TECHNIQUES FOR SECURING A CHECKED-OUT VIRTUAL MACHINE IN A VIRTUAL DESKTOP INFRASTRUCTURE
First Claim
1. A method for securing a checked-out guest virtual machine comprising:
- receiving a request for checking-out a guest virtual machine hosted by a server network element, wherein checking-out the guest virtual machine comprises transferring hosting of the guest virtual machine from the server network element to a client network element;
configuring a security module for the guest virtual machine in order to secure the guest virtual machine; and
providing the security module to the guest virtual machine when the guest virtual machine is checked-out.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for securing checked-out virtual machines in a virtual desktop infrastructure (VDI) are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for securing a checked-out guest virtual machine including receiving a request for checking-out a guest virtual machine hosted by a server network element, wherein checking-out the guest virtual machine comprises transferring hosting of the guest virtual machine from the server network element to a client network element. The method for securing a checked-out guest virtual machines may also include configuring a security module for the guest virtual machine in order to secure the guest virtual machine and providing the security module to the guest virtual machine when the guest virtual machine is checked-out.
-
Citations
20 Claims
-
1. A method for securing a checked-out guest virtual machine comprising:
-
receiving a request for checking-out a guest virtual machine hosted by a server network element, wherein checking-out the guest virtual machine comprises transferring hosting of the guest virtual machine from the server network element to a client network element; configuring a security module for the guest virtual machine in order to secure the guest virtual machine; and providing the security module to the guest virtual machine when the guest virtual machine is checked-out. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for securing a checked-out guest virtual machine comprising:
one or more processors communicatively coupled to a network;
wherein the one or more processors are configured to;receive a request for checking-out a guest virtual machine hosted by a server network element, wherein checking-out the guest virtual machine comprises transferring hosting of the guest virtual machine from the server network element to a client network element; configure a security module for the guest virtual machine in order to secure the guest virtual machine; and providing the security module to the guest virtual machine when the guest virtual machine is checked-out. - View Dependent Claims (17, 18, 19, 20)
Specification