Systems and methods for securing virtual machine computing environments
First Claim
Patent Images
1. A method for securing data, the method comprising:
- receiving, using a hardware processor, a request for a security operation from a first virtual machine operating in a host operating system of a first device, wherein the security operation is to be performed by one or more of a plurality of security modules including a first security module implemented in a kernel of the host operating system and a second security module;
in response to receiving the request;
determining whether the second security module is available to execute the request;
selecting the first security module implemented in the kernel of the host operating system to execute the security operation in response to determining that the second security module is not available to execute the request; and
executing the security operation at the first security module implemented in the kernel of the host operating system andproviding a result of the security operation to the first virtual machine.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first virtual machine operating in a host operating system of a first device. In response to receiving the request, a first security module executes the security operation, the first security module implemented in a kernel of the host operating system. The result of the security operation is provided to the first virtual machine.
-
Citations
27 Claims
-
1. A method for securing data, the method comprising:
-
receiving, using a hardware processor, a request for a security operation from a first virtual machine operating in a host operating system of a first device, wherein the security operation is to be performed by one or more of a plurality of security modules including a first security module implemented in a kernel of the host operating system and a second security module; in response to receiving the request; determining whether the second security module is available to execute the request; selecting the first security module implemented in the kernel of the host operating system to execute the security operation in response to determining that the second security module is not available to execute the request; and executing the security operation at the first security module implemented in the kernel of the host operating system and providing a result of the security operation to the first virtual machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for securing virtual machines, the system comprising:
a processor including processor circuitry, the processor being configured to; execute a host operating system having a kernel; receive a request for a security operation, from a first virtual machine operating in the host operating system, wherein the security operation is to be performed by one or more of a plurality of security modules including a first security implemented in the kernel of the host operating system and a second security module; in response to receiving the request; determine whether the second security module is available to execute the request; select the first security module implemented in the kernel of the host operating system to execute the security operation in response to determining that the second security module is not available to execute the request; and execute the security operation at the first security module implemented in the kernel of the host operating system; and provide a result the security operation to the first virtual machine. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
Specification