ROUTING LEVEL ACCESS CONTROL FOR TENANT VIRTUAL MACHINES IN A CLOUD NETWORKING ENVIRONMENT

A first security policy associated with a first tenant in a multi-tenant hosting data processing environment is created. A first virtual machine is caused to execute on a first host, the first virtual machine associated with a first group defined by the first security policy. A controller is caused...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kuik, Timothy J, Mestery, Kyle Andrew Donald, Yang, Yi, Fernandes, Flavio
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Kuik, Timothy J
Mestery, Kyle Andrew Donald
Yang, Yi
Fernandes, Flavio
description A first security policy associated with a first tenant in a multi-tenant hosting data processing environment is created. A first virtual machine is caused to execute on a first host, the first virtual machine associated with a first group defined by the first security policy. A controller is caused to send, from the controller to an agent executing on the first host, authorized communication information, the authorized communication information specifying a set of virtual machines associated with the first group. The agent is caused to configure a second routing entry in the first host, the second routing entry derived from the authorized communication information, the second routing entry causing the first virtual machine to reject outgoing network traffic intended for a second IP address, the second IP address associated with a third virtual machine outside the first group.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2020259789A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2020259789A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2020259789A13</originalsourceid><addsrcrecordid>eNqNjLsKwkAQANNYiPoPC9aCD8SkPNaNObzswt1eBJsQ5KxEA_H_MYIfIFNMM8w0u3qJavkEjhpyYBApBEBh9eKgFA9KbFihsV6jcVAbrCxTAMtgAJ3EIzDpRfz5uyEeQ-GaWOfZ5N49hrT4eZYtS1KsVql_tWnou1t6pncbw3Y9si8OeWE2u_-qDzctMww</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ROUTING LEVEL ACCESS CONTROL FOR TENANT VIRTUAL MACHINES IN A CLOUD NETWORKING ENVIRONMENT</title><source>esp@cenet</source><creator>Kuik, Timothy J ; Mestery, Kyle Andrew Donald ; Yang, Yi ; Fernandes, Flavio</creator><creatorcontrib>Kuik, Timothy J ; Mestery, Kyle Andrew Donald ; Yang, Yi ; Fernandes, Flavio</creatorcontrib><description>A first security policy associated with a first tenant in a multi-tenant hosting data processing environment is created. A first virtual machine is caused to execute on a first host, the first virtual machine associated with a first group defined by the first security policy. A controller is caused to send, from the controller to an agent executing on the first host, authorized communication information, the authorized communication information specifying a set of virtual machines associated with the first group. The agent is caused to configure a second routing entry in the first host, the second routing entry derived from the authorized communication information, the second routing entry causing the first virtual machine to reject outgoing network traffic intended for a second IP address, the second IP address associated with a third virtual machine outside the first group.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200813&amp;DB=EPODOC&amp;CC=US&amp;NR=2020259789A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25555,76308</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200813&amp;DB=EPODOC&amp;CC=US&amp;NR=2020259789A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Kuik, Timothy J</creatorcontrib><creatorcontrib>Mestery, Kyle Andrew Donald</creatorcontrib><creatorcontrib>Yang, Yi</creatorcontrib><creatorcontrib>Fernandes, Flavio</creatorcontrib><title>ROUTING LEVEL ACCESS CONTROL FOR TENANT VIRTUAL MACHINES IN A CLOUD NETWORKING ENVIRONMENT</title><description>A first security policy associated with a first tenant in a multi-tenant hosting data processing environment is created. A first virtual machine is caused to execute on a first host, the first virtual machine associated with a first group defined by the first security policy. A controller is caused to send, from the controller to an agent executing on the first host, authorized communication information, the authorized communication information specifying a set of virtual machines associated with the first group. The agent is caused to configure a second routing entry in the first host, the second routing entry derived from the authorized communication information, the second routing entry causing the first virtual machine to reject outgoing network traffic intended for a second IP address, the second IP address associated with a third virtual machine outside the first group.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjLsKwkAQANNYiPoPC9aCD8SkPNaNObzswt1eBJsQ5KxEA_H_MYIfIFNMM8w0u3qJavkEjhpyYBApBEBh9eKgFA9KbFihsV6jcVAbrCxTAMtgAJ3EIzDpRfz5uyEeQ-GaWOfZ5N49hrT4eZYtS1KsVql_tWnou1t6pncbw3Y9si8OeWE2u_-qDzctMww</recordid><startdate>20200813</startdate><enddate>20200813</enddate><creator>Kuik, Timothy J</creator><creator>Mestery, Kyle Andrew Donald</creator><creator>Yang, Yi</creator><creator>Fernandes, Flavio</creator><scope>EVB</scope></search><sort><creationdate>20200813</creationdate><title>ROUTING LEVEL ACCESS CONTROL FOR TENANT VIRTUAL MACHINES IN A CLOUD NETWORKING ENVIRONMENT</title><author>Kuik, Timothy J ; Mestery, Kyle Andrew Donald ; Yang, Yi ; Fernandes, Flavio</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2020259789A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Kuik, Timothy J</creatorcontrib><creatorcontrib>Mestery, Kyle Andrew Donald</creatorcontrib><creatorcontrib>Yang, Yi</creatorcontrib><creatorcontrib>Fernandes, Flavio</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kuik, Timothy J</au><au>Mestery, Kyle Andrew Donald</au><au>Yang, Yi</au><au>Fernandes, Flavio</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ROUTING LEVEL ACCESS CONTROL FOR TENANT VIRTUAL MACHINES IN A CLOUD NETWORKING ENVIRONMENT</title><date>2020-08-13</date><risdate>2020</risdate><abstract>A first security policy associated with a first tenant in a multi-tenant hosting data processing environment is created. A first virtual machine is caused to execute on a first host, the first virtual machine associated with a first group defined by the first security policy. A controller is caused to send, from the controller to an agent executing on the first host, authorized communication information, the authorized communication information specifying a set of virtual machines associated with the first group. The agent is caused to configure a second routing entry in the first host, the second routing entry derived from the authorized communication information, the second routing entry causing the first virtual machine to reject outgoing network traffic intended for a second IP address, the second IP address associated with a third virtual machine outside the first group.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2020259789A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title ROUTING LEVEL ACCESS CONTROL FOR TENANT VIRTUAL MACHINES IN A CLOUD NETWORKING ENVIRONMENT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T05%3A41%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Kuik,%20Timothy%20J&rft.date=2020-08-13&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2020259789A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true