Establishing secure computing devices for virtualization and administration

Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user cred...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Rouatbi Mohamed, Anumalasetty Venkata K, Jaganathan Karthik, Chinta Ramesh, Field Scott A
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Rouatbi Mohamed
Anumalasetty Venkata K
Jaganathan Karthik
Chinta Ramesh
Field Scott A
description Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9413740B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9413740B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9413740B23</originalsourceid><addsrcrecordid>eNrjZPB2LS5JTMrJLM7IzEtXKE5NLi1KVUjOzy0oLQEJpKSWZSanFiuk5RcplGUWlZQm5mRWJZZk5ucpJOalKCSm5GbmZRaXFIGFeBhY0xJzilN5oTQ3g4Kba4izh25qQX58anFBYnJqXmpJfGiwpYmhsbmJgZORMRFKAIQ_Nl4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Establishing secure computing devices for virtualization and administration</title><source>esp@cenet</source><creator>Rouatbi Mohamed ; Anumalasetty Venkata K ; Jaganathan Karthik ; Chinta Ramesh ; Field Scott A</creator><creatorcontrib>Rouatbi Mohamed ; Anumalasetty Venkata K ; Jaganathan Karthik ; Chinta Ramesh ; Field Scott A</creatorcontrib><description>Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2016</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160809&amp;DB=EPODOC&amp;CC=US&amp;NR=9413740B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160809&amp;DB=EPODOC&amp;CC=US&amp;NR=9413740B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Rouatbi Mohamed</creatorcontrib><creatorcontrib>Anumalasetty Venkata K</creatorcontrib><creatorcontrib>Jaganathan Karthik</creatorcontrib><creatorcontrib>Chinta Ramesh</creatorcontrib><creatorcontrib>Field Scott A</creatorcontrib><title>Establishing secure computing devices for virtualization and administration</title><description>Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2016</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPB2LS5JTMrJLM7IzEtXKE5NLi1KVUjOzy0oLQEJpKSWZSanFiuk5RcplGUWlZQm5mRWJZZk5ucpJOalKCSm5GbmZRaXFIGFeBhY0xJzilN5oTQ3g4Kba4izh25qQX58anFBYnJqXmpJfGiwpYmhsbmJgZORMRFKAIQ_Nl4</recordid><startdate>20160809</startdate><enddate>20160809</enddate><creator>Rouatbi Mohamed</creator><creator>Anumalasetty Venkata K</creator><creator>Jaganathan Karthik</creator><creator>Chinta Ramesh</creator><creator>Field Scott A</creator><scope>EVB</scope></search><sort><creationdate>20160809</creationdate><title>Establishing secure computing devices for virtualization and administration</title><author>Rouatbi Mohamed ; Anumalasetty Venkata K ; Jaganathan Karthik ; Chinta Ramesh ; Field Scott A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9413740B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2016</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Rouatbi Mohamed</creatorcontrib><creatorcontrib>Anumalasetty Venkata K</creatorcontrib><creatorcontrib>Jaganathan Karthik</creatorcontrib><creatorcontrib>Chinta Ramesh</creatorcontrib><creatorcontrib>Field Scott A</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rouatbi Mohamed</au><au>Anumalasetty Venkata K</au><au>Jaganathan Karthik</au><au>Chinta Ramesh</au><au>Field Scott A</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Establishing secure computing devices for virtualization and administration</title><date>2016-08-09</date><risdate>2016</risdate><abstract>Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9413740B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Establishing secure computing devices for virtualization and administration
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T00%3A22%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Rouatbi%20Mohamed&rft.date=2016-08-09&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9413740B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true