Methods and apparatus for containerized secure computing resources
Abstract:
A computing device has first and second operating systems with access to separate first and second memories. The second operating system hosts containers which provide separate execution environments. The containers have secure computing resources. A software module in the second operating system receives access requests from applications in the first operating system and selectively passes the requests based on rules for accessing the containers.
Public/Granted literature
Information query
Patent Agency Ranking
0/0