METHODS AND APPARATUS FOR CONTROLLING ACCESS TO SECURE COMPUTING RESOURCES

A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: POELUEV, Yuri, LUO, Zhigang
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator POELUEV, Yuri
LUO, Zhigang
description A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating system receives requests for secure computing resources, adds access credentials and passes the requests to a software module in the second operating system.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3586234A4</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3586234A4</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3586234A43</originalsourceid><addsrcrecordid>eNrjZPDydQ3x8HcJVnD0c1FwDAhwDHIMCQ1WcPMPUnD29wsJ8vfx8fRzV3B0dnYNDlYI8VcIdnUODXIFSvoGhIaApIJcg_1Dg4DSPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3jXA2NTCzMjYxNHEmAglACQELVQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>METHODS AND APPARATUS FOR CONTROLLING ACCESS TO SECURE COMPUTING RESOURCES</title><source>esp@cenet</source><creator>POELUEV, Yuri ; LUO, Zhigang</creator><creatorcontrib>POELUEV, Yuri ; LUO, Zhigang</creatorcontrib><description>A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating system receives requests for secure computing resources, adds access credentials and passes the requests to a software module in the second operating system.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200401&amp;DB=EPODOC&amp;CC=EP&amp;NR=3586234A4$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200401&amp;DB=EPODOC&amp;CC=EP&amp;NR=3586234A4$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>POELUEV, Yuri</creatorcontrib><creatorcontrib>LUO, Zhigang</creatorcontrib><title>METHODS AND APPARATUS FOR CONTROLLING ACCESS TO SECURE COMPUTING RESOURCES</title><description>A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating system receives requests for secure computing resources, adds access credentials and passes the requests to a software module in the second operating system.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPDydQ3x8HcJVnD0c1FwDAhwDHIMCQ1WcPMPUnD29wsJ8vfx8fRzV3B0dnYNDlYI8VcIdnUODXIFSvoGhIaApIJcg_1Dg4DSPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3jXA2NTCzMjYxNHEmAglACQELVQ</recordid><startdate>20200401</startdate><enddate>20200401</enddate><creator>POELUEV, Yuri</creator><creator>LUO, Zhigang</creator><scope>EVB</scope></search><sort><creationdate>20200401</creationdate><title>METHODS AND APPARATUS FOR CONTROLLING ACCESS TO SECURE COMPUTING RESOURCES</title><author>POELUEV, Yuri ; LUO, Zhigang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3586234A43</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>POELUEV, Yuri</creatorcontrib><creatorcontrib>LUO, Zhigang</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>POELUEV, Yuri</au><au>LUO, Zhigang</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>METHODS AND APPARATUS FOR CONTROLLING ACCESS TO SECURE COMPUTING RESOURCES</title><date>2020-04-01</date><risdate>2020</risdate><abstract>A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating system receives requests for secure computing resources, adds access credentials and passes the requests to a software module in the second operating system.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3586234A4
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title METHODS AND APPARATUS FOR CONTROLLING ACCESS TO SECURE COMPUTING RESOURCES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T13%3A12%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=POELUEV,%20Yuri&rft.date=2020-04-01&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3586234A4%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true