Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_e757fd4fedc4fe825bb81b1b466a0947 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2009-45583 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2009-45587 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-57 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-60 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-53 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-45558 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-065 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-604 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-0622 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-0683 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-0623 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-46 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-445 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-57 |
filingDate |
2016-12-09^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_6ece5adb6c6481a227ae8e208059dd83 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_76e31664677031199f0437143756fec5 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_575c7a7171dd9a12aed20b3820079533 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_da298aa6a125f49ea6b3bb9c91016851 |
publicationDate |
2017-06-22^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
JP-2017111812-A |
titleOfInvention |
Method, computer system, firmware, hypervisor and computer program for transparent and safe interception processing |
abstract |
An object of the present invention is to ensure that access to customer data or algorithms from a cloud provider is not possible. Virtual machines 128.1 to 128. When deploying N, the hypervisor 112 provides a buffer to the firmware, intercepts a VM instruction requesting access to instruction data, copies the VM state to the shadow VM state buffer of the firmware, Copy instruction data to buffer. When a buffer is used to execute an intercepted VM instruction by the hypervisor and result data is generated, before resuming execution of the VM instruction, at least one of the shadow VM state buffer and the VM data in the VM memory Is updated with the result data in the buffer, and execution of the VM instruction is resumed following the intercepted VM instruction based on the state stored in the shadow VM state buffer. [Selection] Figure 1 |
priorityDate |
2015-12-17^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |