Universal secure platform virtualization system and method thereof
First Claim
1. A secure platform and application virtualization system comprising:
- a universal secure platform virtualization system (USPVS) platform, wherein the USPVS platform is an external computing device having a specific set of protocols to interact with a computing device, wherein the USPVS platform further comprises;
a source code;
a central processing module, wherein the central processing module compiles and executes the source code;
a Random Access Memory (RAM), wherein the RAM is connected to the central processing module, wherein a data processed during virtualization of the operating system and a plurality of applications is temporarily stored for reading, writing and executing in the RAM,a cloud environment, wherein the USPVS platform is connected to a plurality of virtual as well as physical cloud environment;
wherein the cloud environment acts as a communication channel to transmit a data without storing either temporarily or permanently;
a USPVS portable key device, logging into the operating system through the USPVS portable key device to load the operating system (OS) on the USPVS platform;
wherein the USPVS portable key device is connected to the USPVS platform, wherein the USPVS portable key device holds an encryption key with a Unique ID, wherein the USPVS portable key device comprises a Universal Serial Bus port for connection of a tertiary external device;
wherein, the USPVS platform has a decryption key for the encryption key of the USPVS portable device;
wherein the USPVS portable key device is configured to;
create a secure tunnel between a central processing unit of a computing device connected with the USPVS platform and the operating system, wherein the creating of secure tunnel lead to a script awaiting an authentication of the USPVS platform, and display an encrypted content for an OS virtualization tasks and a plurality of application executions.
0 Assignments
0 Petitions
Accused Products
Abstract
The embodiments herein provide a secure platform and application virtualization system comprising a universal secure platform virtualization system (USPVS) platform device, a cloud environment and a USPVS portable key device. The USPVS platform is an external computing device having a specific set of protocols to interact with a computing device. The USPVS platform is connected to a plurality of virtual as well as physical cloud environment. The USPVS portable key device is connected to the USPVS platform. The USPVS portable key device holds an encryption key with a Unique ID. The USPVS portable key device comprises a Universal Serial Bus port for connection of a tertiary external device. The USPVS platform has a decryption key for the encryption key of the USPVS portable device.
6 Citations
8 Claims
-
1. A secure platform and application virtualization system comprising:
-
a universal secure platform virtualization system (USPVS) platform, wherein the USPVS platform is an external computing device having a specific set of protocols to interact with a computing device, wherein the USPVS platform further comprises; a source code; a central processing module, wherein the central processing module compiles and executes the source code; a Random Access Memory (RAM), wherein the RAM is connected to the central processing module, wherein a data processed during virtualization of the operating system and a plurality of applications is temporarily stored for reading, writing and executing in the RAM, a cloud environment, wherein the USPVS platform is connected to a plurality of virtual as well as physical cloud environment;
wherein the cloud environment acts as a communication channel to transmit a data without storing either temporarily or permanently;a USPVS portable key device, logging into the operating system through the USPVS portable key device to load the operating system (OS) on the USPVS platform;
wherein the USPVS portable key device is connected to the USPVS platform, wherein the USPVS portable key device holds an encryption key with a Unique ID, wherein the USPVS portable key device comprises a Universal Serial Bus port for connection of a tertiary external device;wherein, the USPVS platform has a decryption key for the encryption key of the USPVS portable device;
wherein the USPVS portable key device is configured to;create a secure tunnel between a central processing unit of a computing device connected with the USPVS platform and the operating system, wherein the creating of secure tunnel lead to a script awaiting an authentication of the USPVS platform, and display an encrypted content for an OS virtualization tasks and a plurality of application executions. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for virtualization of an operating system and a plurality of applications comprising the steps of:
-
logging into the operating system through the USPVS portable key device to load the operating system (OS) on the USPVS platform, wherein the USPVS platform works in a cloud network environment that acts as a communication channel to transmit a data without storing either temporarily or permanently; compiling a data of the operating system and the plurality of applications through a source code over a USPVS platform, wherein the compiled data comprises a plurality of computing instructions of the operating system and libraries for the plurality of applications; creating a secure tunnel between a central processing unit of a computing device connected with the USPVS platform and the operating system wherein the creating of secure tunnel lead to a script awaiting an authentication of the USPVS platform; performing a remote code execution task on the USPVS platform, wherein the remote code is executed in a single instance session for virtualization of the operating system and the applications; displaying an encrypted content for an OS virtualization tasks and a plurality of application executions; breaking the tunnel on shutting down of the operating system or an application, wherein the breaking of tunnel restricts an access of an unauthorized device to the operating system or the application. - View Dependent Claims (8)
-
Specification