Using a proxy for endpoint access control
First Claim
Patent Images
1. A method comprising:
- providing a virtual machine within a first enclave and a second enclave; and
using the virtual machine as a proxy to negotiate a connection between the first enclave and the second enclave.
1 Assignment
0 Petitions
Accused Products
Abstract
A technique includes providing a virtual machine within a first enclave and a second enclave. A virtual machine is used as a proxy to negotiate a connection between the first enclave and the second enclave.
-
Citations
25 Claims
-
1. A method comprising:
-
providing a virtual machine within a first enclave and a second enclave; and
using the virtual machine as a proxy to negotiate a connection between the first enclave and the second enclave. - View Dependent Claims (2, 3, 4, 5, 6, 24)
-
-
7. An apparatus comprising:
a first virtual machine of a first enclave to be a proxy between a second virtual machine of the first enclave and a second enclave different from the first enclave. - View Dependent Claims (8, 9, 10, 11, 12, 22, 23, 25)
-
13. An article comprising a computer accessible storage medium storing instructions that, when executed by a computer, cause the computer to:
-
provide a virtual machine within a first enclave and a second enclave; and
use the virtual machine as a proxy to negotiate a connection between the first enclave and the second enclave. - View Dependent Claims (14, 15, 16)
-
-
17-21. -21. (canceled)
Specification