METHODS AND APPARATUS FOR LOCATING AN UNAUTHORIZED VIRTUAL MACHINE
First Claim
Patent Images
1. A method for detecting an unauthorized use of a virtual machine, the method comprising:
- storing a virtual machine on a physical machine, the virtual machine including a boot pointer, the boot pointer pointing to a locator code;
booting the virtual machine;
bypassing the locator code by adjusting the boot pointer if the virtual machine is in an authorized environment; and
executing the locator code if the virtual machine is in an unauthorized environment, wherein the locator code gathers information indicative of the location of the unauthorized environment, and transmits a message including the information indicative of the location.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus of locating an unauthorized virtual machine are disclosed. A virtual machine is registered with a management system. When the virtual machine is requested to start, the system determines whether the virtual machine is in an authorized environment. In an authorized environment, the virtual machine is enabled to operate normally. In an unauthorized environment, the virtual machine is disabled. The disabled virtual machine gathers information about the unauthorized environment and transmits the information to the virtual machine owner.
40 Citations
14 Claims
-
1. A method for detecting an unauthorized use of a virtual machine, the method comprising:
-
storing a virtual machine on a physical machine, the virtual machine including a boot pointer, the boot pointer pointing to a locator code; booting the virtual machine; bypassing the locator code by adjusting the boot pointer if the virtual machine is in an authorized environment; and executing the locator code if the virtual machine is in an unauthorized environment, wherein the locator code gathers information indicative of the location of the unauthorized environment, and transmits a message including the information indicative of the location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus for detecting an unauthorized use of a virtual machine, the apparatus comprising:
-
a physical machine; the physical machine storing a virtual machine; at least one of the physical machine and the virtual machine storing a software program to cause the virtual machine to; point a boot pointer to a locator code; boot the virtual machine; bypass the locator code by adjusting the boot pointer if the virtual machine is in an authorized environment; and execute the locator code if the virtual machine is in an unauthorized environment, wherein the locator code gathers information indicative of the location of the unauthorized environment, and transmits a message including the information indicative of the location.
-
-
14. A computer readable media storing software instructions to detect an unauthorized use of a virtual machine, the software instructions causing a computing device to:
-
store a virtual machine on a physical machine, the virtual machine including a boot pointer; point the boot pointer to a locator code; boot the virtual machine; bypass the locator code by adjusting the boot pointer if the virtual machine is in an authorized environment; and execute the locator code if the virtual machine is in an unauthorized environment, wherein the locator code gathers information indicative of the location of the unauthorized environment, and transmits a message including the information indicative of the location.
-
Specification