会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • ENHANCED SECURE VIRTUAL MACHINE PROVISIONING
    • 增强安全虚拟机提供
    • WO2013174437A1
    • 2013-11-28
    • PCT/EP2012/059768
    • 2012-05-24
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)MORENIUS, FredricMÉHES, AndrásGEHRMANN, Christian
    • MORENIUS, FredricMÉHES, AndrásGEHRMANN, Christian
    • G06F21/57
    • H04L63/0435G06F9/45533G06F9/45558G06F21/57G06F2009/45587G06F2221/034H04L63/08H04L63/0807
    • In a method of provisioning a virtual machine (VM) to a computing network (401), a VM manager or provisioner (403, 408) encrypts a virtual machine using a key bound to at least one security profile indicative of one or more security requirements that a computing resource (402) of the computing network (401) must satisfy in order to be able to decrypt the VM. A key for use in decrypting the VM has previously been sealed into multiple (and preferably into all) computing resources (402) in the network into which the VM is to be provisioned, and has been sealed such that a computing resource can obtain the key only if it is in a state that satisfies the security profile, or at least one security profile, to which the key is bound The VM manager or provisioner (403, 408) creates a VM launch package that includes the encrypted VM and that also includes a key that may be used in decrypting the encrypted VM. When the VM launch package is received at a computing resource (402), the computing resource will not be able to recover the key for use in decrypting the VM - and hence will be unable to decrypt the VM - unless the computing resource satisfies the security requirements indicated by the security profile. The VM manager or provisioner can thus be sure that the VM will not be launched on a computing resource that does not meet the desired security profile. Alternatively the VM manager or provisioner (403, 408) may send a token corresponding to a desired security profile with an encrypted VM. A computing resource uses the token to obtain a key to decrypt the VM but the computing resource will not be able to recover the key unless the computing resource satisfies the security requirements indicated by the token.
    • 在向计算网络(401)提供虚拟机(VM)的方法中,VM管理器或供应器(403,408)使用绑定到指示一个或多个安全要求的至少一个安全简档的密钥来加密虚拟机 计算网络(401)的计算资源(402)必须满足以便能够解密VM。 用于解密VM的密钥先前已经被密封成要被提供虚拟机的网络中的多个(并且优选地到所有的)计算资源(402),并且已经被密封,使得计算资源可以获得密钥 只有当它处于满足密钥被绑定的安全简档或至少一个安全简档的状态时,VM管理器或供应器(403,408)创建包括加密的VM的VM启动包,并且还包括 可用于解密加密的VM的密钥。 当在计算资源(402)处接收到VM启动包时,计算资源将无法恢复用于解密VM的密钥,因此将无法解密VM,除非计算资源满足安全性 要求由安全性配置文件表示。 因此,VM管理器或配置器可以确保不会在不满足期望的安全配置文件的计算资源上启动VM。 或者,VM管理器或供应器(403,408)可以向加密的VM发送与期望的安全简档对应的令牌。 计算资源使用令牌来获取解密VM的密钥,但计算资源将无法恢复密钥,除非计算资源满足令牌所指示的安全性要求。
    • 4. 发明申请
    • SECURE CLOUD-BASED VIRTUAL MACHINE MIGRATION
    • 安全基于云的虚拟机移动
    • WO2013057682A1
    • 2013-04-25
    • PCT/IB2012/055677
    • 2012-10-17
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)GEHRMANN, ChristianNASLUND, MatsPOURZANDI, Makan
    • GEHRMANN, ChristianNASLUND, MatsPOURZANDI, Makan
    • G06F9/48G06F9/455
    • G06F9/4856
    • A virtual machine (VM) system is provided. The system includes a target physical server (PS) that has a resource configuration. The system includes a source PS that runs a virtual machine (VM). The source PS is in communication with the target PS. The source PS includes a memory that stores a migration policy file. The migration policy file includes at least one trust criteria in which the at least one trust criteria indicates a minimum resource configuration. The source PS includes a receiver that receives target PS resource configuration and a processor in communication with the memory and receiver. The processor determines whether the target PS resource configuration meets the at least one trust criteria. The processor initiates VM migration to the target PS based at least in part on whether the target PS resource configuration meets the at least one trust criteria.
    • 提供虚拟机(VM)系统。 该系统包括具有资源配置的目标物理服务器(PS)。 该系统包括运行虚拟机(VM)的源PS。 源PS与目标PS通信。 源PS包括存储迁移策略文件的存储器。 所述迁移策略文件包括至少一个信任标准,其中所述至少一个信任标准指示最小资源配置。 源PS包括接收目标PS资源配置的接收器和与存储器和接收器通信的处理器。 处理器确定目标PS资源配置是否满足至少一个信任标准。 所述处理器至少部分地基于所述目标PS资源配置是否满足所述至少一个信任标准来启动到所述目标PS的迁移。
    • 5. 发明申请
    • PLATFORM BOOT WITH BRIDGE SUPPORT
    • 带桥梁支撑的平台引导
    • WO2007101533A2
    • 2007-09-13
    • PCT/EP2007/001394
    • 2007-02-19
    • TELEFONAKTIEBOLAGET L M ERICSSON (publ)GEHRMANN, Christian
    • GEHRMANN, Christian
    • G06F9/445
    • G06F15/177G06F9/4405
    • A method for booting a processing device, the processing device comprising a first and a second processing unit, the method comprising: detecting by the first processing unit, whether at least one boot configuration parameter is accessible from a non-volatile storage medium of the processing device, the at least one configuration parameter being indicative of a boot interface; if said at least one configuration parameter is available, forwarding at least a part of the detected at least one configuration parameter by the first processing unit to the second processing unit; otherwise detecting by at least one of the first and second processing units whether a boot interface is available to the processing device; booting at least the second processing unit from the indicated or detected boot interface.
    • 一种用于引导处理设备的方法,所述处理设备包括第一处理单元和第二处理单元,所述方法包括:由所述第一处理单元检测是否至少一个引导配置参数可从 所述处理设备的非易失性存储介质,所述至少一个配置参数指示引导接口; 如果所述至少一个配置参数可用,则将由所述第一处理单元检测到的至少一个配置参数的至少一部分转发给所述第二处理单元; 否则由第一和第二处理单元中的至少一个检测引导接口是否对处理设备可用; 至少从指示或检测到的引导界面引导第二处理单元。
    • 8. 发明申请
    • UPDATING MEMORY CONTENTS OF A PROCESSING DEVICE
    • 更新处理设备的内存内容
    • WO2006072410A1
    • 2006-07-13
    • PCT/EP2005/013929
    • 2005-12-20
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)GEHRMANN, Christian
    • GEHRMANN, Christian
    • G06F1/00G06F9/445
    • G06F21/572
    • A method of updating memory content stored in a memory of a processing device, the memory comprising a plurality of addressable memory blocks, the memory content being protected by a current integrity protection data item stored in the processing device, the method comprising determining a first subset of memory blocks that require an update, and a second subset of memory blocks that remain unchanged by said updating; calculating, as parallel processes, a first and a second integrity protection data item over the memory blocks; wherein the first integrity protection data item is calculated over the current memory contents of the first and second subsets of memory blocks; and wherein the second integrity protection data item is calculated over the current memory contents of the second subset of memory blocks and the updated memory block contents of the first subset of memory blocks.
    • 一种更新存储在处理设备的存储器中的存储器内容的方法,所述存储器包括多个可寻址存储器块,所述存储器内容被存储在所述处理设备中的当前完整性保护数据项所保护,所述方法包括确定第一子集 的需要更新的存储器块,以及通过所述更新保持不变的存储器块的第二子集; 作为并行处理,计算存储块上的第一和第二完整性保护数据项; 其中所述第一完整性保护数据项是根据所述第一和第二子集的存储器块的当前存储器内容来计算的; 并且其中根据存储器块的第二子集的当前存储器内容和存储器块的第一子集的更新的存储器块内容来计算第二完整性保护数据项。