Locating an unauthorized virtual machine and bypassing locator code by adjusting a boot pointer of a managed virtual machine in authorized environment
First Claim
Patent Images
1. A method for detecting an unauthorized use of a virtual machine, the method comprising:
- storing a virtual machine on a physical machine at a first time, the virtual machine including a boot pointer, the boot pointer pointing to a locator code;
booting the virtual machine at a second time after the first time;
bypassing the locator code, at a third time after the second time, by adjusting the boot pointer to point from the locator code to a boot code of the virtual machine if the virtual machine is in an authorized environment, which exists when the physical machine and the virtual machine are both registered with a management system and associated with each other by the management system, which manages at least one physical machine and at least one virtual machine; and
executing the locator code, at a fourth time after the second time, if the virtual machine is in an unauthorized environment, which exists when the virtual machine is not in an authorized environment, wherein the locator code gathers information indicative of a location of the unauthorized environment, and transmits a message including the information indicative of the location.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus of locating an unauthorized virtual machine are disclosed. A virtual machine is registered with a management system. When the virtual machine is requested to start, the system determines whether the virtual machine is in an authorized environment. In an authorized environment, the virtual machine is enabled to operate normally. In an unauthorized environment, the virtual machine is disabled. The disabled virtual machine gathers information about the unauthorized environment and transmits the information to the virtual machine owner.
77 Citations
14 Claims
-
1. A method for detecting an unauthorized use of a virtual machine, the method comprising:
-
storing a virtual machine on a physical machine at a first time, the virtual machine including a boot pointer, the boot pointer pointing to a locator code; booting the virtual machine at a second time after the first time; bypassing the locator code, at a third time after the second time, by adjusting the boot pointer to point from the locator code to a boot code of the virtual machine if the virtual machine is in an authorized environment, which exists when the physical machine and the virtual machine are both registered with a management system and associated with each other by the management system, which manages at least one physical machine and at least one virtual machine; and executing the locator code, at a fourth time after the second time, if the virtual machine is in an unauthorized environment, which exists when the virtual machine is not in an authorized environment, wherein the locator code gathers information indicative of a location of the unauthorized environment, and transmits a message including the information indicative of the location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus for detecting an unauthorized use of a virtual machine, the apparatus comprising:
-
a physical machine; the physical machine storing a virtual machine; at least one of the physical machine and the virtual machine storing a software program to cause the virtual machine to; point a boot pointer of the virtual machine to a locator code at a first time; boot the virtual machine at a second time after the first time; bypass the locator code, at a third time after the second time, by adjusting the boot pointer from pointing to the locator code to point to a boot code of the virtual machine if the virtual machine is in an authorized environment, which exists when the physical machine and the virtual machine are both registered with a management system and associated with each other by the management system, which manages at least one physical machine and at least one virtual machine; and execute the locator code, at a fourth time after the second time, if the virtual machine is in an unauthorized environment, which exists when the virtual machine is not in an authorized environment, wherein the locator code gathers information indicative of a location of the unauthorized environment, and transmits a message including the information indicative of the location.
-
-
14. A non-transitory computer readable media storing software instructions to detect an unauthorized use of a virtual machine, the software instructions causing a computing device to:
-
store a virtual machine on a physical machine at a first time, the virtual machine including a boot pointer; point the boot pointer to a locator code; boot the virtual machine at a second time after the first time; bypass the locator code, at a third time after the second time, by adjusting the boot pointer from pointing to the locator code to point to a boot code of the virtual machine if the virtual machine is in an authorized environment, which exists when the physical machine and the virtual machine are both registered with a management system and associated with each other by the management system, which manages at least one physical machine and at least one virtual machine; and execute the locator code, at a fourth time after the second time, if the virtual machine is in an unauthorized environment, which exists when the virtual machine is not in an authorized environment, wherein the locator code gathers information indicative of a location of the unauthorized environment, and transmits a message including the information indicative of the location.
-
Specification