Hypervisor and virtual machine protection

A method, according to one embodiment, includes receiving a request for a hypervisor to run a virtual machine, determining using a processor whether the virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine, determining using a processor...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bish Thomas W, McBride Gregory E, Welp Richard A, Palazzolo Aaron S, Khandelwal Nikhil, Reed David C
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Bish Thomas W
McBride Gregory E
Welp Richard A
Palazzolo Aaron S
Khandelwal Nikhil
Reed David C
description A method, according to one embodiment, includes receiving a request for a hypervisor to run a virtual machine, determining using a processor whether the virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine, determining using a processor whether the hypervisor is authorized to run the virtual machine using a digital signature of the data structure, receiving a decryption key from a key authority when it is determined that the virtual machine is authorized to be run and it is determined that the hypervisor is authorized to run the virtual machine, unlocking and/or decrypting the virtual machine using the decryption key, and running the virtual machine on a computer system. Other systems, methods, and computer program products are described in additional embodiments.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9652276B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9652276B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9652276B23</originalsourceid><addsrcrecordid>eNrjZND0qCxILSrLLM4vUkjMS1EoyywqKU3MUchNTM7IzEtVKCjKL0lNLsnMz-NhYE1LzClO5YXS3AwKbq4hzh66qQX58anFBYnJqXmpJfGhwZZmpkZG5mZORsZEKAEA6zMo_Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Hypervisor and virtual machine protection</title><source>esp@cenet</source><creator>Bish Thomas W ; McBride Gregory E ; Welp Richard A ; Palazzolo Aaron S ; Khandelwal Nikhil ; Reed David C</creator><creatorcontrib>Bish Thomas W ; McBride Gregory E ; Welp Richard A ; Palazzolo Aaron S ; Khandelwal Nikhil ; Reed David C</creatorcontrib><description>A method, according to one embodiment, includes receiving a request for a hypervisor to run a virtual machine, determining using a processor whether the virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine, determining using a processor whether the hypervisor is authorized to run the virtual machine using a digital signature of the data structure, receiving a decryption key from a key authority when it is determined that the virtual machine is authorized to be run and it is determined that the hypervisor is authorized to run the virtual machine, unlocking and/or decrypting the virtual machine using the decryption key, and running the virtual machine on a computer system. Other systems, methods, and computer program products are described in additional embodiments.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20170516&amp;DB=EPODOC&amp;CC=US&amp;NR=9652276B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20170516&amp;DB=EPODOC&amp;CC=US&amp;NR=9652276B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Bish Thomas W</creatorcontrib><creatorcontrib>McBride Gregory E</creatorcontrib><creatorcontrib>Welp Richard A</creatorcontrib><creatorcontrib>Palazzolo Aaron S</creatorcontrib><creatorcontrib>Khandelwal Nikhil</creatorcontrib><creatorcontrib>Reed David C</creatorcontrib><title>Hypervisor and virtual machine protection</title><description>A method, according to one embodiment, includes receiving a request for a hypervisor to run a virtual machine, determining using a processor whether the virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine, determining using a processor whether the hypervisor is authorized to run the virtual machine using a digital signature of the data structure, receiving a decryption key from a key authority when it is determined that the virtual machine is authorized to be run and it is determined that the hypervisor is authorized to run the virtual machine, unlocking and/or decrypting the virtual machine using the decryption key, and running the virtual machine on a computer system. Other systems, methods, and computer program products are described in additional embodiments.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZND0qCxILSrLLM4vUkjMS1EoyywqKU3MUchNTM7IzEtVKCjKL0lNLsnMz-NhYE1LzClO5YXS3AwKbq4hzh66qQX58anFBYnJqXmpJfGhwZZmpkZG5mZORsZEKAEA6zMo_Q</recordid><startdate>20170516</startdate><enddate>20170516</enddate><creator>Bish Thomas W</creator><creator>McBride Gregory E</creator><creator>Welp Richard A</creator><creator>Palazzolo Aaron S</creator><creator>Khandelwal Nikhil</creator><creator>Reed David C</creator><scope>EVB</scope></search><sort><creationdate>20170516</creationdate><title>Hypervisor and virtual machine protection</title><author>Bish Thomas W ; McBride Gregory E ; Welp Richard A ; Palazzolo Aaron S ; Khandelwal Nikhil ; Reed David C</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9652276B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Bish Thomas W</creatorcontrib><creatorcontrib>McBride Gregory E</creatorcontrib><creatorcontrib>Welp Richard A</creatorcontrib><creatorcontrib>Palazzolo Aaron S</creatorcontrib><creatorcontrib>Khandelwal Nikhil</creatorcontrib><creatorcontrib>Reed David C</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bish Thomas W</au><au>McBride Gregory E</au><au>Welp Richard A</au><au>Palazzolo Aaron S</au><au>Khandelwal Nikhil</au><au>Reed David C</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Hypervisor and virtual machine protection</title><date>2017-05-16</date><risdate>2017</risdate><abstract>A method, according to one embodiment, includes receiving a request for a hypervisor to run a virtual machine, determining using a processor whether the virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine, determining using a processor whether the hypervisor is authorized to run the virtual machine using a digital signature of the data structure, receiving a decryption key from a key authority when it is determined that the virtual machine is authorized to be run and it is determined that the hypervisor is authorized to run the virtual machine, unlocking and/or decrypting the virtual machine using the decryption key, and running the virtual machine on a computer system. Other systems, methods, and computer program products are described in additional embodiments.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9652276B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Hypervisor and virtual machine protection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T08%3A44%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Bish%20Thomas%20W&rft.date=2017-05-16&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9652276B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true