Authentication of solution topology
First Claim
1. A computer program product for verifying an integrity of a solution, the computer program product comprising:
- a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising;
computer readable program code configured to hash a set of virtual machine instances in a solution topology of the solution;
computer readable program code configured to hash a set of connections in the solution topology, the set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof;
computer readable program code configured to hash a set of solution-specific information;
computer readable program code configured to sign the hashes to create a first signed topology;
computer readable program code configured to incorporate the first signed topology into a solution registry that is a hierarchical database that stores configuration settings and options for the solution of the first signed topology, wherein the solution registry includes solution metadata, and wherein the solution metadata include a name of the set of virtual machine instances in the solution, a description of the solution, and a unique identifier of the solution; and
computer readable program code configured to sign the solution registry incorporating the first signed topology and to sign the solution metadata included in the solution registry.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology.
-
Citations
25 Claims
-
1. A computer program product for verifying an integrity of a solution, the computer program product comprising:
-
a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising; computer readable program code configured to hash a set of virtual machine instances in a solution topology of the solution; computer readable program code configured to hash a set of connections in the solution topology, the set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof; computer readable program code configured to hash a set of solution-specific information; computer readable program code configured to sign the hashes to create a first signed topology; computer readable program code configured to incorporate the first signed topology into a solution registry that is a hierarchical database that stores configuration settings and options for the solution of the first signed topology, wherein the solution registry includes solution metadata, and wherein the solution metadata include a name of the set of virtual machine instances in the solution, a description of the solution, and a unique identifier of the solution; and computer readable program code configured to sign the solution registry incorporating the first signed topology and to sign the solution metadata included in the solution registry. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer comprising:
-
a storage having computer readable program code embodied therewith for verifying an integrity of a solution; a bus connecting the storage to a processor; and a processor, wherein the processor executes the computer readable program code;
to hash a set of virtual machine instances in a solution topology of the solution;
to hash a set of connections in the solution topology, the set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof;
to hash a set of solution-specific information;
to sign the hashes to create a first signed topology;
to incorporate the first signed topology into a solution registry that is a hierarchical database that stores configuration settings and options for the solution of the first signed topology, wherein the solution registry includes solution metadata, and wherein the solution metadata include a name of the set of virtual machine instances in the solution, a description of the solution, and a unique identifier of the solution; and
to sign the solution registry incorporating the first signed topology and to sign the solution metadata included in the solution registry. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer implemented method to verify an integrity of a solution, the computer implemented method comprising:
-
hashing, by a computer, a set of virtual machine instances in a solution topology of the solution; hashing, by the computer, a set of connections in the solution topology, the set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof; hashing, by the computer, a set of solution-specific information; signing, by the computer, the hashes to create a first signed topology; incorporating, by the computer, the first signed topology into a solution registry that is a hierarchical database that stores configuration settings and options for the solution of the first signed topology, wherein the solution registry includes solution metadata, and wherein the solution metadata include a name of the set of virtual machine instances in the solution, a description of the solution, and a unique identifier of the solution; and signing, by the computer, the solution registry incorporating the first signed topology and to sign the solution metadata included in the solution registry. - View Dependent Claims (22, 23, 24, 25)
-
Specification