Method and apparatus for automatic and secure distribution of a symmetric key security credential in a utility computing environment
First Claim
1. A method for automatic, secure, and confidential distribution of a symmetric key security credential in a utility computing environment comprising:
- establishing a symmetric key at a management server, said symmetric key automatically associated with a logical device identifier of a provisionable resource;
establishing an isolated virtual network between the management server and the provisionable resource;
providing the symmetric key to the provisionable resource; and
dissolving the isolated virtual network between the management server and the provisionable resource after the symmetric key is provided to said provisionable resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide a method and an apparatus for automatic, secure, and confidential distribution of a symmetric key security credential in a utility computing environment. In one method embodiment, the present invention establishes a symmetric key at a management server, the symmetric key automatically associated with a logical device identifier of a provisionable resource. Additionally, an isolated virtual network is established between the management server and the provisionable resource for providing the symmetric key to the provisionable resource. Then, after the symmetric key is provided to the provisionable resource the isolated virtual network between the management server and the provisionable resource is dissolved.
35 Citations
33 Claims
-
1. A method for automatic, secure, and confidential distribution of a symmetric key security credential in a utility computing environment comprising:
-
establishing a symmetric key at a management server, said symmetric key automatically associated with a logical device identifier of a provisionable resource;
establishing an isolated virtual network between the management server and the provisionable resource;
providing the symmetric key to the provisionable resource; and
dissolving the isolated virtual network between the management server and the provisionable resource after the symmetric key is provided to said provisionable resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An automated symmetric key security credential distributor for a utility computing environment comprising:
-
a symmetric key generator for generating a symmetric key at a management server;
a logical device identifier coupler for coupling the symmetric key with a logical device identifier of a provisionable resource;
a virtual network establisher for automatically establishing an isolated virtual network between the management server and the provisionable resource;
a symmetric key provider for providing the symmetric key to the provisionable resource; and
a virtual network dissolver for dissolving the isolated virtual network between the management server and the provisionable resource after the symmetric key is provided to said provisionable resource. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-usable medium having computer-readable program code embodied therein for causing a method for automatic, secure, and confidential distribution of a symmetric key security credential in a utility computing environment comprising:
-
establishing a symmetric key at a management server;
associating the symmetric key with a logical device identifier of a provisionable resource;
automatically establishing an isolated virtual network between the management server and the provisionable resource;
providing the symmetric key to the provisionable resource; and
dissolving the isolated virtual network between the management server and the provisionable resource after the symmetric key is provided to said provisionable resource. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A utility computing environment comprising:
-
a plurality of information technology (IT) compute resources and connections coupled with said plurality of IT compute resources;
with each of said plurality of IT compute resources represented in a machine-readable map; and
a management server coupled with said plurality of IT compute resources, said management server configured to automatically distribute symmetric key security credentials for said IT compute resources for said data center. - View Dependent Claims (32, 33)
-
Specification