Methods and apparatus for implementing a virtualized computer system
First Claim
1. A method of creating a virtualized computer environment that represents a real world computer environment, wherein the real world computer environment comprises a plurality of components, the plurality of components comprising a plurality of computer devices and at least one network device that implements a network that interconnects the plurality of computer devices, the real world computer environment comprising at least one security facility that implements at least one security function in the real world computer environment, the method comprising acts of:
- including in the virtualized computer environment a virtualized representation of at least one of the plurality of computer devices in the real world computer environment; and
implementing the at least one security function in the virtualized computer environment.
2 Assignments
0 Petitions
Accused Products
Abstract
In one aspect, a method of creating a virtualized computer environment that represents a real world computer environment is provided. The real world computer environment comprises a plurality of components, the plurality of components comprising a plurality of computer devices and at least one network device that implements a network that interconnects the plurality of computer devices, the real world computer environment comprising at least one security facility that implements at least one security function in the real world computer environment. The method comprises acts of including in the virtualized computer environment a virtualized representation of at least one of the plurality of computer devices in the real world computer environment and implementing the at least one security function in the virtualized computer environment. In another aspect, a virtualized representation of the at least one network device is provided. In another aspect, software is executed in the virtual computer environment.
-
Citations
40 Claims
-
1. A method of creating a virtualized computer environment that represents a real world computer environment, wherein the real world computer environment comprises a plurality of components, the plurality of components comprising a plurality of computer devices and at least one network device that implements a network that interconnects the plurality of computer devices, the real world computer environment comprising at least one security facility that implements at least one security function in the real world computer environment, the method comprising acts of:
-
including in the virtualized computer environment a virtualized representation of at least one of the plurality of computer devices in the real world computer environment; and
implementing the at least one security function in the virtualized computer environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 40)
-
-
19. A computer readable medium encoded with a program for execution on at least one processor, the program, when executed on the at least one processor, performing a method of providing a virtualized computer environment that represents a real world computer environment, wherein the real world computer environment comprises a plurality of components, the plurality of components comprising a plurality of computer devices and at least one network device that implements a network that interconnects the plurality of computer devices, the real world computer environment comprising at least one security facility that implements at least one security function in the real world computer environment, the method comprising acts of:
-
providing in the virtualized computer environment a virtualized representation of at least one of the computer devices in the real world computer environment; and
performing the at least one security function in the virtualized computer environment. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. An apparatus for deploying a virtualized environment that represents a real world computer environment, wherein the real world computer environment comprises a plurality of components, the plurality of components comprising a plurality of computer devices and at least one network device that implements a network that interconnects the plurality of computer devices, the real world computer environment comprising at least one security facility that implements at least one security function in the real world computer environment, the apparatus comprising:
at least one controller adapted to emulate at least two of the plurality of computer devices in the real world computer environment and to implement the at least one security function in the virtualized computer environment. - View Dependent Claims (29, 30, 31)
-
32. A method of testing software to be executed on a real world computer environment that comprises a plurality of computer devices interconnected via a network that comprises at least one network device, the real world computer environment further comprising at least one security facility that implements at least one security function in the real world computer environment, the method comprising an act of:
executing the software on a virtualized computer environment that represents the real world computer environment, the virtualized computer environment comprising a virtualized representation of at least one of the computer devices in the real world computer environment and implementing the at least one security function in the virtualized computer environment. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39)
Specification