Device for and method of secure computing using virtual machines
First Claim
1. A device for secure computing, comprising:
- a) a computer system, where the computer system includes a processor;
b) an operating-system software-program loaded onto the processor of the computer system;
c) a type-II virtual-machine monitor software-program loaded onto the operating-system software-program of the computer system;
d) a user-definable number of non-sensitive virtual-machines;
e) a user-definable number of sensitive virtual-machines, where each sensitive virtual-machine has a user-definable sensitivity level;
f) a user-definable number of encryption virtual-machines, where each encryption virtual-machine is connected to one of said user-definable number of sensitive virtual-machines, and where each encryption virtual-machine includes at least one encryption algorithm capable of encrypting information from the corresponding sensitive virtual-machine according to the corresponding sensitivity level; and
g) a router virtual-machine connected to each non-sensitive virtual-machine and each encryption virtual-machine.
1 Assignment
0 Petitions
Accused Products
Abstract
A device for and method of secure computing that includes a computer system having a processor; an operating-system software program loaded onto the processor; a type-II virtual machine monitor software program loaded onto the operating-system software program; a user-definable number of non-sensitive virtual-machines; a user-definable number of sensitive virtual-machines, where each sensitive virtual-machine has a user-definable sensitivity level; a user-definable number of encryption virtual-machines, where each encryption virtual-machine is connected to one of said user-definable number of sensitive virtual-machines, and where each encryption virtual-machine includes at least one encryption algorithm capable of encrypting information from the corresponding sensitive virtual-machine according to the corresponding sensitivity level; and a router virtual-machine connected to each non-sensitive virtual-machine and each encryption virtual-machine.
183 Citations
14 Claims
-
1. A device for secure computing, comprising:
-
a) a computer system, where the computer system includes a processor;
b) an operating-system software-program loaded onto the processor of the computer system;
c) a type-II virtual-machine monitor software-program loaded onto the operating-system software-program of the computer system;
d) a user-definable number of non-sensitive virtual-machines;
e) a user-definable number of sensitive virtual-machines, where each sensitive virtual-machine has a user-definable sensitivity level;
f) a user-definable number of encryption virtual-machines, where each encryption virtual-machine is connected to one of said user-definable number of sensitive virtual-machines, and where each encryption virtual-machine includes at least one encryption algorithm capable of encrypting information from the corresponding sensitive virtual-machine according to the corresponding sensitivity level; and
g) a router virtual-machine connected to each non-sensitive virtual-machine and each encryption virtual-machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of secure computing, comprising the steps of:
-
a) acquiring a computer system, where the computer system includes a processor;
b) loading a host operating-system software program onto the processor of the computer system;
c) loading a type-II virtual machine monitor software program onto the operating system of the computer system;
d) creating a user-definable number of non-sensitive virtual-machines;
e) creating a user-definable number of sensitive virtual-machines, where each sensitive virtual-machine has a user-definable sensitivity level;
f) creating a user-definable number of encryption virtual-machines, where each encryption virtual-machine is connected to one of said user-definable number of sensitive virtual-machines, and where each encryption virtual-machine includes at least one encryption algorithm capable of encrypting information from the corresponding sensitive virtual-machine according to the corresponding sensitivity level; and
g) creating a router virtual-machine connected to each non-sensitive virtual-machine and each encryption virtual-machine. - View Dependent Claims (10, 11, 12, 13, 14)
-
Specification