CN115827163A - Graphic processor, operating method, electronic device, and storage medium - Google Patents

Graphic processor, operating method, electronic device, and storage medium Download PDF

Info

Publication number
CN115827163A
CN115827163A CN202211596807.7A CN202211596807A CN115827163A CN 115827163 A CN115827163 A CN 115827163A CN 202211596807 A CN202211596807 A CN 202211596807A CN 115827163 A CN115827163 A CN 115827163A
Authority
CN
China
Prior art keywords
virtual machine
authentication information
graphics processor
processor
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211596807.7A
Other languages
Chinese (zh)
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Biren Intelligent Technology Co Ltd
Original Assignee
Shanghai Biren Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Biren Intelligent Technology Co Ltd filed Critical Shanghai Biren Intelligent Technology Co Ltd
Priority to CN202211596807.7A priority Critical patent/CN115827163A/en
Publication of CN115827163A publication Critical patent/CN115827163A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The present disclosure provides a graphic processor, an operating method, an electronic device, and a storage medium. The operation method comprises the following steps: maintaining registration authentication information generated by registering a first virtual machine operated by a host side processor on a graphics processor; receiving a virtual machine computing task operated by a host side processor, wherein the virtual machine computing task comprises a request command and request authentication information; the request authentication information is verified using the enrollment authentication information, and in response to the verification passing, the request command is executed, and in response to the verification failing, the graphics processor at least partially purges information associated with the first virtual machine. According to the method and the device, the request authentication information is verified by using the registration authentication information to ensure that the data related to the virtual machine corresponding to the user can be effectively cleared after the use is finished, so that the data can be well protected from being leaked under the condition that the host side processor is abnormally quitted or the virtual machine is subjected to live migration to replace the physical board card.

