18067797. DATA PROCESSING METHOD, HOST, AND APPARATUS simplified abstract (Huawei Technologies Co., Ltd.)
Contents
DATA PROCESSING METHOD, HOST, AND APPARATUS
Organization Name
Inventor(s)
DATA PROCESSING METHOD, HOST, AND APPARATUS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18067797 titled 'DATA PROCESSING METHOD, HOST, AND APPARATUS
Simplified Explanation
The abstract describes a data processing host that has a program running environment and a first isolation environment. The first isolation environment is separate from the program running environment and operates in a secure mode. The program running environment operates in a non-secure mode and includes a virtual instance. The first isolation environment includes an operating system in the secure mode and a resource allocated to it, which includes a first isolation space and a secure processing program.
- The data processing host has a program running environment and a first isolation environment.
- The first isolation environment is isolated from the program running environment.
- The host operates in a non-secure mode in the program running environment.
- The host operates in a secure mode in the first isolation environment.
- The program running environment includes a virtual instance operating in the non-secure mode.
- The first isolation environment corresponds to the virtual instance in the program running environment.
- The first isolation environment includes an operating system in the secure mode.
- The first isolation environment has a resource allocated to it.
- The resource includes a first isolation space for running the operating system and a secure processing program.
- The secure processing program processes to-be-processed data.
Potential Applications
- Secure data processing in a host environment.
- Isolating sensitive operations from non-secure operations.
- Protecting data and programs from unauthorized access.
Problems Solved
- Ensuring secure processing of data in a non-secure environment.
- Preventing unauthorized access to sensitive data and programs.
- Providing isolation between secure and non-secure operations.
Benefits
- Enhanced security for data processing.
- Improved protection against unauthorized access.
- Efficient allocation of resources for secure processing.
Original Abstract Submitted
A data processing host includes a program running environment and a first isolation environment. The first isolation environment is isolated from the program running environment. The host operates in a non-secure mode in the program running environment, and operates in a secure mode in the first isolation environment. The program running environment includes a virtual instance operating in the non-secure mode, and the first isolation environment corresponds to the virtual instance in the program running environment. The first isolation environment includes an operating system in the secure mode and a resource allocated to the first isolation environment and comprising a first isolation space for running the operation system and a secure processing program, which corresponds to a program in the virtual instance and is for processing to-be-processed data.