MULTIPLE ENCRYPTION KEYS FOR A VIRTUAL MACHINE
First Claim
Patent Images
1. A method comprising:
- with a computing system, exiting a context of a virtual machine, the exiting in response to a request to switch from a first encryption key identifier for the virtual machine to a second encryption key identifier for the virtual machine;
with the computing system, loading the second encryption key identifier into a virtual machine control module associated with the virtual machine; and
with the computing system, after loading the second encryption key identifier, entering the context of the virtual machine.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes, with a computing system, exiting a context of a virtual machine, the exiting in response to a request from a guest operating system of the virtual machine to switch from a first encryption key identifier for the virtual machine to a second encryption key identifier for the virtual machine. The method further includes, with the computing system, loading the second encryption key identifier into a virtual machine control module of a virtual processor of the virtual machine and after loading the second encryption key identifier, entering the context of the virtual machine.
-
Citations
20 Claims
-
1. A method comprising:
-
with a computing system, exiting a context of a virtual machine, the exiting in response to a request to switch from a first encryption key identifier for the virtual machine to a second encryption key identifier for the virtual machine; with the computing system, loading the second encryption key identifier into a virtual machine control module associated with the virtual machine; and with the computing system, after loading the second encryption key identifier, entering the context of the virtual machine. - View Dependent Claims (2, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising,
with a guest operating system, switching from a first application of a first application set to a second application of a second application set, the first application set being associated with a first encryption key identifier and the second application set being associated with a second encryption key identifier; -
with the guest operating system, sending a request to a hypervisor managing a virtual machine that supports the guest operating system, the request being to switch from the first encryption key identifier to the second encryption key identifier for a virtual processor; and with the guest operating system, after receiving notification the second encryption key identifier has been loaded, executing the second application. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
with a hypervisor, receiving a request from a guest operating system of the virtual machine supported by the hypervisor, the request being to switch an encryption key identifier in a virtual machine control module for the machine from a first encryption key identifier to a second encryption key identifier; with the hypervisor, switching the encryption key identifier in the virtual machine control module of a virtual processor from the first encryption key identifier to the second encryption key identifier, both the first encryption key identifier and the second encryption key identifier being valid for the virtual machine; and causing the host computing system that supports the virtual machine to enter a context of the virtual machine. - View Dependent Claims (19, 20)
-
Specification