http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-2017111812-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_e757fd4fedc4fe825bb81b1b466a0947
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2009-45583
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2009-45587
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-57
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-60
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-53
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-45558
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-065
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-604
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-0622
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-0683
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-0623
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-46
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-445
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-57
filingDate 2016-12-09^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_6ece5adb6c6481a227ae8e208059dd83
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_76e31664677031199f0437143756fec5
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_575c7a7171dd9a12aed20b3820079533
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_da298aa6a125f49ea6b3bb9c91016851
publicationDate 2017-06-22^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber JP-2017111812-A
titleOfInvention Method, computer system, firmware, hypervisor and computer program for transparent and safe interception processing
abstract An object of the present invention is to ensure that access to customer data or algorithms from a cloud provider is not possible. Virtual machines 128.1 to 128. When deploying N, the hypervisor 112 provides a buffer to the firmware, intercepts a VM instruction requesting access to instruction data, copies the VM state to the shadow VM state buffer of the firmware, Copy instruction data to buffer. When a buffer is used to execute an intercepted VM instruction by the hypervisor and result data is generated, before resuming execution of the VM instruction, at least one of the shadow VM state buffer and the VM data in the VM memory Is updated with the result data in the buffer, and execution of the VM instruction is resumed following the intercepted VM instruction based on the state stored in the shadow VM state buffer. [Selection] Figure 1
priorityDate 2015-12-17^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID516892
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID453034310

Showing number of triples: 1 to 28 of 28.