Secure transfer of virtualized resources between entities
First Claim
1. A method for a secure transfer of cloud resources, the method comprising:
- under control of at least one processor and memory configured with executable instructions;
creating an ownership transfer account configured to enable a transfer of virtual computing resources between a first customer account and a second customer account within a service provider network hosted within a service provider environment, using the at least one processor and memory;
tagging virtual computing resources that are executable in the service provider environment and owned by the first customer account, using the at least one processor and memory;
transferring ownership of the virtual computing resources that are tagged to the ownership transfer account, using the at least one processor and memory;
verifying the transfer of the ownership of the virtual computing resources to the ownership transfer account, using the at least one processor and memory;
transferring ownership of the virtual computing resources from the ownership transfer account to the second customer account, using the at least one processor and memory; and
executing the virtual computing resources in the service provider environment, using the at least one processor and memory.
1 Assignment
0 Petitions
Accused Products
Abstract
Technology is described for providing a secure transfer of a virtual computing resource between at least two entities in a computing environment. An ownership transfer account is created and configured to enable a transfer of virtual computing resources between a first customer account and a second customer account of a service provider network hosted within a service provider environment, using one or more computing systems. Virtual computing resources owned by the first customer account are tagged using the one or more computer systems. The ownership of the virtual computing resources that are tagged is transferred to the ownership transfer account, using the one or more computer systems. The transfer of the virtual computing resources to the ownership transfer account is verified. The ownership of the virtual computing resources is transferred from the ownership transfer account to the second customer account.
-
Citations
20 Claims
-
1. A method for a secure transfer of cloud resources, the method comprising:
-
under control of at least one processor and memory configured with executable instructions; creating an ownership transfer account configured to enable a transfer of virtual computing resources between a first customer account and a second customer account within a service provider network hosted within a service provider environment, using the at least one processor and memory; tagging virtual computing resources that are executable in the service provider environment and owned by the first customer account, using the at least one processor and memory; transferring ownership of the virtual computing resources that are tagged to the ownership transfer account, using the at least one processor and memory; verifying the transfer of the ownership of the virtual computing resources to the ownership transfer account, using the at least one processor and memory; transferring ownership of the virtual computing resources from the ownership transfer account to the second customer account, using the at least one processor and memory; and executing the virtual computing resources in the service provider environment, using the at least one processor and memory. - View Dependent Claims (2, 3)
-
-
4. A computer-implemented method, the method comprising:
-
under control of at least one processor and memory configured with executable instructions; tagging virtual computing resources owned by a first party ownership account within a computing service environment, using the at least one processor and memory; transferring ownership of the virtual computing resources that have been tagged from the first party ownership account to an ownership transfer account, using the at least one processor and memory; transferring ownership of the virtual computing resources from the ownership transfer account to a second party ownership account, using the at least one processor and memory, wherein the first party ownership account is inaccessible to the second party ownership account; and executing the virtual computing resources in the computing service environment, using the at least one processor and memory. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for providing secure transfer of virtual computing resources within a computing environment, the method comprising:
-
under control of at least one processor and memory configured with executable instructions that; create an ownership transfer account to facilitate transfer of virtual computing resources between a first customer account and a second customer account within a service provider network hosted within a service provider environment, using the at least one processor and memory; tag virtual computing resources that are executable in the service provider environment and owned by the first customer account, using the at least one processor and memory; determine whether to transfer the tagged virtual computing resources that are owned by the first computing environment to the ownership transfer account by a transfer type that is at least one of;
a hot transfer, a suspended execution of the virtual computing resources, or a configuration transfer where configuration data is transferred to the ownership transfer account, using the at least one processor and memory;transfer ownership of the virtual computing resources that are tagged to the ownership transfer account according to the transfer type, using the at least one processor and memory; verify the transfer of the ownership of the virtual computing resources to the ownership transfer account, using the at least one processor and memory; transfer ownership of the virtual computing resources from the ownership transfer account to the second customer account by sending configuration data to the ownership transfer account; and execute the virtual computing resources in the service provider environment, using the at least one processor and memory. - View Dependent Claims (20)
-
Specification