Description

Graphic processor, operating method, electronic device, and storage medium
Technical Field
Embodiments of the present disclosure relate to a graphic processor, an operating method, an electronic device, and a storage medium.
Background
Parallel computing refers to a process of solving a computing problem by simultaneously using multiple computing resources, and an effective means for improving the computing speed and data processing capacity of a computer system. The basic idea is to decompose the problem to be solved into several parts, each part being computed in parallel by an independent processing unit. A GPU (graphics Processing Unit) is designed specifically for parallel Processing, can be used for high-performance parallel Processing, can simultaneously compute different parts of the same task, and solves a large-scale problem that cannot be solved by a single Processing Unit.
With the increasing performance of the graphics processor, the high hardware cost caused by the large size and high power consumption of the graphics processor has become a big problem affecting the use of the graphics processor. It is therefore necessary to employ virtualization techniques to perform data computations using a graphics processor. The virtualization technology realizes the reuse of system resources through various methods, and efficiently provides limited resources for a plurality of users, thereby improving the resource utilization rate of the system and reducing the cost of a single user. However, the virtualization technology for the graphics processor faces many problems, such as poor compatibility, need to deploy hardware resources locally, etc., which seriously hinder the virtualization technology for the graphics processor and cannot meet the current increasing application requirements.
Disclosure of Invention
At least one embodiment of the present disclosure provides an operating method of a graphics processor, including: maintaining registration authentication information generated by a first virtual machine operated by a host side processor registering on the graphics processor; receiving a virtual machine computing task operated by the host side processor, wherein the virtual machine computing task comprises a request command and request authentication information; the request authentication information is verified using the registration authentication information, and in response to verification passing, the request command is executed, and in response to verification failing, the graphics processor at least partially purges information associated with the first virtual machine.
For example, in an operation method of a graphics processor provided by at least one embodiment of the present disclosure, before maintaining the registration authentication information generated by registering, on the graphics processor, the first virtual machine executed by the host-side processor, further includes: and receiving a registration request for the first virtual machine sent by the host side processor, and generating the registration authentication information according to the registration request.
For example, in an operation method of a graphics processor provided in at least one embodiment of the present disclosure, generating the registration authentication information according to the registration request includes: generating a random number based on the registration request to produce the registration authentication information.
For example, in an operation method of a graphics processor provided in at least one embodiment of the present disclosure, generating a random number based on the registration request to generate the registration authentication information includes: acquiring a clock pulse count; generating the random number by a true random number generator based on the clock pulse count; and carrying out encryption signature on the random number to acquire the registration authentication information.
For example, at least one embodiment of the present disclosure provides an operating method of a graphics processor, further including: after generating the enrollment authentication information, returning the enrollment authentication information to the host-side processor.
For example, in an operation method of a graphics processor provided in at least one embodiment of the present disclosure, receiving a virtual machine computing task executed from the host-side processor includes: and receiving virtual machine computing tasks from a virtual machine computing task queue operated by the host side processor, wherein the virtual machine computing task queue comprises one or more to-be-processed virtual machine computing tasks.
For example, at least one embodiment of the present disclosure provides an operating method of a graphics processor, further including: in response to a request command to complete execution of each virtual machine computing task in the virtual machine computing task queue, the graphics processor receiving an end request from the host-side processor and purging data associated with the first virtual machine cached on the graphics processor, wherein the end request is configured to be sent by the host-side processor to the graphics processor in response to the host-side processor destroying the virtual machine computing task queue and closing the first virtual machine.
For example, in a method of operating a graphics processor provided in at least one embodiment of the present disclosure, the at least partially clearing, by the graphics processor, information associated with the first virtual machine includes: and the graphic processor clears the registration authentication information and the data which is cached on the graphic processor and is related to the first virtual machine.
At least one embodiment of the present disclosure further provides an operating method of a virtual machine based on a graphics processor, including: sending a running virtual machine computing task to the graphics processor, wherein the virtual machine computing task comprises a request command and request authentication information, and the request authentication information is configured to be verified with registration authentication information generated by registering a first virtual machine running on the graphics processor by a host side processor and maintained by the graphics processor; and in response to the result that the graphics processor verifies the request authentication information by using the registration authentication information being verification pass, obtaining an execution result after the request command is executed, and in response to the result that the graphics processor verifies the request authentication information by using the registration authentication information being verification fail, obtaining an operation result that the graphics processor at least partially clears information associated with the first virtual machine.
For example, in an operation method of a virtual machine based on a graphics processor, before the graphics processor maintains registration authentication information generated by registering, on the graphics processor, the first virtual machine executed by the host-side processor, the method further includes: sending a registration request for the first virtual machine to the graphics processor, wherein the registration request is configured to indicate generation of the registration authentication information.
For example, in an operation method of a virtual machine based on a graphics processor, before sending a registration request for the first virtual machine to the graphics processor, the method further includes: initializing the first virtual machine.
For example, at least one embodiment of the present disclosure provides a method for operating a virtual machine based on a graphics processor, further including: receiving the registration authentication information returned by the graphics processor.
For example, in an operation method of a virtual machine based on a graphics processor, before sending the running virtual machine computing task to the graphics processor, the method further includes: and acquiring a virtual machine computing task of the first virtual machine and running the virtual machine computing task of the first virtual machine based on the first virtual machine and the registration authentication information returned by the graphics processor.
For example, at least one embodiment of the present disclosure provides a method for operating a virtual machine based on a graphics processor, further including: in response to the authentication failing and obtaining a result of the operation of the graphics processor to at least partially clear information associated with the first virtual machine, initializing a second virtual machine and sending a registration request for the second virtual machine to the graphics processor.
At least one embodiment of the present disclosure further provides a graphics processor, including: the information maintenance module is configured to maintain registration authentication information generated by registering a first virtual machine operated by a host side processor on the graphics processor; the task receiving module is configured to receive a virtual machine computing task from the host side processor, wherein the virtual machine computing task comprises a request command and request authentication information; a verification module configured to verify the request authentication information using the registration authentication information; a task execution module configured to execute the request command in response to the verification passing and configured to at least partially clear information associated with the first virtual machine in response to the verification failing.
For example, at least one embodiment of the present disclosure provides a graphics processor further including: a registration request processing module configured to receive a registration request for the first virtual machine sent by the host-side processor, and configured to generate the registration authentication information according to the registration request.
For example, in a graphics processor provided in at least one embodiment of the present disclosure, the registration request processing module includes: a clock counter configured to obtain a clock pulse count; a true random number generator configured to generate a random number based on the clock pulse count; and the encryption and decryption module is configured to encrypt and sign the random number so as to acquire the registration authentication information.
For example, in a graphics processor provided in at least one embodiment of the present disclosure, the information maintenance module is further configured to return the registration authentication information to the host-side processor.
For example, in a graphics processor provided in at least one embodiment of the present disclosure, the task receiving module is further configured to: receiving an end request from the host-side processor in response to a request command to complete execution of each virtual machine computing task in a virtual machine computing task queue run by the host-side processor, wherein the end request is configured to be sent by the host-side processor to the graphics processor in response to the host-side processor destroying the virtual machine computing task queue and closing the first virtual machine; the task execution module is further configured to clear the data related to the first virtual machine cached on the graphics processor according to the end request.
At least one embodiment of the present disclosure provides an electronic device, including a host-side processor and a graphics processor, where the graphics processor is configured to maintain registration authentication information generated by a first virtual machine executed by the host-side processor registering on the graphics processor; the host side processor is configured to send a running virtual machine computing task to the graphics processor, wherein the virtual machine computing task comprises a request command and request authentication information; the graphics processor is configured to verify the request authentication information using the registration authentication information and, in response to verification passing, execute the request command, and in response to verification failing, the graphics processor at least partially purges information associated with the first virtual machine.
For example, in an electronic device provided in at least one embodiment of the present disclosure, the graphics processor is further configured to: before maintaining the registration authentication information generated by the first virtual machine operated by the host side processor registering on the graphics processor, receiving a registration request sent by the host side processor for the first virtual machine, and generating the registration authentication information according to the registration request.
For example, in an electronic device provided in at least one embodiment of the present disclosure, the host-side processor is further configured to: initializing the first virtual machine prior to sending a registration request for the first virtual machine to the graphics processor.
At least one embodiment of the present disclosure further provides an electronic device, including: a processing unit and a storage unit, wherein the storage unit has stored thereon a computer program which, when executed by the processing unit, implements the method of operation of any of the above.
At least one embodiment of the present disclosure also provides a computer-readable storage medium, wherein the storage medium has a computer program stored therein, and the computer program, when executed by a processor, implements the operating method as described in any one of the above.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a block diagram of an electronic device 1000 according to some embodiments of the present disclosure;
FIG. 2 is a flow chart of a method of operation of a graphics processor according to some embodiments of the present disclosure;
3-4 are flow diagrams of methods of operation of a graphics processor according to further embodiments of the present disclosure;
FIG. 5 is a flow chart of one implementation of step S10 of the method of operation of FIG. 4;
FIG. 6 is a flow chart of a method of operation of a graphics processor based virtual machine according to some embodiments of the present disclosure;
FIG. 7 is a flow chart of a method of operation based on an electronic device according to some embodiments of the present disclosure;
FIG. 8 is a flow chart of a method of operation based on an electronic device according to further embodiments of the present disclosure;
FIG. 9 is a block diagram of a graphics processor according to some embodiments of the present disclosure;
FIG. 10 is a block diagram of a graphics processor according to further embodiments of the present disclosure;
fig. 11 is a schematic structural diagram of an electronic device 300 according to at least one embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the embodiments described are only some embodiments of the present disclosure, rather than all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without inventive step, are intended to be within the scope of the present disclosure.
Unless otherwise defined, all terms (including technical and scientific terms) used in the embodiments of the present disclosure have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The use of "first," "second," and similar terms in the embodiments of the disclosure is not intended to indicate any order, quantity, or importance, but rather to distinguish one element from another. The use of the terms "a" and "an" or "the" and similar referents do not denote a limitation of quantity, but rather denote the presence of at least one. Likewise, the word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Flow charts are used in the disclosed embodiments to illustrate the steps of a method according to an embodiment of the disclosure. It should be understood that the preceding or subsequent steps need not be performed in the exact order shown. Rather, various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or steps may be removed from the processes.
Currently, for efficient use of graphics processing resources in virtualized execution environments, a Virtual Machine (VM), which typically runs on a physical host (e.g., also referred to as a host-side processor), may use one or more graphics processors (e.g., also referred to as a device-side processor) to perform, for example, graphics operations. For example, the host-side processor may include a Central Processing Unit (CPU). Therefore, the virtual machine can run on the central processing unit and the graphics processing unit is divided into a plurality of independent parts to be provided for different virtual machines, the data access authority is ensured not to allow non-secure access in a secure area protection mode when the virtual machine runs, and the state of the virtual machine on the central processing unit may be asynchronous on the graphics processing unit.
The inventor of the present disclosure finds that, in a virtualization scenario, sometimes a situation of abnormal exit of a central processing unit occurs or a situation of live migration of a virtual machine to replace a physical board occurs, so that a problem of data leakage easily occurs. For example, for an abnormal exit, for example, when the user a logs in and uses the virtual machine and the central processing unit is abnormally exited, the virtual machine is too late or cannot notify the graphics processor to destroy the data, which may cause the data corresponding to the user a to remain on the graphics processor without being cleared, so that if the next user B uses the corresponding graphics processor, it is easy to happen that the left-over data of the previous user a is leaked. For example, in the case of live migration, for example, when the graphics processors corresponding to the virtual machines used by the user a and the user B for login need to be re-divided and migration needs to be performed, if data removal is not completed during the migration, the problem of data leakage is also likely to occur.
To this end, at least one embodiment of the present disclosure provides an operating method of a graphics processor, including: maintaining registration authentication information generated by registering a first virtual machine operated by a host side processor on a graphics processor; receiving a virtual machine computing task operated by a host side processor, wherein the virtual machine computing task comprises a request command and request authentication information; the request authentication information is verified using the enrollment authentication information, and in response to the verification passing, the request command is executed, and in response to the verification failing, the graphics processor at least partially purges information associated with the first virtual machine.
At least one embodiment of the present disclosure further provides an operating method of a virtual machine based on a graphics processor, including: sending the running virtual machine computing task to the graphics processor, wherein the virtual machine computing task comprises a request command and request authentication information, and the request authentication information is configured to be verified with registration authentication information which is generated by registering a first virtual machine running on the graphics processor by a host side processor and maintained by the graphics processor; and in response to the result that the graphics processor verifies the request authentication information using the registration authentication information being a verification pass, obtaining an execution result after the request command is executed, and in response to the result that the graphics processor verifies the request authentication information using the registration authentication information being a verification fail, obtaining an operation result that the graphics processor at least partially clears information associated with the first virtual machine.
According to the operation method of the embodiment of the disclosure, the request authentication information is verified by using the registration authentication information to ensure that the data related to the virtual machine corresponding to the user can be effectively cleared after the use is finished, so that the data can be well protected from being leaked even when the host side processor is abnormally exited or the physical board card is replaced by the virtual machine in a live migration mode.
Fig. 1 is a block diagram of an electronic device 1000 according to some embodiments of the disclosure.
For example, as shown in FIG. 1, electronic device 1000 includes at least host-side process 200 and graphics processor 100 (e.g., one or more graphics processors 100). For example, host-side process 200 includes a Central Processing Unit (CPU), and graphics processor 100 may be considered a device-side processor with respect to host-side processor 200. For example, host-side processor 200 is configured to control and schedule graphics processor 100 to perform computational tasks, such as when a central processor needs to process large amounts of data of a uniform type, and then may call graphics processor 100 for parallel computations.
In some examples, one or more virtual machines 201 (e.g., multiple virtual machines 201 shown in fig. 1) may be created and run on host-side processor 200. For example, the virtual machine 201 is a computer system having complete hardware system functions, which is simulated by software and runs in a completely isolated environment.
