HANDOFF OF VIRTUAL MACHINES BASED ON SECURITY REQUIREMENTS
First Claim
1. A method of transitioning a virtual machine from a host computer to a target computer having a security key, the method comprising:
- the host computer transferring a security phrase to the target computer;
the target computer applying the security key to the security phrase to generate a security response and transferring the security response to the host computer; and
the host computer determining whether the target computer can support the virtual machine based on the security response from the target computer, and if the target computer is capable of supporting the virtual machine, then the host computer initiating a transition of the virtual machine from the host computer to the target computer.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer system transitions a virtual machine from a host computer to a target computer having a security key. The host computer transfers a security phrase to the target computer. The target computer applies the security key to the security phrase to generate a security response. That target computer transfers the security response to the host computer. The host computer determines whether the target computer can support the virtual machine based on the security response from the target computer. If the target computer is capable of supporting the virtual machine, then the host computer initiates a transition of the virtual machine from the host computer to the target computer. The determination of whether the target computer can support the virtual machine may be further based on resource availability, time-slice availability, and the other virtual machines executing on the target computer.
-
Citations
20 Claims
-
1. A method of transitioning a virtual machine from a host computer to a target computer having a security key, the method comprising:
-
the host computer transferring a security phrase to the target computer; the target computer applying the security key to the security phrase to generate a security response and transferring the security response to the host computer; and the host computer determining whether the target computer can support the virtual machine based on the security response from the target computer, and if the target computer is capable of supporting the virtual machine, then the host computer initiating a transition of the virtual machine from the host computer to the target computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system to transition a virtual machine from a host computer to a target computer having a security key, the computer system comprising:
-
the host computer configured to transfer a security phrase to the target computer; the target computer configured to apply the security key to the security phrase to generate a security response and transfer the security response to the host computer; and the host computer configured to determine whether the target computer can support the virtual machine based on the security response from the target computer, and if the target computer is capable of supporting the virtual machine, then the host computer is configured to initiate a transition of the virtual machine from the host computer to the target computer. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification