会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • ENHANCED SECURE VIRTUAL MACHINE PROVISIONING
    • 增强安全虚拟机提供
    • WO2013174437A1
    • 2013-11-28
    • PCT/EP2012/059768
    • 2012-05-24
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)MORENIUS, FredricMÉHES, AndrásGEHRMANN, Christian
    • MORENIUS, FredricMÉHES, AndrásGEHRMANN, Christian
    • G06F21/57
    • H04L63/0435G06F9/45533G06F9/45558G06F21/57G06F2009/45587G06F2221/034H04L63/08H04L63/0807
    • In a method of provisioning a virtual machine (VM) to a computing network (401), a VM manager or provisioner (403, 408) encrypts a virtual machine using a key bound to at least one security profile indicative of one or more security requirements that a computing resource (402) of the computing network (401) must satisfy in order to be able to decrypt the VM. A key for use in decrypting the VM has previously been sealed into multiple (and preferably into all) computing resources (402) in the network into which the VM is to be provisioned, and has been sealed such that a computing resource can obtain the key only if it is in a state that satisfies the security profile, or at least one security profile, to which the key is bound The VM manager or provisioner (403, 408) creates a VM launch package that includes the encrypted VM and that also includes a key that may be used in decrypting the encrypted VM. When the VM launch package is received at a computing resource (402), the computing resource will not be able to recover the key for use in decrypting the VM - and hence will be unable to decrypt the VM - unless the computing resource satisfies the security requirements indicated by the security profile. The VM manager or provisioner can thus be sure that the VM will not be launched on a computing resource that does not meet the desired security profile. Alternatively the VM manager or provisioner (403, 408) may send a token corresponding to a desired security profile with an encrypted VM. A computing resource uses the token to obtain a key to decrypt the VM but the computing resource will not be able to recover the key unless the computing resource satisfies the security requirements indicated by the token.
    • 在向计算网络(401)提供虚拟机(VM)的方法中,VM管理器或供应器(403,408)使用绑定到指示一个或多个安全要求的至少一个安全简档的密钥来加密虚拟机 计算网络(401)的计算资源(402)必须满足以便能够解密VM。 用于解密VM的密钥先前已经被密封成要被提供虚拟机的网络中的多个(并且优选地到所有的)计算资源(402),并且已经被密封,使得计算资源可以获得密钥 只有当它处于满足密钥被绑定的安全简档或至少一个安全简档的状态时,VM管理器或供应器(403,408)创建包括加密的VM的VM启动包,并且还包括 可用于解密加密的VM的密钥。 当在计算资源(402)处接收到VM启动包时,计算资源将无法恢复用于解密VM的密钥,因此将无法解密VM,除非计算资源满足安全性 要求由安全性配置文件表示。 因此,VM管理器或配置器可以确保不会在不满足期望的安全配置文件的计算资源上启动VM。 或者,VM管理器或供应器(403,408)可以向加密的VM发送与期望的安全简档对应的令牌。 计算资源使用令牌来获取解密VM的密钥,但计算资源将无法恢复密钥,除非计算资源满足令牌所指示的安全性要求。