Method for controlling file access on computer systems
First Claim
1. A method for controlling file access on computer systems, said method comprising:
- providing a virtual machine manager (VMM) in a computer system;
in response to a write request,determining whether or not a location field is valid by said VMM;
writing write request information to a storage device by said VMM if said location field is not valid; and
encrypting said write request information with a public key associated with said location field by said VMM before writing said write request information to said storage device if said location field is valid; and
in response to a read request,determining whether or not a location field is valid by said VMM;
sending read request information from said storage device by said VMM if said location field is not valid; and
decrypting information with a public key associated with said location field by said VMM before sending said read request information device if said location field is valid.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
53 Citations
15 Claims
-
1. A method for controlling file access on computer systems, said method comprising:
-
providing a virtual machine manager (VMM) in a computer system; in response to a write request, determining whether or not a location field is valid by said VMM; writing write request information to a storage device by said VMM if said location field is not valid; and encrypting said write request information with a public key associated with said location field by said VMM before writing said write request information to said storage device if said location field is valid; and in response to a read request, determining whether or not a location field is valid by said VMM; sending read request information from said storage device by said VMM if said location field is not valid; and decrypting information with a public key associated with said location field by said VMM before sending said read request information device if said location field is valid. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer usable medium having a computer program product for controlling file access on computer systems, said computer usable medium comprising:
-
program code means for providing a virtual machine manager (VMM) in a computer system; in response to a write request, program code means for determining whether or not a location field is valid by said VMM; program code means for writing write request information to a storage device by said VMM if said location field is not valid; and program code means for encrypting said write request information with a public key associated with said location field by said VMM before writing said write request information to said storage device if said location field is valid; and in response to a read request, program code means for determining whether or not a location field is valid by said VMM; program code means for sending read request information from said storage device by said VMM if said location field is not valid; and program code means for decrypting information with a public key associated with said location field by said VMM before sending said read request information device if said location field is valid. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer system capable of controlling file access, said computer system comprising:
-
a virtual machine manager (VMM); in response to a write request, means for determining whether or not a location field is valid by said VMM; means for writing write request information to a storage device by said VMM if said location field is not valid; and means for encrypting said write request information with a public key associated with said location field by said VMM before writing said write request information to said storage device if said location field is valid; and in response to a read request, means for determining whether or not a location field is valid by said VMM; means for sending read request information from said storage device by said VMM if said location field is not valid; and means for decrypting information with a public key associated with said location field by said VMM before sending said read request information device if said location field is valid. - View Dependent Claims (12, 13, 14, 15)
-
Specification