IN2014DN09465A - - Google Patents

Info

Publication number
IN2014DN09465A
IN2014DN09465A IN9465DEN2014A IN2014DN09465A IN 2014DN09465 A IN2014DN09465 A IN 2014DN09465A IN 9465DEN2014 A IN9465DEN2014 A IN 9465DEN2014A IN 2014DN09465 A IN2014DN09465 A IN 2014DN09465A
Authority
IN
India
Prior art keywords
key
computing resource
security
computing
provisioner
Prior art date
Application number
Other languages
English (en)
Inventor
Fredric Morenius
András Méhes
Christian Gehrmann
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Publication of IN2014DN09465A publication Critical patent/IN2014DN09465A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
IN9465DEN2014 2012-05-24 2012-05-24 IN2014DN09465A (enrdf_load_html_response)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2012/059768 WO2013174437A1 (en) 2012-05-24 2012-05-24 Enhanced secure virtual machine provisioning

Publications (1)

Publication Number Publication Date
IN2014DN09465A true IN2014DN09465A (enrdf_load_html_response) 2015-07-17

Family

ID=46168479

Family Applications (1)

Application Number Title Priority Date Filing Date
IN9465DEN2014 IN2014DN09465A (enrdf_load_html_response) 2012-05-24 2012-05-24

Country Status (4)

Country Link
US (1) US20150134965A1 (enrdf_load_html_response)
EP (1) EP2856386A1 (enrdf_load_html_response)
IN (1) IN2014DN09465A (enrdf_load_html_response)
WO (1) WO2013174437A1 (enrdf_load_html_response)

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013093209A1 (en) * 2011-12-21 2013-06-27 Ssh Communications Security Oyj Automated access, key, certificate, and credential management
US8924720B2 (en) * 2012-09-27 2014-12-30 Intel Corporation Method and system to securely migrate and provision virtual machine images and content
US9519498B2 (en) 2013-12-24 2016-12-13 Microsoft Technology Licensing, Llc Virtual machine assurances
US9792427B2 (en) * 2014-02-07 2017-10-17 Microsoft Technology Licensing, Llc Trusted execution within a distributed computing system
US20170052807A1 (en) * 2014-02-20 2017-02-23 Telefonaktiebolaget Lm Ericsson (Publ) Methods, apparatuses, and computer program products for deploying and managing software containers
US9753768B2 (en) * 2014-03-08 2017-09-05 Vmware, Inc. Instant xvmotion using a private storage virtual appliance
US9652631B2 (en) 2014-05-05 2017-05-16 Microsoft Technology Licensing, Llc Secure transport of encrypted virtual machines with continuous owner access
US9652276B2 (en) 2014-09-17 2017-05-16 International Business Machines Corporation Hypervisor and virtual machine protection
US10229272B2 (en) 2014-10-13 2019-03-12 Microsoft Technology Licensing, Llc Identifying security boundaries on computing devices
US9584317B2 (en) 2014-10-13 2017-02-28 Microsoft Technology Licensing, Llc Identifying security boundaries on computing devices
US9519787B2 (en) * 2014-11-14 2016-12-13 Microsoft Technology Licensing, Llc Secure creation of encrypted virtual machines from encrypted templates
US10129220B2 (en) 2015-06-13 2018-11-13 Avocado Systems Inc. Application and data protection tag
US9952790B2 (en) * 2015-06-13 2018-04-24 Avocado Systems Inc. Application security policy actions based on security profile exchange
US10397277B2 (en) 2015-06-14 2019-08-27 Avocado Systems Inc. Dynamic data socket descriptor mirroring mechanism and use for security analytics
US10193889B2 (en) 2015-06-14 2019-01-29 Avocado Systems Inc. Data socket descriptor attributes for application discovery in data centers
US10270810B2 (en) 2015-06-14 2019-04-23 Avocado Systems Inc. Data socket descriptor based policies for application and data behavior and security
US10148697B2 (en) 2015-06-16 2018-12-04 Avocado Systems Inc. Unified host based security exchange between heterogeneous end point security agents
US10193930B2 (en) 2015-06-29 2019-01-29 Avocado Systems Inc. Application security capability exchange via the application and data protection layer
EP3317875B1 (en) 2015-07-03 2022-10-26 Telefonaktiebolaget LM Ericsson (publ) Keyless signature infrastructure based virtual machine integrity
US10356068B2 (en) 2015-07-14 2019-07-16 Avocado Systems Inc. Security key generator module for security sensitive applications
US10354070B2 (en) 2015-08-22 2019-07-16 Avocado Systems Inc. Thread level access control to socket descriptors and end-to-end thread level policies for thread protection
US10042749B2 (en) 2015-11-10 2018-08-07 International Business Machines Corporation Prefetch insensitive transactional memory
JP6734760B2 (ja) 2015-11-10 2020-08-05 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation プリフェッチ・インセンシティブのトランザクション・メモリ
WO2017139652A1 (en) * 2016-02-10 2017-08-17 MobileIron, Inc. Securely storing and distributing sensitive data in a cloud-based application
CN107133520B (zh) * 2016-02-26 2021-05-14 华为技术有限公司 云计算平台的可信度量方法和装置
US10684839B2 (en) 2016-06-15 2020-06-16 Red Hat Israel, Ltd. Plugin for software deployment
US10177910B2 (en) * 2016-08-31 2019-01-08 Microsoft Technology Licensing, Llc Preserving protected secrets across a secure boot update
US10467880B2 (en) 2016-09-16 2019-11-05 Nypro Inc. Apparatus, system and method for a portable personal air quality monitor
US11270193B2 (en) 2016-09-30 2022-03-08 International Business Machines Corporation Scalable stream synaptic supercomputer for extreme throughput neural networks
US10528746B2 (en) * 2016-12-27 2020-01-07 Intel Corporation System, apparatus and method for trusted channel creation using execute-only code
US10228965B2 (en) * 2017-05-15 2019-03-12 Synopsys, Inc. Architecture, system and method for creating and employing trusted virtual appliances
US10958424B1 (en) * 2017-11-02 2021-03-23 Amazon Technologies, Inc. Mechanism to allow third party to use a shared secret between two parties without revealing the secret
US10686891B2 (en) * 2017-11-14 2020-06-16 International Business Machines Corporation Migration of applications to a computing environment
US11036532B2 (en) * 2017-11-29 2021-06-15 Microsoft Technology Licensing, Llc Fast join and leave virtual network
US12028443B2 (en) 2018-01-24 2024-07-02 Intel Corporation Security profiles for internet of things devices and trusted platforms
CN108599936A (zh) * 2018-04-20 2018-09-28 西安电子科技大学 一种OpenStack开源云用户的安全认证方法
CN108737171B (zh) * 2018-05-10 2021-08-27 网宿科技股份有限公司 一种管理云服务集群的方法和系统
US11044238B2 (en) 2018-10-19 2021-06-22 International Business Machines Corporation Secure communications among tenant virtual machines in a cloud networking environment
CN110012076B (zh) * 2019-03-12 2022-07-01 新华三技术有限公司 一种连接建立方法及装置
US12079640B1 (en) * 2019-03-12 2024-09-03 Pivotal Software, Inc. Platform verified add-on resources
US11210128B2 (en) * 2019-09-26 2021-12-28 At&T Intellectual Property I, L.P. Device virtualization security layer
US12192182B2 (en) * 2020-01-22 2025-01-07 Telefonaktiebolaget Lm Ericsson (Publ) Container with encrypted software packages
US11575513B2 (en) * 2020-04-18 2023-02-07 Cisco Technology, Inc. Applying attestation tokens to multicast routing protocols
JP2022099293A (ja) * 2020-12-22 2022-07-04 インターナショナル・ビジネス・マシーンズ・コーポレーション コンピューテーションを標的トラステッド実行環境(tee)において実行されるように生成するための方法、システム、およびコンピュータ・プログラム(クラウド・インフラストラクチャにおけるセキュアな/暗号化された仮想マシンのプロビジョニング)
WO2023272419A1 (en) 2021-06-28 2023-01-05 Microsoft Technology Licensing, Llc Virtual machine provisioning and directory service management