In some examples, the virtual machine 201 running on the host-side processor 200 is able to use or share the resources of the host-side processor 200. For example, the virtual machine 201 calls the graphics processor 100 as a resource through the host-side processor 200. For example, one graphics processor 100 may be virtualized into multiple Virtual Functions (VFs) and may correspond to multiple Virtual machines 201 of the host side processor 200. For example, each virtual machine 201 and its corresponding graphics processor 100 can independently and simultaneously process a corresponding computing task. Of course, this is merely exemplary and is not a limitation of the present disclosure, and the present disclosure may also be that one graphics processor 100 is virtualized into one virtual function and corresponds to one virtual machine 201 of the host-side processor 200 or that a plurality of graphics processors 100 are virtualized into a plurality of virtual functions and correspond to a plurality of virtual machines 201 of the host-side processor 200.
Fig. 2 is a flowchart of an operation method of a graphics processor according to some embodiments of the present disclosure.
For example, as shown in fig. 2, the operation method (e.g., for convenience of description, it may be referred to as operation method one) of the graphics processor 100 at least includes steps S11 to S13.
Step S11 is to maintain registration authentication information generated by the first virtual machine executed by the host-side processor 200 registering on the graphics processor 100.
Step S12, receiving a virtual machine computing task from the host-side processor 200, where the virtual machine computing task includes a request command and request authentication information.
Step S13, verifying the request authentication information using the registration authentication information, and in response to the verification passing, executing the request command, and in response to the verification failing, the graphics processor 100 at least partially clears information associated with the first virtual machine.
According to the operation method of the embodiment of the disclosure, the request authentication information is verified by using the registration authentication information to ensure that the data related to the virtual machine corresponding to the user can be effectively cleared after the use is finished, so that the data can be well protected from being leaked even when the host side processor is abnormally exited or the physical board card is replaced by the virtual machine in a live migration mode.
For example, for step S11, the first virtual machine is one of the one or more virtual machines 201 running on the host-side processor 200. In some examples, the first virtual machine may represent the virtual machine to which the registration authentication information currently persisted and maintained on the graphics processor 100 corresponds.
For example, the first virtual machine may represent a current one of the plurality of virtual machines 201 running on the host-side processor 200, which indicates that the established first virtual machine is normally registered with the graphics processor 100 in the current usage stage, and thus registration authentication information (see below in detail) corresponding to the first virtual machine is generated. For another example, the first virtual machine may also represent a virtual machine corresponding to a previous user (denoted as the first user) of a second user corresponding to a current virtual machine (denoted as the second virtual machine, for example), which indicates that the established second virtual machine is not normally registered in the graphics processor 100 in the current usage stage.
For example, after the first virtual machine corresponding to the first user completes registration on the graphics processor 100 and generates registration authentication information, if the first virtual machine fails to reach or cannot notify the graphics processor 100 that an abnormal exit occurs when destroying data, when the second user uses the second virtual machine established, it is likely that the second user directly uses the graphics processor corresponding to the first virtual machine (for example, at this time, the second virtual machine does not complete registration on the corresponding graphics processor 100 and also does not generate corresponding registration authentication information), and the registration authentication information maintained by the graphics processor 100 at this time corresponds to the first virtual machine. Therefore, at this time, if the request authentication information of the virtual machine computing task is verified by using the registration authentication information, a result of failing verification is obtained because the currently running virtual machine computing task is not a computing task corresponding to the first virtual machine but is derived from the second virtual machine of the second user. Therefore, the graphics processor 100 will clear the information associated with the first virtual machine (i.e., the information corresponding to the first user before the clearing). Of course, this is merely exemplary and not a limitation of the present disclosure.
For example, in some examples, if the request authentication information is verified using the registration authentication information to result in a verification pass, indicating that the request authentication information of the virtual machine computing task is consistent with the registration authentication information, then it is indicated that the current virtual machine computing task executed by the host-side processor is the computing task corresponding to the first virtual machine.
For example, in some examples, if the request authentication information is verified using the registration authentication information to result in a verification failure, indicating that the request authentication information of the virtual machine computing task is inconsistent with the registration authentication information, then the current virtual machine computing task executed by the host-side processor is not the computing task corresponding to the first virtual machine.
It should be noted that, in the embodiment of the present disclosure, "first virtual machine" and "second virtual machine" (see below in particular) "are intended to distinguish two virtual machines, rather than limiting the two virtual machines themselves, for example, the first virtual machine is allocated to a first user (e.g., user a) for login use, and the second virtual machine is allocated to a second user (e.g., user B) for login use. Of course, this is merely exemplary and not a limitation of embodiments of the disclosure.
Fig. 3-4 are flow charts of methods for operating a graphics processor according to further embodiments of the present disclosure.
For example, as shown in fig. 3, before step S11, the first operation method of the embodiment of the present disclosure may further include step S10: receiving a registration request for the first virtual machine sent by the host-side processor 200, and generating registration authentication information according to the registration request.
The embodiment of the disclosure generates the registration authentication information at the stage of registering the virtual machine to the graphics processor, so as to realize interactive authentication and use in the current virtual machine by using the dynamic registration authentication information, thereby ensuring the security of user data.
For example, as shown in fig. 3 and 4, for step S10, it may include the following process or step S10': receiving a registration request for the first virtual machine sent by the host-side processor 200, generating a random number based on the registration request to generate registration authentication information.
Therefore, the embodiment of the disclosure generates the registration authentication information by generating the random number, so that the registration authentication information can exist only in the current system activity period and cannot be falsely used, the security is higher, and the mode is simple and effective.
It should be noted that the embodiments of the present disclosure are not limited to the above-mentioned generation of the random number to generate the authentication information for authentication and registration, and may also adopt other reasonable manners as long as the authentication information for authentication can be generated, and are not exhaustive and described herein.
Fig. 5 is a flow chart of one implementation of step S10' of the method of operation of fig. 4.
For example, as shown in fig. 5, one example of generating a random number based on a registration request to generate registration authentication information in step S10' includes at least steps S101 to S103.
Step S101, clock pulse counting is obtained.
And S102, generating a random number by a true random number generator based on clock pulse counting.
And step S103, carrying out encryption signature on the random number to acquire registration authentication information.
For example, in step S103, the embodiment of the present disclosure may obtain the registration authentication information by starting an encryption/decryption engine of a secure space of the graphics processor, and performing SM2 signature after processing the random number.
Therefore, the embodiment of the disclosure not only enables the registration authentication information to exist only and not to be falsely used in the current system activity period, but also ensures the characteristics of non-tampering and high security, thereby improving the security of user data protection.
For example, in some examples, after generating the registration authentication information at step S10, the operation method one of the embodiments of the present disclosure may further include the following procedures or steps: the registration authentication information is returned to the host-side processor 200. In this way, the graphic processor 100 returns the generated registration authentication information to the host-side processor 200, thereby facilitating the verification of the request authentication information using the registration authentication information, which is simple and effective.
For example, in some examples, step S12 may include the following processes or steps: receive a virtual machine computing task from a virtual machine computing task queue run by host-side processor 200, wherein the virtual machine computing task queue includes one or more virtual machine computing tasks to be processed. Therefore, the embodiment of the disclosure has a wide application prospect on the basis of improving the safety of user data protection.
For example, for step S13, in some examples, the graphics processor 100 at least partially purging information associated with the first virtual machine includes the following process or steps: the graphics processor 100 clears the registration authentication information and the data associated with the first virtual machine cached on the graphics processor 100. Therefore, the embodiment of the disclosure can completely clear the legacy data of the corresponding user, and has high safety and simple mode.
