Content based hardware security module assignment to virtual machines
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Nunez Mencias Angel Buendgen Reinhard Lang Jakob C Boenisch Volker M. M Lattermann Mareike Geisert Franziska |
description | At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9767295B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9767295B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9767295B23</originalsourceid><addsrcrecordid>eNqNyj0KwkAQBtA0FqLeYS6QJqIhrSFir9Zh3P00C_sTdmYVby-CB7B6zVtWQ5-iIirdWGBp4mxfnEECU7LTN4VkiwexiHvE8J2a6OmyFvYU2EwuQtbV4s5esPm5qug4XPpTjTmNkJkNInS8nrt23zbd7tBs_ygf1mwzqQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Content based hardware security module assignment to virtual machines</title><source>esp@cenet</source><creator>Nunez Mencias Angel ; Buendgen Reinhard ; Lang Jakob C ; Boenisch Volker M. M ; Lattermann Mareike ; Geisert Franziska</creator><creatorcontrib>Nunez Mencias Angel ; Buendgen Reinhard ; Lang Jakob C ; Boenisch Volker M. M ; Lattermann Mareike ; Geisert Franziska</creatorcontrib><description>At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170919&DB=EPODOC&CC=US&NR=9767295B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170919&DB=EPODOC&CC=US&NR=9767295B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Nunez Mencias Angel</creatorcontrib><creatorcontrib>Buendgen Reinhard</creatorcontrib><creatorcontrib>Lang Jakob C</creatorcontrib><creatorcontrib>Boenisch Volker M. M</creatorcontrib><creatorcontrib>Lattermann Mareike</creatorcontrib><creatorcontrib>Geisert Franziska</creatorcontrib><title>Content based hardware security module assignment to virtual machines</title><description>At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyj0KwkAQBtA0FqLeYS6QJqIhrSFir9Zh3P00C_sTdmYVby-CB7B6zVtWQ5-iIirdWGBp4mxfnEECU7LTN4VkiwexiHvE8J2a6OmyFvYU2EwuQtbV4s5esPm5qug4XPpTjTmNkJkNInS8nrt23zbd7tBs_ygf1mwzqQ</recordid><startdate>20170919</startdate><enddate>20170919</enddate><creator>Nunez Mencias Angel</creator><creator>Buendgen Reinhard</creator><creator>Lang Jakob C</creator><creator>Boenisch Volker M. M</creator><creator>Lattermann Mareike</creator><creator>Geisert Franziska</creator><scope>EVB</scope></search><sort><creationdate>20170919</creationdate><title>Content based hardware security module assignment to virtual machines</title><author>Nunez Mencias Angel ; Buendgen Reinhard ; Lang Jakob C ; Boenisch Volker M. M ; Lattermann Mareike ; Geisert Franziska</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9767295B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Nunez Mencias Angel</creatorcontrib><creatorcontrib>Buendgen Reinhard</creatorcontrib><creatorcontrib>Lang Jakob C</creatorcontrib><creatorcontrib>Boenisch Volker M. M</creatorcontrib><creatorcontrib>Lattermann Mareike</creatorcontrib><creatorcontrib>Geisert Franziska</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nunez Mencias Angel</au><au>Buendgen Reinhard</au><au>Lang Jakob C</au><au>Boenisch Volker M. M</au><au>Lattermann Mareike</au><au>Geisert Franziska</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Content based hardware security module assignment to virtual machines</title><date>2017-09-19</date><risdate>2017</risdate><abstract>At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US9767295B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Content based hardware security module assignment to virtual machines |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T07%3A49%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Nunez%20Mencias%20Angel&rft.date=2017-09-19&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9767295B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |