Redirection of Information from Secure Virtual Machines to Unsecure Virtual Machines
First Claim
1. In a computing device executing a hypervisor hosting a secure virtual machine and an unsecure virtual machine, a method for redirecting an access request to an unsecure virtual machine, comprising:
- intercepting, by a control virtual machine hosted by a hypervisor executing on a computing device, a request to access an unsecure resource, the unsecure resource comprising one of;
a file, an application and an uniform resource locator (URL);
determining, by the control virtual machine, that the request originates from a secure virtual machine executing on the computing device;
redirecting, by the control virtual machine responsive to the determination, the request to an unsecure virtual machine executing on the computing device; and
accessing, via the unsecure virtual machine, the requested unsecure resource.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed towards methods and systems for redirecting an access request to an unsecure virtual machine. A computing device may execute a hypervisor hosting a secure virtual machine and an unsecure virtual machine. A control virtual machine, hosted by a hypervisor executing on the computing device, may intercept a request to access an unsecure resource. The unsecure resource may include one of: a file, an application and an uniform resource locator (URL). The control virtual machine may further determine that the request originates from a secure virtual machine executing on the computing device. The control virtual machine may redirect, responsive to the determination, the request to an unsecure virtual machine executing on the computing device, whereupon the unsecure virtual machine may provide access to the requested unsecure resource.
353 Citations
20 Claims
-
1. In a computing device executing a hypervisor hosting a secure virtual machine and an unsecure virtual machine, a method for redirecting an access request to an unsecure virtual machine, comprising:
-
intercepting, by a control virtual machine hosted by a hypervisor executing on a computing device, a request to access an unsecure resource, the unsecure resource comprising one of;
a file, an application and an uniform resource locator (URL);determining, by the control virtual machine, that the request originates from a secure virtual machine executing on the computing device; redirecting, by the control virtual machine responsive to the determination, the request to an unsecure virtual machine executing on the computing device; and accessing, via the unsecure virtual machine, the requested unsecure resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a computing device executing a hypervisor hosting a secure virtual machine and an unsecure virtual machine, a system for redirecting an access request to an unsecure virtual machine, comprising:
-
a hypervisor executing on a computing device and hosting a control virtual machine, a secure virtual machine and an unsecure virtual machine, wherein the control virtual machine is configured to; intercept a request for access to an unsecure resource, the unsecure resource comprising one of;
a file, an application and an uniform resource locator (URL),determine if the request originates from the secure virtual machine, and redirecting, responsive to a determination that the request originates from the secure virtual machine, the request to the unsecure virtual machine executing on the computing device, whereupon the unsecure virtual machine provides access to the requested unsecure resource. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. In a computing device executing a hypervisor hosting a secure virtual machine and an unsecure virtual machine, a method for redirecting an access request to an unsecure virtual machine, comprising:
-
intercepting, by a control virtual machine hosted by a hypervisor executing on a computing device, a request to access an secure resource, the secure resource comprising one of;
a file, an application and an uniform resource locator (URL);determining, by the control virtual machine, that the request originates from a unsecure virtual machine executing on the computing device; redirecting, by the control virtual machine responsive to the determination, the request to an secure virtual machine executing on the computing device; and accessing, via the secure virtual machine, the requested unsecure resource.
-
Specification