VIRTUALIZATION OF CRYPTOGRAPHIC KEYS
First Claim
Patent Images
1. A computer program product for virtualizing cryptographic keys in a virtual computing environment having a hierarchy comprising a host and one or more layers of guests, wherein a layer corresponds to a virtualization level, the computer program product comprising:
- a non-transitory storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising;
obtaining, by a processor, a cryptographic key; and
generating a virtual cryptographic key using an operation, the cryptographic key and a mask, wherein the mask used is dependent on the virtualization level of a guest for which the virtual cryptographic key is being generated.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic key is virtualized to provide a virtual cryptographic key. To virtualize the key, an operation, such as an exclusive OR operation, is used with the key and a mask. The virtual key is usable by a guest of a virtual environment in cryptographic operations.
6 Citations
20 Claims
-
1. A computer program product for virtualizing cryptographic keys in a virtual computing environment having a hierarchy comprising a host and one or more layers of guests, wherein a layer corresponds to a virtualization level, the computer program product comprising:
a non-transitory storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising; obtaining, by a processor, a cryptographic key; and generating a virtual cryptographic key using an operation, the cryptographic key and a mask, wherein the mask used is dependent on the virtualization level of a guest for which the virtual cryptographic key is being generated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A computer system for virtualizing cryptographic keys in a virtual computing environment having a hierarchy comprising a host and one or more layers of guests, wherein a layer corresponds to a virtualization level, the computer system comprising:
-
a memory; and a processor in communications with the memory, wherein the computer system is configured to perform a method, said method comprising; obtaining a cryptographic key; and generating a virtual cryptographic key using an operation, the cryptographic key and a mask, wherein the mask used is dependent on the virtualization level of a guest for which the virtual cryptographic key is being generated. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method of virtualizing cryptographic keys in a virtual computing environment having a hierarchy comprising a host and one or more layers of guests, wherein a layer corresponds to a virtualization level, said method comprising:
-
obtaining, by a processor, a cryptographic key; and generating, by the processor, a virtual cryptographic key using an operation, the cryptographic key and a mask, wherein the mask used is dependent on the virtualization level of a guest for which the virtual cryptographic key is being generated. - View Dependent Claims (19, 20)
-
Specification