Virtualized Host ID Key Sharing
First Claim
Patent Images
1. A method of sharing a virtualized host access key, comprising:
- having a first host, operable to access a resource upon being authorized and whereby the authorization includes determining that a first host key associated with the identity of the host is associated with a license repository;
creating a second host with a second host key;
copying the first host key and license repository to a second host;
receiving by the second host a request to access the resource;
denying the request to access the resource by the second host until the second host has been authorized; and
authorizing the second host to access the resource upon (a) determining that the second host key is associated with a known system identifier of the second host, (b) determining that the second host has the first host key, and (c) determining the first host key is associated with the license repository copied to the second host.
9 Assignments
0 Petitions
Accused Products
Abstract
In virtualized environments a method of determining authorization to a resource cannot use a hardware specific identifier, such as a MAC address. As a result upgrading a virtual host may cause licenses associated with that host to be invalid, even though the upgraded virtual host should be authorized. Authentication methods and systems are disclosed such that a key may be shared with a second host along with a license file and, provided at least the second host has a key associated with its system identifier and a key associated with a license file, access to a licensed resource may be authorized.
15 Citations
20 Claims
-
1. A method of sharing a virtualized host access key, comprising:
-
having a first host, operable to access a resource upon being authorized and whereby the authorization includes determining that a first host key associated with the identity of the host is associated with a license repository; creating a second host with a second host key; copying the first host key and license repository to a second host; receiving by the second host a request to access the resource; denying the request to access the resource by the second host until the second host has been authorized; and authorizing the second host to access the resource upon (a) determining that the second host key is associated with a known system identifier of the second host, (b) determining that the second host has the first host key, and (c) determining the first host key is associated with the license repository copied to the second host. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a first host image, further comprising; a first host system identifier; a first host key; a first license repository; and a resource, accessible to the first host with authorization; a second host, further comprising; a second host system identifier; and a second host key; a copying mechanism, operable to; access the first host image and the second host; copy the first host key, from the first host image, to the second host; and copy the first license repository, from the first host image, to the second host; and an access controller, operable to authorize access to at least one of the first host and second host. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method of managing access to a resource in a computing system, comprising:
-
receiving a request to access the resource on a host; and granting access to the resource by the host upon determining, (a) the host has a first key in accord with a record in a license repository and (b) the host has a second key in accord with a system identifier of the host. - View Dependent Claims (19, 20)
-
Specification