VIRTUALIZED HOST ID KEY SHARING
2 Assignments
0 Petitions
Accused Products
Abstract
In virtualized environments a method of determining authorization to a resource cannot use a hardware specific identifier, such as a MAC address. As a result upgrading a virtual host may cause licenses associated with that host to be invalid, even though the upgraded virtual host should be authorized. Authentication methods and systems are disclosed such that a key may be shared with a second host along with a license file and, provided at least the second host has a key associated with its system identifier and a key associated with a license file, access to a licensed resource may be authorized.
5 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method of managing access to a resource in a computing system, comprising:
-
receiving a request to access the resource on a host, wherein the host is configured to provide a virtualized computing environment; and accessing a license repository; determining whether a first host key has a corresponding record in the license repository; determining whether the host has a second host key in accord with a system identifier of the host; and granting access to the resource by the host upon determining, (a) the host has the first host key in accord with the record in the license repository and (b) the host has the second host key in accord with the system identifier of the host. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A system of managing access to a resource in a computing system, comprising control circuitry configured to:
-
receive a request to access the resource on a host, wherein the host is configured to provide a virtualized computing environment; and access a license repository; determine whether a first host key has a corresponding record in the license repository; determine whether the host has a second host key in accord with a system identifier of the host; and grant access to the resource by the host upon determining, (a) the host has the first host key in accord with the record in the license repository and (b) the host has the second host key in accord with the system identifier of the host. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
-
37. A non-transitory computer-readable medium with instructions encoded thereon for managing access to a resource in a computing system, the instructions comprising:
-
an instruction for receiving a request to access the resource on a host, wherein the host is configured to provide a virtualized computing environment; and an instruction for accessing a license repository; an instruction for determining whether a first host key has a corresponding record in the license repository; an instruction for determining whether the host has a second host key in accord with a system identifier of the host; and an instruction for granting access to the resource by the host upon determining, (a) the host has the first host key in accord with the record in the license repository and (b) the host has the second host key in accord with the system identifier of the host. - View Dependent Claims (38, 39, 40)
-
Specification