CA2813601A1 - Secure deployment of provable identity for dynamic application environments - Google Patents
Secure deployment of provable identity for dynamic application environments Download PDFInfo
- Publication number
- CA2813601A1 CA2813601A1 CA2813601A CA2813601A CA2813601A1 CA 2813601 A1 CA2813601 A1 CA 2813601A1 CA 2813601 A CA2813601 A CA 2813601A CA 2813601 A CA2813601 A CA 2813601A CA 2813601 A1 CA2813601 A1 CA 2813601A1
- Authority
- CA
- Canada
- Prior art keywords
- computer
- identity
- account
- sending
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45562—Creating, deleting, cloning virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Multi Processors (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/901,445 | 2010-10-08 | ||
| US12/901,445 US8990562B2 (en) | 2010-10-08 | 2010-10-08 | Secure deployment of provable identity for dynamic application environments |
| PCT/US2011/053010 WO2012047555A2 (en) | 2010-10-08 | 2011-09-23 | Secure deployment of provable identity for dynamic application environments |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CA2813601A1 true CA2813601A1 (en) | 2012-04-12 |
Family
ID=45885938
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA2813601A Abandoned CA2813601A1 (en) | 2010-10-08 | 2011-09-23 | Secure deployment of provable identity for dynamic application environments |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US8990562B2 (OSRAM) |
| EP (1) | EP2625645B1 (OSRAM) |
| JP (1) | JP5934224B2 (OSRAM) |
| CN (1) | CN102404117B (OSRAM) |
| AU (1) | AU2011312611B2 (OSRAM) |
| CA (1) | CA2813601A1 (OSRAM) |
| WO (1) | WO2012047555A2 (OSRAM) |
Families Citing this family (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9135037B1 (en) * | 2011-01-13 | 2015-09-15 | Google Inc. | Virtual network protocol |
| US9619662B1 (en) * | 2011-01-13 | 2017-04-11 | Google Inc. | Virtual network pairs |
| AU2012210978B2 (en) * | 2011-01-28 | 2015-11-26 | Royal Canadian Mint/Monnaie Royal Canadienne | Controlled security domains |
| US9361162B1 (en) * | 2011-08-26 | 2016-06-07 | Amazon Technologies, Inc. | Executing threads of an application across multiple computing devices in a distributed virtual machine environment |
| US9992024B2 (en) * | 2012-01-25 | 2018-06-05 | Fujitsu Limited | Establishing a chain of trust within a virtual machine |
| US9917736B2 (en) | 2012-01-30 | 2018-03-13 | Microsoft Technology Licensing, Llc | Automated standalone bootstrapping of hardware inventory |
| US9367360B2 (en) * | 2012-01-30 | 2016-06-14 | Microsoft Technology Licensing, Llc | Deploying a hardware inventory as a cloud-computing stamp |
| US8910161B2 (en) * | 2012-07-13 | 2014-12-09 | Vmware, Inc. | Scan systems and methods of scanning virtual machines |
| EP3014507B1 (en) | 2013-06-27 | 2018-04-04 | Intel Corporation | Continuous multi-factor authentication |
| CN105282122B (zh) * | 2014-07-22 | 2019-07-12 | 中兴通讯股份有限公司 | 基于数字证书的信息安全实现方法及系统 |
| CN104168292A (zh) * | 2014-09-01 | 2014-11-26 | 宇龙计算机通信科技(深圳)有限公司 | 动态指令处理方法、动态指令处理装置和终端 |
| US9912478B2 (en) | 2015-12-14 | 2018-03-06 | International Business Machines Corporation | Authenticating features of virtual server system |
| US10228924B2 (en) * | 2016-04-19 | 2019-03-12 | International Business Machines Corporation | Application deployment and monitoring in a cloud environment to satisfy integrity and geo-fencing constraints |
| US10031735B2 (en) | 2016-09-30 | 2018-07-24 | International Business Machines Corporation | Secure deployment of applications in a cloud computing platform |
| CN109688098B (zh) * | 2018-09-07 | 2022-05-20 | 平安科技(深圳)有限公司 | 数据的安全通信方法、装置、设备及计算机可读存储介质 |
| US11586470B2 (en) * | 2019-08-07 | 2023-02-21 | International Business Machines Corporation | Scalable workflow engine with a stateless orchestrator |
| EP4128703A4 (en) | 2020-03-25 | 2024-03-27 | Services Pétroliers Schlumberger | Integrated authentication system and method |
| US11762671B2 (en) * | 2021-11-08 | 2023-09-19 | Smashcut, Inc. | Virtualization-based collaborative activity framework with predictive preloading of virtual machines |
| US11695772B1 (en) * | 2022-05-03 | 2023-07-04 | Capital One Services, Llc | System and method for enabling multiple auxiliary use of an access token of a user by another entity to facilitate an action of the user |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4671619B2 (ja) * | 2004-03-31 | 2011-04-20 | 富士通株式会社 | 端末正当性保証システムおよび端末正当性保証方法 |
| US20070174429A1 (en) | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
