SYSTEM AND METHOD FOR HARDWARE ACCESS CONTROL
First Claim
1. A system for hardware access control comprising a virtual machine system including a client operating system, a virtual machine monitor and a hardware device, the system further comprises:
- an access control module provided in the virtual machine monitor and configured to send an authorization request via a network after intercepting a device access instruction from the client operating system; and
an authorization management server configured to receive the authorization request from the access control module, judge whether the authorization request satisfies a predetermined authorization strategy and feed back a response corresponding to the authorization request to the access control module,wherein the access control module determines whether the client operating system is permitted to access the hardware device based on the feedback from the authorization management server.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a system and method for hardware access control comprising a virtual machine system including a client operating system, a virtual machine monitor and a hardware device, the system further comprises: an access control module provided in the virtual machine monitor and configured to send an authorization request via a network after intercepting a device access instruction from the client operating system; and an authorization management server configured to receive the authorization request from the access control module, judge whether the authorization request satisfies a predetermined authorization strategy and feed back a response corresponding to the authorization request to the access control module; wherein the access control module determines whether the client operating system is permitted to access the hardware device based on the feedback from the authorization management server. With the present invention, the access to the hardware device from the client operating system can be effectively controlled, and thus legal data copy can be guaranteed while prohibiting any illegal data copy.
72 Citations
23 Claims
-
1. A system for hardware access control comprising a virtual machine system including a client operating system, a virtual machine monitor and a hardware device, the system further comprises:
-
an access control module provided in the virtual machine monitor and configured to send an authorization request via a network after intercepting a device access instruction from the client operating system; and an authorization management server configured to receive the authorization request from the access control module, judge whether the authorization request satisfies a predetermined authorization strategy and feed back a response corresponding to the authorization request to the access control module, wherein the access control module determines whether the client operating system is permitted to access the hardware device based on the feedback from the authorization management server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for hardware access control comprising steps of:
-
intercepting a request for accessing a hardware device from a client operating system and generating a corresponding authorization request; judging whether the authorization request satisfies a predetermined authorization strategy and generating a response corresponding to the authorization request; and permitting or rejecting the access to the hardware device from the client operating based on the authorization request response. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
Specification