Virtual machine communication
First Claim
1. A computer-implemented method, comprising:
- constructing a first message on behalf of a first program executing in a first virtual machine;
selecting a second virtual machine from one or more virtual machines;
communicating security information for the first program to the second virtual machine, where the security information indicates a security sandbox associated with the first program;
communicating the first message from the first virtual machine to the second virtual machine, the first message to be processed by the second virtual machine with regard to the security information and the security sandbox,where communicating the security information and communicating the first message are performed without remote method invocation (RMI), stub, and skeleton components.
2 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure includes, among other things, systems, methods and program products for virtual machine communication. For example, one or more aspects of the subject matter described in this disclosure can be embodied in one or more methods that include constructing a first message on behalf of a first program executing in a first virtual machine. A second virtual machine is selected from one or more virtual machines. Security information for the first program is communicated to the second virtual machine. The first message is communicated from the first virtual machine to the second virtual machine, the first message to be processed by the second virtual machine with regard to the security information.
34 Citations
25 Claims
-
1. A computer-implemented method, comprising:
-
constructing a first message on behalf of a first program executing in a first virtual machine; selecting a second virtual machine from one or more virtual machines; communicating security information for the first program to the second virtual machine, where the security information indicates a security sandbox associated with the first program; communicating the first message from the first virtual machine to the second virtual machine, the first message to be processed by the second virtual machine with regard to the security information and the security sandbox, where communicating the security information and communicating the first message are performed without remote method invocation (RMI), stub, and skeleton components. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product, encoded on a non-transitory computer-readable medium, operable to cause data processing apparatus to perform operations comprising:
-
constructing a first message on behalf of a first program executing in a first virtual machine; selecting a second virtual machine from one or more virtual machines; communicating security information for the first program to the second virtual machine, where the security information indicates a security sandbox associated with the first program; and communicating the first message from the first virtual machine to the second virtual machine, the first message to be processed by the second virtual machine with regard to the security information and the security sandbox, where communicating the security information and communicating the first message are performed without remote method invocation (RMI), stub, and skeleton components. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a first virtual machine on a first computing device; a second virtual machine on a second computing device; and where the first computing device has encoded on a computer-readable medium instructions operable to cause the first computing device to perform operations comprising; constructing a first message on behalf of a first program executing in the first virtual machine; communicating security information for the first program to the second virtual machine, where the security information indicates a security sandbox associated with the first program; and communicating the first message from the first virtual machine to the second virtual machine, the first message to be processed by the second virtual machine with regard to the security information and the security sandbox, where communicating the security information and communicating the first message are performed without remote method invocation (RMI), stub, and skeleton components. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification