×

Verifying Applications in Virtual Environments Using a Trusted Security Zone

  • US 9,208,339 B1
  • Filed: 08/12/2013
  • Issued: 12/08/2015
  • Est. Priority Date: 08/12/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of transmitting information between virtual environments comprising:

  • copying a first virtual environment, wherein the first virtual environment comprises a plurality of original applications, a first clock, and a first trusted security zone, wherein the first trusted security zone comprises a verification application and a nonce application;

    subsequently, creating a second virtual environment, wherein the second virtual environment comprises a copy of at least some applications of the plurality of original applications, a second clock, and a second trusted security zone;

    receiving, by the verification application residing in the first trusted security zone, from a copied application, a request for a transmission with an original application of the plurality of the original applications;

    determining, by the verification application residing in the first trusted security zone, if a nonce associated with the copied application is a verified nonce, wherein the nonce comprises a clock value of the second clock and a time stamp, and wherein determining if the nonce is a verified nonce comprises;

    comparing, by the verification application residing in the first trusted security zone, at least the clock value of the nonce to a clock value of the first clock; and

    determining, by the first trusted security zone, if the clock value of the nonce correlates sufficiently to the clock value of the first clock; and

    at least one of;

    granting, in response to a determination that the clock value of the nonce correlates sufficiently to the clock value of the first clock, the request, and sending the requested transmission from the first trusted security zone to the second trusted security zone;

    ordenying, in response to a determination that the clock value of the nonce does not correlate sufficiently to the clock value of the first clock, the request.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×