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9606821B2 (en) * 2004-12-17 2017-03-28 Intel Corporation Virtual environment manager for creating and managing virtual machine environments
US8468230B2 (en) * 2007-10-18 2013-06-18 Fujitsu Limited Method, apparatus and recording medium for migrating a virtual machine
US20090133097A1 (en) * 2007-11-15 2009-05-21 Ned Smith Device, system, and method for provisioning trusted platform module policies to a virtual machine monitor
CN102754077B (zh) * 2009-12-14 2015-11-25 思杰系统有限公司 可从外部媒体装置引导的安全虚拟化环境
AU2011261831B2 (en) * 2010-06-02 2014-03-20 VMware LLC Securing customer virtual machines in a multi-tenant cloud
US8856504B2 (en) * 2010-06-07 2014-10-07 Cisco Technology, Inc. Secure virtual machine bootstrap in untrusted cloud infrastructures

Also Published As

Publication number Publication date
US20150134965A1 (en) 2015-05-14
WO2013174437A1 (en) 2013-11-28
EP2856386A1 (en) 2015-04-08

Similar Documents

Publication Publication Date Title
IN2014DN09465A (enrdf_load_html_response)
BR112015026372B8 (pt) Dispositivo de comunicação que reforça a segurança para um arquivo armazenado em uma unidade virtual
AU2018256568A1 (en) Systems and methods for software based encryption
WO2017034642A3 (en) Optimizable full-path encryption in a virtualization environment
RU2016143088A (ru) Безопасный транспорт зашифрованных виртуальных машин с непрерывным доступом владельца
WO2016126332A3 (en) Data security operations with expectations
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
SG10201901366WA (en) Key exchange through partially trusted third party
BR112019003520A2 (pt) comunicação segura de tráfego de rede
BR112017020675A2 (pt) acordo de autenticação e chave com sigilo perfeito de emissão
WO2016057086A3 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
GB2512249A (en) Secure peer discovery and authentication using a shared secret
WO2014070134A3 (en) Quorum-based virtual machine security
GB2533727A (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
NZ746653A (en) Access control for encrypted data in machine-readable identifiers
WO2014207581A3 (en) Processing guest event in hypervisor-controlled system
BR112017002747A2 (pt) método implementado por computador, e, sistema de computador.
HK1212524A1 (en) Data security management system
BR112015030544A2 (pt) sistemas de autenticação eletrônica
BR112017003018A2 (pt) fornecimento seguro de uma credencial de autenticação
GB2526240A (en) Key management in multi-tenant environments
WO2014027263A3 (en) Attribute-based encryption
WO2014047135A3 (en) Method and device for a generalized cryptographic framework
MX2016009066A (es) Sistemas y metodos con seguridad de programa de criptografia y resistencia a uso indebido.
MX2018014312A (es) Uso de region aislada segura basada en hardware para prevenir la pirateria y el engaño en dispositivos electronicos.