METHODOLOGY FOR SECURE APPLICATION PARTITIONING ENABLEMENT
First Claim
1. A computer implemented method for configuring a short lived secure partition in a data processing system, the computer implemented method comprising:
- receiving a command to create a short lived secure partition for a secure application;
creating the short lived secure partition in the data processing system, the short lived secure partition being inaccessible by superusers or other applications;
allocating system resources comprising physical resources and virtual allocations of the physical resources to the short lived secure partition; and
loading hardware and software components needed to run the secure application in the short lived secure partition.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented methods data processing system, and computer program product for configuring a partition with needed system resources to enable an application to run and process in a secure environment. Upon receiving a command to create a short lived secure partition for a secure application, a short lived secure partition is created in the data processing system. This short lived secure partition is inaccessible by superusers or other applications. System resources comprising physical resources and virtual allocations of the physical resources are allocated to the short lived secure partition. Hardware and software components needed to run the secure application are loaded into the short lived secure partition.
-
Citations
20 Claims
-
1. A computer implemented method for configuring a short lived secure partition in a data processing system, the computer implemented method comprising:
-
receiving a command to create a short lived secure partition for a secure application; creating the short lived secure partition in the data processing system, the short lived secure partition being inaccessible by superusers or other applications; allocating system resources comprising physical resources and virtual allocations of the physical resources to the short lived secure partition; and loading hardware and software components needed to run the secure application in the short lived secure partition. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A data processing system for configuring a short lived secure partition in a data processing system, the data processing system comprising:
-
a bus; a storage device connected to the bus, wherein the storage device contains computer usable code; at least one managed device connected to the bus; a communications unit connected to the bus; and a processing unit connected to the bus, wherein the processing unit executes the computer usable code to receive a command to create a short lived secure partition for a secure application;
create the short lived secure partition in the data processing system, the short lived secure partition being inaccessible by superusers or other applications;
allocate system resources comprising physical resources and virtual allocations of the physical resources to the short lived secure partition; and
load hardware and software components needed to run the secure application in the short lived secure partition.
-
-
16. A computer program product for configuring a short lived secure partition in a data processing system, the computer program product comprising:
-
a computer usable medium having computer usable program code tangibly embodied thereon, the computer usable program code comprising; computer usable program code for receiving a command to create a short lived secure partition for a secure application, the short lived secure partition being inaccessible by superusers or other applications; computer usable program code for creating the short lived secure partition in the data processing system; computer usable program code for allocating system resources comprising physical resources and virtual allocations of the physical resources to the short lived secure partition; and computer usable program code for loading hardware and software components needed to run the secure application in the short lived secure partition. - View Dependent Claims (17, 18, 19, 20)
-
Specification