For example, in some examples, in response to a request command to complete execution of each virtual machine computing task in the virtual machine computing task queue, graphics processor 100 may receive an end request from host-side processor 200 and clear the data associated with the first virtual machine cached on graphics processor 100. For example, the end request configures: the host-side processor 200 sends to the graphics processor 100 in response to the host-side processor 200 destroying the virtual machine computation task queue and closing the first virtual machine.
For example, in some examples, host-side processor 200 may include a series of operations when shutting down a virtual machine (e.g., a first virtual machine), including, for example, releasing resources, notifying a user, notifying a graphics processor and sending an end request to graphics processor 100, and so forth. This is merely an example and is not a limitation of embodiments of the present disclosure.
For example, in some examples, after host-side processor 200 destroys the virtual machine computing task queue, host-side processor 200 begins shutting down the first virtual machine, and host-side processor 200 sends the above-described end request to graphics processor 100 while shutting down the first virtual machine. Of course, this is merely exemplary and not a limitation of embodiments of the disclosure.
For example, in some examples, data associated with the first virtual machine cached on graphics processor 100 includes data corresponding to the user's level Cache (Cache), page table Cache (TLB), high bandwidth store (HBM), memory Management Unit (MMU), and so on. Of course, this is merely exemplary and not a limitation of embodiments of the disclosure.
Fig. 6 is a flowchart of an operation method of a virtual machine based on a graphics processor according to some embodiments of the present disclosure.
For example, as shown in fig. 6, the operation method (for example, for convenience of description, may be referred to as operation method two) of the virtual machine based on the graphics processor 100 includes at least step T11 and step T12.
And step T11, sending the running virtual machine computing task to the graphics processor 100, wherein the virtual machine computing task comprises a request command and request authentication information, and the request authentication information is configured to be verified with registration authentication information generated by registering a first virtual machine, which is maintained by the graphics processor 100 and is run by the host-side processor 200, on the graphics processor 100.
And step T12, responding to the result that the graphics processor 100 verifies the request authentication information by using the registration authentication information as verification passing, acquiring the execution result after the request command is executed, and responding to the result that the graphics processor 100 verifies the request authentication information by using the registration authentication information as verification failing, acquiring the operation result that the graphics processor 100 at least partially clears the information associated with the first virtual machine.
According to the operation method of the embodiment of the disclosure, the request authentication information is verified by using the registration authentication information to ensure that the data related to the virtual machine corresponding to the user can be effectively cleared after the use is finished, so that the data can be well protected from being leaked under the condition that the host side processor is abnormally exited or the virtual machine is subjected to live migration to replace the physical board card.
For example, in some examples, before the graphics processor 100 maintains registration authentication information generated by a first virtual machine executed by the host-side processor 200 registering on the graphics processor 100, the second method of operation of an embodiment of the present disclosure may further include the following process or steps: a registration request for the first virtual machine is sent to the graphics processor 100, where the registration request is configured to indicate that registration authentication information is generated, i.e., the graphics processor 100 may generate registration authentication information according to the registration request.
For example, in some examples, prior to sending the registration request for the first virtual machine to graphics processor 100, method of operation two of embodiments of the present disclosure may further include the following processes or steps: the first virtual machine is initialized.
For example, in some examples, method two of operation of an embodiment of the present disclosure may further include the following process or steps: registration authentication information returned by the graphics processor 100 is received.
For example, in some examples, prior to step T11, method of operation two of the embodiments of the present disclosure may further include the following process or steps: based on the first virtual machine and the registration authentication information returned by the graphics processor 100, the virtual machine computing task of the first virtual machine is acquired and run. Therefore, the verification of the request authentication information by using the registration authentication information is convenient, simple and effective.
For example, in some examples, method of operation two of the embodiments of the present disclosure may further include the following processes or steps: in response to the authentication failing and the operation result of obtaining that the graphics processor 100 at least partially clears information associated with the first virtual machine, the second virtual machine is initialized and a registration request for the second virtual machine is sent to the graphics processor 100. Therefore, the embodiment of the disclosure can ensure that the data related to the virtual machine corresponding to the user is effectively cleared through the initial operation of initializing the virtual machine.
It should be noted that, for specific implementation, technical effects and the like of the second operation method, reference may be made to relevant contents of the first operation method provided in the foregoing embodiments of the present disclosure, and details are not described here again.
Fig. 7 is a flowchart of an operation method based on an electronic device according to some embodiments of the present disclosure.
For example, as shown in fig. 7, the operation method based on the electronic device 1000 (for example, for convenience of description, it may be referred to as operation method three) includes at least steps P11 to P13.
At step P11, the graphics processor 100 maintains registration authentication information generated by the first virtual machine executed by the host-side processor 200 registering with the graphics processor 100.
Step P12, the host-side processor 200 sends the running vm computing task to the gpu 100, and the gpu 100 receives the vm computing task from the host-side processor 200, wherein the vm computing task includes a request command and request authentication information.
In step P13, the graphics processor 100 verifies the request authentication information using the registration authentication information, and in response to the verification passing, executes the request command, and the host-side processor 200 obtains an execution result after the execution of the request command, and in response to the verification failing, the graphics processor at least partially clears the information associated with the first virtual machine, and the host-side processor 200 obtains an operation result of the graphics processor 100 at least partially clearing the information associated with the first virtual machine.
For example, in some examples, before graphics processor 100 maintains registration authentication information resulting from a first virtual machine run by the host-side processor registering on the graphics processor, host-side processor 200 sends a registration request for the first virtual machine to graphics processor 100, graphics processor 100 receives the registration request for the first virtual machine sent by host-side processor 200, and in accordance with the registration request, generates registration authentication information.
For example, in some examples, host-side processor 200 initializes the first virtual machine before sending a registration request to graphics processor 100 for the first virtual machine.
It should be noted that, for specific implementation, technical effects and the like of the operation method three, reference may be made to relevant contents of the operation method one and the operation method two provided in the foregoing embodiments of the present disclosure, and details are not described here again.
Fig. 8 is a flowchart of an operation method based on an electronic device according to further embodiments of the present disclosure.
For example, as shown in fig. 8, the operation method based on the electronic apparatus 1000 includes steps Q1 to Q16.
In step Q1, the host processor 200 starts an operation method based on the electronic device 1000.
Step Q2, host-side processor 200 initializes the current virtual machine (e.g., the virtual machine may comprise a second virtual machine).
In step Q3, the host processor 200 transmits a registration request for the virtual machine to the graphics processor 100, and the graphics processor 100 receives the registration request for the virtual machine transmitted by the host processor 200.
In step Q4, the graphic processor 100 generates registration authentication information according to the registration request.
Step Q5, the graphics processor 100 returns the registration authentication information to the host processor 200, and the host processor 200 receives the registration authentication information returned by the graphics processor 100, thereby completing the process of registering the virtual machine in the graphics processor 100.
And step Q6, the host-side processor 200 provides and runs a virtual machine computing task queue, where the virtual machine computing task queue includes one or more to-be-processed virtual machine computing tasks, and the virtual machine computing tasks include a request command and request authentication information.
Step Q7, judging whether the virtual machine computing task queue has the virtual machine computing task which is not processed completely: if not, go to step Q12; if not, turning to the step Q8, and circularly executing the step Q8 to the step Q11 until each virtual machine computing task in the virtual machine computing task queue completes processing.
In step Q8, the host processor 200 sends the currently selected virtual machine calculation task to the graphics processor 100 so that the graphics processor 100 receives the virtual machine calculation task.
Step Q9, the graphic processor 100 verifies the request authentication information using the registration authentication information, and determines whether the request authentication information is consistent with the registration authentication information: if yes, the verification is passed, and the step Q10 is carried out; if not, the verification is not passed, and the step Q11 is switched to.
