TECHNIQUES FOR IDENTITY AUTHENTICATION OF VIRTUALIZED MACHINES
First Claim
Patent Images
1. A machine-implemented method for authenticating a virtual machine (VM), comprising:
- receiving a request by the VM to install on a machine;
acquiring from the machine identity information that is specific to the machine in order to create an identify for the machine; and
authenticating the VM and the identity and then executing policy before authorizing the request and permitting the VM to install on the machine.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for identity authentication of Virtual Machines (VM'"'"'s) are provided. A VM is authenticated and once authenticated, each device interfaced to or accessible to the VM is also authenticated. When both the VM and each device are authenticated, the VM is granted access to a machine for installation thereon.
86 Citations
25 Claims
-
1. A machine-implemented method for authenticating a virtual machine (VM), comprising:
-
receiving a request by the VM to install on a machine; acquiring from the machine identity information that is specific to the machine in order to create an identify for the machine; and authenticating the VM and the identity and then executing policy before authorizing the request and permitting the VM to install on the machine. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
identifying a virtual machine (VM) operating system (OS) attempting to install within a VM; requesting that the VM OS be authenticated by an identity service; authenticating an identity of the VM OS and each device interfaced to the VM; and granting the VM OS access to one or more VM drivers that permit the VM OS to install within the VM when the VM OS, the identity of the VM OS, and each device has been authenticated. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A machine-implemented system, comprising:
-
an identity service implemented in a machine-accessible and computer-readable storage medium and to process on a machine of a network; and a Virtual Machine (VM) server implemented in a machine-accessible and computer-readable storage medium and to process on the machine or an entirely different machine of the network; wherein the VM server identifies an attempt by a VM operating system (OS) to install on a VM and consults the identity service to authenticate the VM OS and each device interfaced to the VM and when the VM OS and each device are successfully authenticated by the identity service the VM server gives the VM OS access to VM drivers that permit the VM OS to install on the VM. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A machine-implemented system, comprising:
-
an authentication service implemented in a machine-accessible and computer-readable storage medium and to process on a machine of a network; and a VM implemented in a machine-accessible and computer-readable storage medium and to process on the machine or a different machine of the network; wherein the VM detects when a VM operating system (OS) attempts to install within the VM, and wherein the VM consults the authentication service to authenticate the VM OS and supply a unique VM OS identity, and wherein the VM interrogates each device associated with the VM for unique identifying information and authenticates each device in response to its unique identifying information, and the VM provides the VM OS access to VM drivers that permit the VM OS to install within the VM when the VM OS is successfully authenticated and when each device is successfully authenticated. - View Dependent Claims (22, 23, 24, 25)
-
Specification