System, method and computer program product for performing a security or maintenance operation in association with virtual disk data
First Claim
Patent Images
1. A method comprising the steps of:
- identifying a virtual disk that is associated with a virtual machine, without employing the virtual machine;
parsing the virtual disk without employing the virtual machine;
providing read and write access to the virtual disk at a file level or sector level;
identifying one or more registry files on the virtual disk, where one or more of the identified registry files are associated with the virtual machine;
providing read and write access to one or more of the identified registry files that are associated with the virtual machine, such read and write access to a registry file being provided to software outside of the virtual machine; and
using the read or write access to a registry file in order to perform security operations for the benefit of the virtual machine without employing the virtual machine.
12 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided for performing a security or maintenance operation in association with virtual disk data accessed independent of a virtual machine. In use, data stored on a virtual disk is accessed at least in part independent of a virtual machine. Further, a security or maintenance operation is performed in association with the accessed data.
30 Citations
19 Claims
-
1. A method comprising the steps of:
-
identifying a virtual disk that is associated with a virtual machine, without employing the virtual machine; parsing the virtual disk without employing the virtual machine; providing read and write access to the virtual disk at a file level or sector level; identifying one or more registry files on the virtual disk, where one or more of the identified registry files are associated with the virtual machine; providing read and write access to one or more of the identified registry files that are associated with the virtual machine, such read and write access to a registry file being provided to software outside of the virtual machine; and using the read or write access to a registry file in order to perform security operations for the benefit of the virtual machine without employing the virtual machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. In a computer system comprising a virtual machine and virtual disk associated with an operating system that is not part of the virtual machine, a method comprising the steps of:
-
Employing a security application, associated with the operating system and not part of the virtual machine, to pack sectors of the virtual disk into a container file; Causing data in the container file to appear as a disk full of sectors to enable display of such data as part of a hierarchical file system; and Using the security application to construct a virtual registry and cause the virtual registry and the hierarchical file system to appear local on the virtual disk from the perspective of the virtual machine.
-
-
13. A computer system for performing security operation:
-
a virtual computer; a scanner residing on a first computer platform and not part of the virtual computer, the scanner capable of performing security scanning on data; a physical disk comprising a virtual disk in a partition of the physical disk, which resides on a second computer platform; the virtual computer being coupled to the virtual disk; and a communicative coupling between the scanner and the physical disk, such communicative coupling providing access to the virtual disk without employing the virtual computer. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification