18067797. DATA PROCESSING METHOD, HOST, AND APPARATUS simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

DATA PROCESSING METHOD, HOST, AND APPARATUS

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

Wen Yin of Shenzhen (CN)

Hong Li of Wuhan (CN)

Yingxin Qiu of Shenzhen (CN)

Xiaowei Lin of Shenzhen (CN)

DATA PROCESSING METHOD, HOST, AND APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18067797 titled 'DATA PROCESSING METHOD, HOST, AND APPARATUS

Simplified Explanation

The abstract describes a data processing host that has a program running environment and a first isolation environment. The first isolation environment is separate from the program running environment and operates in a secure mode. The program running environment operates in a non-secure mode and includes a virtual instance. The first isolation environment includes an operating system in the secure mode and a resource allocated to it, which includes a first isolation space and a secure processing program.

  • The data processing host has a program running environment and a first isolation environment.
  • The first isolation environment is isolated from the program running environment.
  • The host operates in a non-secure mode in the program running environment.
  • The host operates in a secure mode in the first isolation environment.
  • The program running environment includes a virtual instance operating in the non-secure mode.
  • The first isolation environment corresponds to the virtual instance in the program running environment.
  • The first isolation environment includes an operating system in the secure mode.
  • The first isolation environment has a resource allocated to it.
  • The resource includes a first isolation space for running the operating system and a secure processing program.
  • The secure processing program processes to-be-processed data.

Potential Applications

  • Secure data processing in a host environment.
  • Isolating sensitive operations from non-secure operations.
  • Protecting data and programs from unauthorized access.

Problems Solved

  • Ensuring secure processing of data in a non-secure environment.
  • Preventing unauthorized access to sensitive data and programs.
  • Providing isolation between secure and non-secure operations.

Benefits

  • Enhanced security for data processing.
  • Improved protection against unauthorized access.
  • Efficient allocation of resources for secure processing.


Original Abstract Submitted

A data processing host includes a program running environment and a first isolation environment. The first isolation environment is isolated from the program running environment. The host operates in a non-secure mode in the program running environment, and operates in a secure mode in the first isolation environment. The program running environment includes a virtual instance operating in the non-secure mode, and the first isolation environment corresponds to the virtual instance in the program running environment. The first isolation environment includes an operating system in the secure mode and a resource allocated to the first isolation environment and comprising a first isolation space for running the operation system and a secure processing program, which corresponds to a program in the virtual instance and is for processing to-be-processed data.