedback system for multiple partitions on a server |
CN101599025B (zh) * | 2009-07-07 | 2012-07-18 | 武汉大学 | 可信密码模块安全虚拟化方法 |
US8286164B2 (en) * | 2009-08-07 | 2012-10-09 | International Business Machines Corporation | Secure recursive virtualization |
US9069591B1 (en) * | 2009-09-10 | 2015-06-30 | Parallels IP Holding GmbH | Patching host OS structures for hardware isolation of virtual machines |
JP2011076505A (ja) | 2009-09-30 | 2011-04-14 | Brother Industries Ltd | 情報処理システム及び情報処理方法 |
US20110126194A1 (en) * | 2009-11-24 | 2011-05-26 | International Business Machines Corporation | Shared security device |
US8661436B2 (en) | 2009-12-14 | 2014-02-25 | Citrix Systems, Inc. | Dynamically controlling virtual machine access to optical disc drive by selective locking to a transacting virtual machine determined from a transaction stream of the drive |
JP5458899B2 (ja) * | 2010-01-12 | 2014-04-02 | 富士通株式会社 | 仮想計算機、遠隔起動プログラム、遠隔起動方法及び仮想計算機システム |
US8473947B2 (en) * | 2010-01-18 | 2013-06-25 | Vmware, Inc. | Method for configuring a physical adapter with virtual function (VF) and physical function (PF) for controlling address translation between virtual disks and physical storage regions |
US8977842B1 (en) * | 2010-02-05 | 2015-03-10 | Symantec Corporation | Hypervisor enabled secure inter-container communications |
US8719817B2 (en) * | 2010-03-25 | 2014-05-06 | Vmware, Inc. | Virtualization intermediary/virtual machine guest operating system collaborative SCSI path management |
CN102971706B (zh) * | 2010-05-10 | 2016-08-10 | 思杰系统有限公司 | 将信息从安全虚拟机重定向到不安全虚拟机 |
CN102262557B (zh) * | 2010-05-25 | 2015-01-21 | 运软网络科技(上海)有限公司 | 通过总线架构构建虚拟机监控器的方法及性能服务框架 |
US8429276B1 (en) * | 2010-10-25 | 2013-04-23 | Juniper Networks, Inc. | Dynamic resource allocation in virtual environments |
CN101957900B (zh) * | 2010-10-26 | 2012-02-15 | 中国航天科工集团第二研究院七○六所 | 一种可信虚拟机平台 |
US8839363B2 (en) * | 2011-04-18 | 2014-09-16 | Bank Of America Corporation | Trusted hardware for attesting to authenticity in a cloud environment |
EP2718785A4 (en) * | 2011-06-13 | 2014-12-31 | Lynux Works Inc | SYSTEMS AND METHOD FOR SAFE DOMAIN INSULATION |
WO2013032495A1 (en) * | 2011-08-30 | 2013-03-07 | Hewlett-Packard Development Company , L.P. | Communication with a virtual trusted runtime bios |
-
2011
- 2011-09-29 WO PCT/US2011/054045 patent/WO2013032495A1/en active Application Filing
- 2011-09-29 DE DE112011105568.4T patent/DE112011105568T5/de not_active Withdrawn
- 2011-09-29 JP JP2014527137A patent/JP5809362B2/ja not_active Expired - Fee Related
- 2011-09-29 GB GB1401956.6A patent/GB2507015B/en not_active Expired - Fee Related
- 2011-09-29 BR BR112014003389-7A patent/BR112014003389B1/pt not_active IP Right Cessation
- 2011-09-29 CN CN201180072962.2A patent/CN103748556B/zh not_active Expired - Fee Related
- 2011-09-29 US US14/238,729 patent/US9275230B2/en not_active Expired - Fee Related
- 2011-10-19 CN CN201180074226.0A patent/CN103890715B/zh not_active Expired - Fee Related
- 2011-10-19 EP EP11871598.6A patent/EP2771783B1/en active Active
- 2011-10-19 US US14/347,086 patent/US9542197B2/en active Active
- 2011-10-19 WO PCT/US2011/056932 patent/WO2013032508A1/en active Application Filing
-
2012
- 2012-10-01 TW TW101136225A patent/TWI464680B/zh not_active IP Right Cessation
-
2016
- 2016-02-16 US US15/044,758 patent/US9535710B2/en active Active
- 2016-11-21 US US15/357,805 patent/US10013559B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20160162299A1 (en) | 2016-06-09 |
US10013559B2 (en) | 2018-07-03 |
EP2771783B1 (en) | 2020-08-05 |
CN103890715A (zh) | 2014-06-25 |
GB2507015A (en) | 2014-04-16 |
US9535710B2 (en) | 2017-01-03 |
US20140359259A1 (en) | 2014-12-04 |
EP2771783A4 (en) | 2015-06-03 |
BR112014003389A2 (pt) | 2017-02-21 |
JP2014529130A (ja) | 2014-10-30 |
US20170068817A1 (en) | 2017-03-09 |
TW201322128A (zh) | 2013-06-01 |
EP2771783A1 (en) | 2014-09-03 |
CN103748556A (zh) | 2014-04-23 |
GB201401956D0 (en) | 2014-03-19 |
GB2507015B (en) | 2020-04-29 |
TWI464680B (zh) | 2014-12-11 |
US20140250294A1 (en) | 2014-09-04 |
CN103748556B (zh) | 2018-02-02 |
US9275230B2 (en) | 2016-03-01 |
BR112014003389B1 (pt) | 2021-09-28 |
WO2013032508A1 (en) | 2013-03-07 |
WO2013032495A1 (en) | 2013-03-07 |
DE112011105568T5 (de) | 2014-05-28 |
US9542197B2 (en) | 2017-01-10 |
CN103890715B (zh) | 2017-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5809362B2 (ja) | 仮想トラステッドランタイムbiosとの通信 | |
US10523658B2 (en) | Securing a data connection for communicating between two end-points | |
CN108351944B (zh) | 链式安全系统 | |
US9753742B2 (en) | Web-based interface to access a function of a basic input/output system | |
US9509692B2 (en) | Secured access to resources using a proxy | |
JP6092428B2 (ja) | 特権付き動作を呼び出すためのセキュアインターフェイス | |
JP6222592B2 (ja) | モバイルアプリケーション管理のためのモバイルアプリケーションのアイデンティティの検証 | |
US11656882B2 (en) | Instant virtual application launch | |
US8875240B2 (en) | Tenant data center for establishing a virtual machine in a cloud environment | |
JP2016509806A (ja) | 安全な仮想マシン移行 | |
JP5885851B2 (ja) | 特権ドメインでの基本入出力システム(bios)機能の提供 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20150227 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150317 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20150608 |
|
RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20150608 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20150716 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20150821 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20150910 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5809362 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S531 | Written request for registration of change of domicile |
Free format text: JAPANESE INTERMEDIATE CODE: R313531 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |