FIELD: information technologies.
SUBSTANCE: in method and system they bring hypervisor into effect in order to control access to computer system given out for rent. Hypervisor performs the following stages: reading of rent index from nonvolatile holding area, comparison of rent index to rent limit, permission for use of one or more guest operating systems by computer system user in response to rent index being within the frames set by rent limit, and prohibition for use of guest operating systems by use of computer system in response to rent index exceeding rent limit.
EFFECT: protection against unauthorised modifications in case of rent provision.
20 cl, 124 dwg
Title | Year | Author | Number |
---|---|---|---|
IMPLEMENTING SECURE INFORMATION EXCHANGE IN RUNTIME SYSTEM | 2012 |
|
RU2584570C2 |
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
VIRTUAL MACHINE INSTANCE ZOOMING | 2013 |
|
RU2616167C2 |
DOUBLE SELF-TEST OF MEMORY FOR PROTECTION OF MULTIPLE NETWORK ENDPOINTS | 2016 |
|
RU2714607C2 |
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF | 2014 |
|
RU2672712C2 |
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE | 2014 |
|
RU2675902C2 |
SYSTEM OF USERS' INTERACTION IN TRANSACTIONS WITH REAL ESTATE OBJECTS | 2016 |
|
RU2634208C1 |
METHOD OF TRUSTED DOWNLOAD IN VIRTUALISED MEDIA | 2014 |
|
RU2581552C2 |
SYSTEM AND METHODS FOR AUDITING A VIRTUAL MACHINE | 2017 |
|
RU2691187C1 |
SYSTEM AND METHOD OF STAGED INCREASE OF INFORMATION SAFETY OF ELEMENTS OF PROCESS SYSTEM | 2019 |
|
RU2728504C1 |
Authors
Dates
2010-03-27—Published
2007-12-07—Filed