Systems and methods for securing virtual machine computing environments
First Claim
Patent Images
1. A method for securing data, the method comprising:
- receiving, by a hardware processor, a request for a security operation, to be performed by one of a plurality of security modules including a first security module and a second security module, from a first virtual machine operating in a host operating system of a first device;
in response to receiving the request;
determining whether the second security module implemented in a kernel of an operating system of the first virtual machine is available to execute the request;
selecting the first security module, implemented in a kernel of the host operating system, from the plurality of security modules in response to determining that the second security module is not available to execute the request; and
executing the security operation at the first security module; and
providing a result of the security operation to the first virtual machine.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first virtual machine operating in a host operating system of a first device. In response to receiving the request, a first security module executes the security operation, the first security module implemented in a kernel of the host operating system. The result of the security operation is provided to the first virtual machine.
-
Citations
26 Claims
-
1. A method for securing data, the method comprising:
-
receiving, by a hardware processor, a request for a security operation, to be performed by one of a plurality of security modules including a first security module and a second security module, from a first virtual machine operating in a host operating system of a first device; in response to receiving the request; determining whether the second security module implemented in a kernel of an operating system of the first virtual machine is available to execute the request; selecting the first security module, implemented in a kernel of the host operating system, from the plurality of security modules in response to determining that the second security module is not available to execute the request; and executing the security operation at the first security module; and providing a result of the security operation to the first virtual machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for securing virtual machines, the system comprising:
processing circuitry, including a hardware processor, configured to; execute a host operating system having a kernel; receive a request for a security operation, to be performed by one of a plurality of security modules including a first security module and a second security module, from a first virtual machine operating in the host operating system; in response to receiving the request; determine whether the second security module implemented in a kernel of an operating system of the first virtual machine is available to execute the request; select the first security module, implemented in the kernel of the host operating system, from the plurality of security modules in response to determining that the second security module is not available to execute the request; and execute the security operation at the first security module; and provide a result of the security operation to the first virtual machine. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
Specification