×

Implementation of secure communications in a support system

  • US 9,037,511 B2
  • Filed: 09/29/2011
  • Issued: 05/19/2015
  • Est. Priority Date: 09/29/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing secure communications, comprising:

  • under the control of one or more computer systems configured with executable instructions,receiving, by a hypervisor, a set of cryptographic credentials associated with a guest operating system from a certificate store, wherein the set of cryptographic credentials comprises a Transport Layer Security (TLS) certificate;

    using, by the hypervisor on behalf of the guest operating system, the set of cryptographic credentials to establish a secure connection to a computing device using a secure protocol, in response to a request for the secure connection by the computing device, the request directed to the guest operating system among a set of guest operating systems supported by the hypervisor, the hypervisor acting as a local endpoint of the secure connection using the set of credentials;

    receiving, by the hypervisor, one or more outgoing messages from the guest operating system to the computing device;

    encrypting, by the hypervisor on behalf of the guest operating system using the secure protocol and the set of cryptographic credentials, the one or more outgoing messages from the guest operating system to the computing device, the one or more outgoing messages becoming one or more outgoing encrypted messages;

    sending, by the hypervisor, the one or more outgoing encrypted messages to the computing device using the secure protocol;

    receiving, by the hypervisor, one or more incoming encrypted messages from the computing device;

    decrypting, by the hypervisor on behalf of the guest operating system using the secure protocol and the set of cryptographic credentials, the one or more incoming encrypted messages from the computing device becoming one or more incoming decrypted messages; and

    sending the one or more incoming decrypted messages to the guest operating system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×