In step Q10, the graphic processor 100 executes the request command, and the host-side processor 200 obtains an execution result after the execution of the request command.
Step Q11, the graphics processor 100 at least partially clears the information associated with the virtual machine (e.g. the first virtual machine), for example, the cleared information is the information associated with the first virtual machine, i.e. the information corresponding to the first user corresponding to the first virtual machine, and the first user corresponding to the first virtual machine is the last user of the second user corresponding to the second virtual machine; the host-side processor 200 obtains the operation result of the graphics processor 100 at least partially clearing the information associated with the virtual machine, and jumps to step Q1, looping through the steps until the end.
Step Q12, the host-side processor 200 destroys the virtual machine computation task queue.
In step Q13, the host processor 200 shuts down the virtual machine.
In step Q14, the graphic processor 100 receives an end request from the host processor 200.
Step Q15, the graphics processor 100 clears the data related to the virtual machine cached on the graphics processor 100.
In step Q16, the host processor 200 ends the operation method by the electronic apparatus 1000.
Therefore, the operation method of the embodiment of the disclosure enables data related to the virtual machine corresponding to the user to be effectively cleared after the use is finished by using the registration authentication information for verification, so that the data can be well protected from being leaked even when the processor on the generator side abnormally exits or the physical board card is replaced by the virtual machine in a live migration mode.
The operation method based on the electronic device according to the above embodiment of the present disclosure is not limited to the above steps, nor to the order of the above steps, and may be freely adjusted according to the actual situation, for example, step Q14 may be simultaneously executed in the process of closing the virtual machine by the host-side processor 200 in step Q14, and the embodiment of the present disclosure is not exhaustive and repeated here.
For example, in step Q9, whether the request authentication information and the registration authentication information are consistent may refer to whether the request authentication information and the registration authentication information are the same or whether the request authentication information and the registration authentication information are correspondingly matched, which is not limited in this embodiment of the disclosure, as long as the verification between the request authentication information and the registration authentication information can be achieved, and details are not described here again.
For example, in the electronic device 1000 in the example of fig. 1, the graphics processor 100 is configured to maintain registration authentication information generated by registering virtual machines (for example, one of the virtual machines is denoted as a first virtual machine) run by the host-side processor 200 on the graphics processor 100. The host-side processor 200 is configured to send a running virtual machine computing task to the graphics processor 100, the virtual machine computing task including a request command and request authentication information. The graphics processor 100 is configured to verify the request authentication information using the registration authentication information and, in response to verification passing, execute the request command, and in response to verification failing, the graphics processor 100 at least partially purges information associated with the first virtual machine.
For example, in the electronic device 1000 in the example of fig. 1, the graphics processor 100 is further configured to: before maintaining registration authentication information generated by a first virtual machine operated by the host-side processor 200 registering on the graphics processor, a registration request for the first virtual machine transmitted by the host-side processor 200 is received, and the registration authentication information is generated according to the registration request.
For example, in the electronic device 1000 in the example of fig. 1, the host-side processor 200 is further configured to: the first virtual machine is initialized before sending a registration request for the first virtual machine to graphics processor 100.
Fig. 9 is a schematic structural diagram of a graphics processor according to some embodiments of the present disclosure.
For example, as shown in fig. 9, a graphics processor 100 provided by at least one embodiment of the present disclosure includes an information maintenance module 110, a task receiving module 120, a verification module 130, and a task execution module 140.
For example, the information maintenance module 110 is configured to maintain registration authentication information generated by a first virtual machine executed by the host-side processor 200 registering on the graphics processor 100. The task receiving module 120 is configured to receive a virtual machine computing task executed from the host-side processor 200, wherein the virtual machine computing task includes a request command and a request authentication information. The verification module 130 is configured to verify the request authentication information using the registration authentication information. The task execution module 140 is configured to execute the request command in response to the authentication passing and is configured to at least partially purge information associated with the first virtual machine in response to the authentication not passing.
Fig. 10 is a schematic structural diagram of a graphics processor according to further embodiments of the present disclosure.
For example, as shown in fig. 10, the graphics processor 100 of the embodiment of the disclosure further includes a registration request processing module 150, and the registration request processing module 150 is configured to receive a registration request for the first virtual machine sent by the host-side processor 200, and is configured to generate registration authentication information according to the registration request.
For example, as shown in fig. 10, the registration request processing module 150 includes a clock counter 151, a true random number generator 152, and an encryption/decryption module 153. The clock counter 151 is configured to acquire a clock pulse count. The true random number generator 152 is configured to generate random numbers based on the clock pulse count. The encryption/decryption module 153 is configured to cryptographically sign the random number to obtain the registration authentication information.
For example, in some examples, the information maintenance module 110 is further configured to return registration authentication information to the host-side processor 200.
For example, in some examples, the task receiving module 140 is further configured to: receiving an end request from host-side processor 200 in response to a request command to complete execution of each virtual machine computing task in a queue of virtual machine computing tasks run by host-side processor 200, wherein the end request is configured to: the host-side processor 200 sends to the graphics processor 100 in response to the host-side processor 200 destroying the virtual machine computing task queue and closing the first virtual machine.
For example, in some examples, the task execution module 140 is further configured to flush the data associated with the first virtual machine cached on the graphics processor 100 in accordance with the end request.
It should be noted that in the embodiment of the present disclosure, the graphics processor 100 may include more or less modules, and the connection relationship between the modules is not limited and may be determined according to actual needs. The specific configuration of each module is not limited.
It should be noted that, in the embodiments of the present disclosure, for specific implementation and technical effects of the graphics processor 100 and the electronic device 1000, reference may be made to relevant contents in the above operation method, and details are not described here.
The various modules in the above embodiments of the present disclosure may each be configured as software, hardware, firmware, or any combination thereof that performs a particular function. For example, the modules may correspond to an application specific integrated circuit, to pure software code, or to a combination of software and hardware.
It should be noted that although the graphics processor 100 is described as being divided into modules for respectively performing corresponding processes, it is clear to those skilled in the art that the processes performed by the modules may also be performed without any specific division of the modules or explicit demarcation between the modules by the graphics processor 100.
Fig. 11 is a schematic structural diagram of an electronic device 300 according to at least one embodiment of the present disclosure.
For example, as shown in fig. 11, the electronic device 300 includes a processing unit 310 and a storage unit 320, where the storage unit 310 stores a computer program thereon, and when the computer program is executed by the processing unit 310, the method of operation of at least some embodiments of the present disclosure is implemented.
The electronic device 300 in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a notebook computer, a tablet computer, and the like, and a stationary terminal such as a desktop computer and the like. The electronic device 300 shown in fig. 11 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
For example, the processes described above with reference to the flow diagrams may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. The computer program, when executed by a processing unit, performs the method of operation of the disclosed embodiments.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In embodiments of the present disclosure, however, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
It should be noted that, in the embodiment of the present disclosure, reference may be made to the above description related to the operation method and the graphics processor for specific functions and technical effects of the electronic device 300, and details are not described herein again.
The following points need to be explained:
(1) The drawings of the embodiments of the disclosure only relate to the structures related to the embodiments of the disclosure, and other structures can refer to common designs.
(2) Without conflict, embodiments of the present disclosure and features of the embodiments may be combined with each other to arrive at new embodiments.
The above description is only a specific embodiment of the present disclosure, but the scope of the present disclosure is not limited thereto, and the scope of the present disclosure should be subject to the scope of the claims.

