SECURE VIRTUAL MACHINE MEMORY
First Claim
1. An apparatus, comprising:
- a first node including encrypted memory locations that have been allocated to store encrypted information; and
a storage supervision processor executing a single hypervisor and communicatively coupled to the first node to permit access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and to deny access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM, the information to be encrypted and decrypted using the single hypervisor.
16 Assignments
0 Petitions
Accused Products
Abstract
Apparatus, systems, and methods may operate to allocating encrypted memory locations to store encrypted information, the information to be encrypted and decrypted using a single hypervisor. Further activity may include permitting access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and denying access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM. In some embodiments, the operational state of the associated VM may be restored using the encrypted information. Additional apparatus, systems, and methods are disclosed.
-
Citations
20 Claims
-
1. An apparatus, comprising:
-
a first node including encrypted memory locations that have been allocated to store encrypted information; and a storage supervision processor executing a single hypervisor and communicatively coupled to the first node to permit access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and to deny access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM, the information to be encrypted and decrypted using the single hypervisor. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A processor-implemented method to execute on one or more processors that perform the method, comprising:
-
allocating encrypted memory locations to store encrypted information, the information to be encrypted and decrypted using a single hypervisor; permitting access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor; and denying access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A processor-implemented method to execute on one or more processors that perform the method, comprising:
-
restoring an operational state of an associated virtual machine (VM), using encrypted information stored in encrypted memory locations, the information to be encrypted and decrypted using a single hypervisor; and permitting access to a designated number of the encrypted memory locations only to a single application executed by the associated VM subject to the hypervisor, wherein the access is denied to any other application executed by the associated VM, or any other VM. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification