首页> 外国专利> Hardware-based virtualized security isolation techniques

Hardware-based virtualized security isolation techniques

机译:基于硬件的虚拟化安全隔离技术

摘要

A host operating system running on a computing device monitors network communications for a computing device to identify network resources requested by the computing device. The host operating system compares the requested network resource with a security policy to determine whether the requested network resource is trusted. When an unreliable network resource is identified, the host operating system accesses an unreliable network resource in an isolated container from the host operating system kernel using the techniques discussed herein. By constraining access to untrusted network resources to isolated containers, the host operating system is protected from kernel level attacks or infections that can result from unreliable network resources.
机译:在计算设备上运行的主机操作系统监视计算设备的网络通信,以识别计算设备请求的网络资源。主机操作系统将请求的网络资源与安全策略进行比较,以确定请求的网络资源是否受信任。当识别出不可靠的网络资源时,主机操作系统使用此处讨论的技术从主机操作系统内核访问隔离容器中的不可靠网络资源。通过将对不受信任的网络资源的访问限制到隔离的容器中,可以保护主机操作系统免受内核级别的攻击或感染,这些攻击或感染是由不可靠的网络资源引起的。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号