Claims (24)

1. A method of operation of a graphics processor, comprising:
maintaining registration authentication information generated by a first virtual machine operated by a host side processor registering on the graphics processor;
receiving a virtual machine computing task operated by the host side processor, wherein the virtual machine computing task comprises a request command and request authentication information;
the request authentication information is verified using the registration authentication information, and in response to verification passing, the request command is executed, and in response to verification failing, the graphics processor at least partially purges information associated with the first virtual machine.
2. The method of operation of claim 1, wherein prior to maintaining the registration authentication information resulting from the first virtual machine run by the host-side processor registering on the graphics processor, further comprising:
and receiving a registration request for the first virtual machine sent by the host side processor, and generating the registration authentication information according to the registration request.
3. The method of operation of claim 2, wherein generating the registration authentication information based on the registration request comprises:
generating a random number based on the registration request to produce the registration authentication information.
4. The method of operation of claim 3, wherein generating a random number based on the registration request to produce the registration authentication information comprises:
acquiring a clock pulse count;
generating the random number by a true random number generator based on the clock pulse count;
and carrying out encryption signature on the random number to acquire the registration authentication information.
5. The method of operation of claim 2, further comprising:
after generating the enrollment authentication information, returning the enrollment authentication information to the host-side processor.
6. The method of operation of claim 1, wherein receiving a virtual machine computing task running from the host-side processor comprises:
and receiving virtual machine computing tasks from a virtual machine computing task queue operated by the host side processor, wherein the virtual machine computing task queue comprises one or more to-be-processed virtual machine computing tasks.
7. The method of operation of claim 6, further comprising:
in response to a request command to complete execution of each virtual machine computing task in the virtual machine computing task queue, the graphics processor receiving an end request from the host-side processor and clearing data associated with the first virtual machine cached on the graphics processor, wherein the end request is configured to: and sending the data to the graphics processor by the host-side processor in response to the host-side processor destroying the virtual machine computing task queue and closing the first virtual machine.
8. The method of operation of claim 1, wherein the graphics processor at least partially purging information associated with the first virtual machine comprises:
and the graphic processor clears the registration authentication information and the data which is cached on the graphic processor and is related to the first virtual machine.
9. A method of operating a graphics processor-based virtual machine, comprising:
sending a running virtual machine computing task to the graphics processor, wherein the virtual machine computing task comprises a request command and request authentication information, and the request authentication information is configured to be verified with registration authentication information generated by registering a first virtual machine, which is maintained by the graphics processor and runs by a host side processor, on the graphics processor;
and in response to the result that the graphics processor verifies the request authentication information by using the registration authentication information being verification pass, obtaining an execution result after the request command is executed, and in response to the result that the graphics processor verifies the request authentication information by using the registration authentication information being verification fail, obtaining an operation result that the graphics processor at least partially clears information associated with the first virtual machine.
10. The method of claim 9, wherein prior to the graphics processor maintaining registration authentication information resulting from the first virtual machine executed by the host-side processor registering on the graphics processor, further comprising:
sending a registration request for the first virtual machine to the graphics processor, wherein the registration request is configured to indicate generation of the registration authentication information.
11. The method of operation of claim 9, wherein prior to sending a registration request for the first virtual machine to the graphics processor, further comprising:
initializing the first virtual machine.
12. The method of operation of claim 9, further comprising:
receiving the registration authentication information returned by the graphics processor.
13. The method of operation of claim 12, wherein prior to sending the running virtual machine computing task to the graphics processor, further comprising:
and acquiring a virtual machine computing task of the first virtual machine and running the virtual machine computing task of the first virtual machine based on the first virtual machine and the registration authentication information returned by the graphics processor.
14. The method of operation of claim 11, further comprising:
in response to the authentication failing and obtaining a result of the operation of the graphics processor to at least partially clear information associated with the first virtual machine, initializing a second virtual machine and sending a registration request for the second virtual machine to the graphics processor.
15. A graphics processor, comprising:
the information maintenance module is configured to maintain registration authentication information generated by registering a first virtual machine operated by a host side processor on the graphics processor;
the task receiving module is configured to receive a virtual machine computing task from the host side processor, wherein the virtual machine computing task comprises a request command and request authentication information;
a verification module configured to verify the request authentication information using the registration authentication information;
a task execution module configured to execute the request command in response to the verification passing and configured to at least partially clear information associated with the first virtual machine in response to the verification failing.
16. A graphics processor in accordance with claim 15, further comprising:
a registration request processing module configured to receive a registration request for the first virtual machine sent by the host-side processor, and configured to generate the registration authentication information according to the registration request.
17. The graphics processor of claim 16, wherein the registration request processing module comprises:
a clock counter configured to obtain a clock pulse count;
a true random number generator configured to generate a random number based on the clock pulse count;
and the encryption and decryption module is configured to encrypt and sign the random number so as to acquire the registration authentication information.
18. The graphics processor of claim 15, wherein the information maintenance module is further configured to return the registration authentication information to the host-side processor.
19. The graphics processor of claim 15,
the task receiving module is further configured to: receiving an end request from the host-side processor in response to a request command to complete execution of each virtual machine computing task in a queue of virtual machine computing tasks run by the host-side processor, wherein the end request is configured to: sending, by the host-side processor, to the graphics processor in response to the host-side processor destroying the virtual machine computing task queue and closing the first virtual machine,
the task execution module is further configured to clear the data related to the first virtual machine cached on the graphics processor according to the end request.
20. An electronic device comprising a host-side processor and a graphics processor, wherein,
the graphics processor is configured to maintain registration authentication information generated by a first virtual machine run by the host-side processor registering on the graphics processor;
the host side processor is configured to send a running virtual machine computing task to the graphics processor, wherein the virtual machine computing task comprises a request command and request authentication information;
the graphics processor is configured to verify the request authentication information using the registration authentication information and, in response to verification passing, execute the request command, and in response to verification failing, the graphics processor at least partially purges information associated with the first virtual machine.
21. The electronic device of claim 20,
the graphics processor is further configured to: before maintaining the registration authentication information generated by the first virtual machine operated by the host side processor registering on the graphics processor, receiving a registration request sent by the host side processor for the first virtual machine, and generating the registration authentication information according to the registration request.
22. The electronic device of claim 21,
the host-side processor is further configured to: initializing the first virtual machine prior to sending a registration request for the first virtual machine to the graphics processor.
23. An electronic device, comprising:
a processing unit and a storage unit, wherein,
wherein the storage unit has stored thereon a computer program which, when executed by the processing unit, implements the method of operation of any of claims 1 to 8 or the method of operation of any of claims 9 to 14.
24. A computer-readable storage medium, wherein the storage medium has stored therein a computer program which, when executed by a processing unit, implements the method of operation of any of claims 1 to 8 or the method of operation of any of claims 9 to 14.
CN202211596807.7A 2022-12-12 2022-12-12 Graphic processor, operating method, electronic device, and storage medium Pending CN115827163A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211596807.7A CN115827163A (en) 2022-12-12 2022-12-12 Graphic processor, operating method, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211596807.7A CN115827163A (en) 2022-12-12 2022-12-12 Graphic processor, operating method, electronic device, and storage medium

