SYSTEMS AND METHODS FOR SECURING AND RESTORING VIRTUAL MACHINES
First Claim
Patent Images
1. A method for securing a virtual machine, comprising:
- executing a virtual machine on a host device, the virtual machine comprising virtual machine files;
generating data parsing information, wherein the data parsing information is usable to determine into which of a plurality of shares a portion of the virtual machine files will be placed and how the portion will be encrypted;
in response to receiving a command to stop the virtual machine;
generating the plurality of shares based on the data parsing information;
causing each of the plurality of shares to be stored in respective separate storage locations;
wherein the virtual machine files are restorable by accessing a threshold number of the plurality of shares.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for securing a virtual machine by causing a plurality of shares of virtual machine files to be separately stored in response to a stop command. Systems and methods are also provided for restoring a data set with a cryptographic restoration application in response to a series of user inputs received when no visual indicator of the cryptographic restoration algorithm is displayed, and for restoring a data set with data shares received from another computer device in response to detecting a communication link with the device.
124 Citations
56 Claims
-
1. A method for securing a virtual machine, comprising:
-
executing a virtual machine on a host device, the virtual machine comprising virtual machine files; generating data parsing information, wherein the data parsing information is usable to determine into which of a plurality of shares a portion of the virtual machine files will be placed and how the portion will be encrypted; in response to receiving a command to stop the virtual machine; generating the plurality of shares based on the data parsing information; causing each of the plurality of shares to be stored in respective separate storage locations; wherein the virtual machine files are restorable by accessing a threshold number of the plurality of shares. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer system for securing a virtual machine, comprising:
-
processing circuitry in communication with one or more storage locations, the processing circuitry being associated with communications circuitry for receiving communications, the processing circuitry being configured to; execute a virtual machine on a host device, the virtual machine comprising virtual machine files; generate data parsing information, wherein the data parsing information is usable to determine into which of a plurality of shares a portion of the virtual machine files will be placed and how the portion will be encrypted; in response to receiving a command to stop the virtual machine; generate the plurality of shares based on the data parsing information; cause each of the plurality of shares to be stored in respective separate storage locations; wherein the virtual machine files are restorable by accessing a threshold number of the plurality of shares. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
Specification