Data Protection Using Virtual Resource Views
First Claim
1. A method of protecting data using virtual views of resource contents, comprising:
- monitoring, by a virtualization interface monitor of a computing device, a request to access a computing device resource by a first requesting entity;
determining, by the virtualization interface monitor, whether the first requesting entity is an owner of the computing device resource;
providing, by a data protection system of the computing device to the first requesting entity, an unobscured virtual view of resource contents of the computing device resource in response to determining that the first requesting entity is the owner of the computing device resource; and
providing, by the data protection system to the first requesting entity, an obscured virtual view of the resource contents of the computing device resource in response to determining that the first requesting entity is a non-owner of the computing device resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments include computing devices, systems, and methods for protecting data using virtual views of resource contents. A virtualization interface monitor may monitor a request to access a computing device resource by a first requesting entity and determine whether the first requesting entity is an owner of the computing device resource. A data protection system may provide, to the first requesting entity, an unobscured virtual view of resource contents of the computing device resource in response to determining that the first requesting entity is the owner of the computing device resource. A resource content cryptographic device may obscure a virtual view of the resource contents of the computing device resource in response to determining that the first requesting entity is a non-owner of the computing device resource. The data protection system may provide, to the first requesting entity, the obscured virtual view of resource contents of the computing device resource.
50 Citations
28 Claims
-
1. A method of protecting data using virtual views of resource contents, comprising:
-
monitoring, by a virtualization interface monitor of a computing device, a request to access a computing device resource by a first requesting entity; determining, by the virtualization interface monitor, whether the first requesting entity is an owner of the computing device resource; providing, by a data protection system of the computing device to the first requesting entity, an unobscured virtual view of resource contents of the computing device resource in response to determining that the first requesting entity is the owner of the computing device resource; and providing, by the data protection system to the first requesting entity, an obscured virtual view of the resource contents of the computing device resource in response to determining that the first requesting entity is a non-owner of the computing device resource. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device, comprising:
-
a data protection system comprising a virtualization interface monitor and a resource content cryptographic device, wherein the virtualization interface monitor is configured with virtualization interface monitor-executable instructions to perform operations comprising; monitoring a request to access a computing device resource by a first requesting entity; and determining whether the first requesting entity is an owner of the computing device resource, and wherein the data protection system is configured with data protection system-executable instructions to perform operations comprising; providing, to the first requesting entity, an unobscured virtual view of resource contents of the computing device resource in response to determining that the first requesting entity is the owner of the computing device resource; and providing, to the first requesting entity, an obscured virtual view of the resource contents of the computing device resource in response to determining that the first requesting entity is a non-owner of the computing device resource. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device configured for protecting data using virtual views of resource contents, comprising:
-
means for monitoring a request to access a computing device resource by a first requesting entity; means for determining whether the first requesting entity is an owner of the computing device resource; means for providing, to the first requesting entity, an unobscured virtual view of resource contents of the computing device resource in response to determining that the first requesting entity is the owner of the computing device resource; and means for providing, to the first requesting entity, an obscured virtual view of resource contents of the computing device resource in response to determining that the first requesting entity is a non-owner of the computing device resource. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a processor of a computing device to perform operations comprising:
-
monitoring a request to access a computing device resource by a first requesting entity; determining whether the first requesting entity is an owner of the computing device resource; providing, to the first requesting entity, an unobscured virtual view of resource contents of the computing device resource in response to determining that the first requesting entity is the owner of the computing device resource; and providing, to the first requesting entity, an obscured virtual view of resource contents of the computing device resource in response to determining that the first requesting entity is a non-owner of the computing device resource. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification