×

Authentication of solution topology

  • US 8,954,760 B2
  • Filed: 01/03/2013
  • Issued: 02/10/2015
  • Est. Priority Date: 12/21/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer program product for verifying an integrity of a solution, the computer program product comprising:

  • a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising;

    computer readable program code configured to hash a set of virtual machine instances in a solution topology of the solution;

    computer readable program code configured to hash a set of connections in the solution topology, the set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof;

    computer readable program code configured to hash a set of solution-specific information;

    computer readable program code configured to sign the hashes to create a first signed topology;

    computer readable program code configured to incorporate the first signed topology into a solution registry that is a hierarchical database that stores configuration settings and options for the solution of the first signed topology, wherein the solution registry includes solution metadata, and wherein the solution metadata include a name of the set of virtual machine instances in the solution, a description of the solution, and a unique identifier of the solution; and

    computer readable program code configured to sign the solution registry incorporating the first signed topology and to sign the solution metadata included in the solution registry.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×