| EP1826979A1 (en) * | 2006-02-27 | 2007-08-29 | BRITISH TELECOMMUNICATIONS public limited company | A system and method for establishing a secure group of entities in a computer network |
| JP4778358B2 (ja) * | 2006-05-15 | 2011-09-21 | 日本電信電話株式会社 | 接続先顧客保護システム、その方法及びそのプログラム |
| US20080104393A1 (en) | 2006-09-28 | 2008-05-01 | Microsoft Corporation | Cloud-based access control list |
| US8751815B2 (en) | 2006-10-25 | 2014-06-10 | Iovation Inc. | Creating and verifying globally unique device-specific identifiers |
| JP2008171076A (ja) * | 2007-01-09 | 2008-07-24 | Vision Arts Kk | ジョブ実行装置及びその制御方法 |
| US20080228865A1 (en) | 2007-03-15 | 2008-09-18 | Nazareno Brier Cruzada | Electronic personal computing and videophone system consisting of a remote server system providing dynamic, subscription based virtual computing services & resources, a thin client hardware device connected to a television set and wireless keyboard & mouse, and a wireless mobile device (a Pocket PC Phone) |
| CN101022339A (zh) | 2007-03-23 | 2007-08-22 | 郭传真 | 一种结合数字证书和印章的电子签章认证方法 |
| US8881253B2 (en) * | 2007-03-28 | 2014-11-04 | Symantec Corporation | Method and apparatus for accepting a digital identity of a user based on transitive trust among parties |
| US8418222B2 (en) | 2008-03-05 | 2013-04-09 | Microsoft Corporation | Flexible scalable application authorization for cloud computing environments |
| US8108912B2 (en) | 2008-05-29 | 2012-01-31 | Red Hat, Inc. | Systems and methods for management of secure data in cloud-based network |
| TW201007574A (en) | 2008-08-13 | 2010-02-16 | Inventec Corp | Internet server system and method of constructing and starting a virtual machine |
| US9009329B2 (en) | 2008-11-25 | 2015-04-14 | Microsoft Technology Licensing, Llc | Platform for enabling terminal services virtualization |
| JP2010165231A (ja) * | 2009-01-16 | 2010-07-29 | Panasonic Corp | サーバ認証方法及びクライアント端末 |
| JP5419501B2 (ja) * | 2009-03-16 | 2014-02-19 | キヤノン株式会社 | 情報処理システム及びその処理方法 |
| US8959510B2 (en) * | 2009-03-19 | 2015-02-17 | Red Hat, Inc. | Providing a trusted environment for provisioning a virtual machine |
| US20120054491A1 (en) * | 2010-08-31 | 2012-03-01 | Peter John Tippett | Re-authentication in client-server communications |
-
2010
- 2010-10-08 US US12/901,445 patent/US8990562B2/en active Active
-
2011
- 2011-09-23 JP JP2013532829A patent/JP5934224B2/ja active Active
- 2011-09-23 CA CA2813601A patent/CA2813601A1/en not_active Abandoned
- 2011-09-23 EP EP11831226.3A patent/EP2625645B1/en active Active
- 2011-09-23 AU AU2011312611A patent/AU2011312611B2/en not_active Ceased
- 2011-09-23 WO PCT/US2011/053010 patent/WO2012047555A2/en not_active Ceased
- 2011-09-30 CN CN201110310751.XA patent/CN102404117B/zh active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US8990562B2 (en) | 2015-03-24 |
| EP2625645B1 (en) | 2020-10-07 |
| AU2011312611B2 (en) | 2014-05-29 |
| AU2011312611A1 (en) | 2013-05-02 |
| WO2012047555A2 (en) | 2012-04-12 |
| JP2013540323A (ja) | 2013-10-31 |
| US20120089833A1 (en) | 2012-04-12 |
| EP2625645A2 (en) | 2013-08-14 |
| CN102404117B (zh) | 2015-05-20 |
| EP2625645A4 (en) | 2017-05-03 |
| JP5934224B2 (ja) | 2016-06-15 |
| WO2012047555A3 (en) | 2012-05-31 |
| CN102404117A (zh) | 2012-04-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2011312611B2 (en) | Secure deployment of provable identity for dynamic application environments | |
| US8505083B2 (en) | Remote resources single sign on | |
| US9830430B2 (en) | Inherited product activation for virtual machines | |
| US8607054B2 (en) | Remote access to hosted virtual machines by enterprise users | |
| US8583920B1 (en) | Secure administration of virtual machines | |
| US11429733B2 (en) | Sharing secret data between multiple containers | |
| US8255984B1 (en) | Single sign-on system for shared resource environments | |
| US9792426B1 (en) | System and method for providing anonymous access to shared resources | |
| US20120079607A1 (en) | Request Based License Mode Selection | |
| US11811749B2 (en) | Authentication of plugins in a virtualized computing environment | |
| CN118057971A (zh) | 在分布式系统中管理唯一秘密 | |
| US20120079393A1 (en) | Adaptable License Platform for Remote Sessions | |
| CN113330435A (zh) | 跟踪被污染的连接代理 | |
| Quan | PRIVATE CLOUD ENVIRONMENT | |
| أحمد المنتصري | Cellar: Securing Data for Twister | |
| Tran Gia | Private cloud environment and its utilization in a real-world scenario |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| EEER | Examination request |
Effective date: 20160922 |
|
| FZDE | Discontinued |
Effective date: 20180925 |