Publications (1)

Publication Number Publication Date
CN115827163A true CN115827163A (en) 2023-03-21

Family

ID=85546846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211596807.7A Pending CN115827163A (en) 2022-12-12 2022-12-12 Graphic processor, operating method, electronic device, and storage medium

Country Status (1)

Country Link
CN (1) CN115827163A (en)

Similar Documents

Publication Publication Date Title
US11023589B2 (en) Secure booting of virtualization managers
US11068277B2 (en) Memory allocation techniques at partially-offloaded virtualization managers
EP3479225B1 (en) Performance variability reduction using an opportunistic hypervisor
US20200201686A1 (en) Method and Apparatus for Accessing Desktop Cloud Virtual Machine, and Desktop Cloud Controller
US9477501B2 (en) Encapsulation of an application for virtualization
CN103995732B (en) Virtual trusted platform module function implementation method and management equipment
US8793688B1 (en) Systems and methods for double hulled virtualization operations
CN115988218B (en) Virtualized video encoding and decoding system, electronic equipment and storage medium
US8798267B2 (en) Virtualization of cryptographic keys
EP3935545B1 (en) Incremental decryption and integrity verification of a secure operating system image
CN115988217A (en) Virtualized video coding and decoding system, electronic equipment and storage medium
CN115827163A (en) Graphic processor, operating method, electronic device, and storage medium
CN113849277B (en) Network card testing method and device, computer equipment and computer readable storage medium
US20230044731A1 (en) Attestation of a secure guest
US10936389B2 (en) Dual physical-channel systems firmware initialization and recovery
US11144364B2 (en) Supporting speculative microprocessor instruction execution
US11157240B2 (en) Perform cryptographic computation scalar multiply instruction
CN115828249A (en) Computing node based on cloud technology and instance management method based on cloud technology
US20210073033A1 (en) Memory management using coherent accelerator functionality
US10241821B2 (en) Interrupt generated random number generator states
CN110769027A (en) Service request processing method and device, computer equipment and storage medium
US11924336B1 (en) Cryptographic artifact generation using virtualized security modules
US11556365B2 (en) Obscuring information in virtualization environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Country or region after: China

Address after: 201100 room 1302, 13 / F, building 16, No. 2388, Chenhang highway, Minhang District, Shanghai

Applicant after: Shanghai Bi Ren Technology Co.,Ltd.

Address before: 201100 room 1302, 13 / F, building 16, No. 2388, Chenhang highway, Minhang District, Shanghai

Applicant before: Shanghai Bilin Intelligent Technology Co.,Ltd.

Country or region before: China