Methods and apparatus for locating an unauthorized virtual machine
First Claim
Patent Images
1. A method for detecting an unauthorized use of a virtual machine, the method comprising:
- storing a virtual machine on a physical machine at a first time, the virtual machine including a boot pointer, the boot pointer pointing to a locator code at the first time; and
starting a boot process of booting the virtual machine at a second time after the first time, the boot process including at least one of;
responsive to the virtual machine being in an authorized environment, which exists when the physical machine and the virtual machine are both registered with a management system and associated with each other by the management system, which manages at least one physical machine and at least one virtual machine, bypassing the locator code, at a third time after the second time, by adjusting the boot pointer, from pointing to the locator code, to pointing to a boot code of the virtual machine, andresponsive to the virtual machine being in an unauthorized environment, which exists when the virtual machine is not in an authorized environment, executing the locator code, at a fourth time after the second time, wherein the locator code gathers information indicative of a location of the unauthorized environment, and transmits a message including the information indicative of the location.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus of locating an unauthorized virtual machine are disclosed. A virtual machine is registered with a management system. When the virtual machine is requested to start, the system determines whether the virtual machine is in an authorized environment. In an authorized environment, the virtual machine is enabled to operate normally. In an unauthorized environment, the virtual machine is disabled. The disabled virtual machine gathers information about the unauthorized environment and transmits the information to the virtual machine owner.
125 Citations
14 Claims
-
1. A method for detecting an unauthorized use of a virtual machine, the method comprising:
-
storing a virtual machine on a physical machine at a first time, the virtual machine including a boot pointer, the boot pointer pointing to a locator code at the first time; and starting a boot process of booting the virtual machine at a second time after the first time, the boot process including at least one of; responsive to the virtual machine being in an authorized environment, which exists when the physical machine and the virtual machine are both registered with a management system and associated with each other by the management system, which manages at least one physical machine and at least one virtual machine, bypassing the locator code, at a third time after the second time, by adjusting the boot pointer, from pointing to the locator code, to pointing to a boot code of the virtual machine, and responsive to the virtual machine being in an unauthorized environment, which exists when the virtual machine is not in an authorized environment, executing the locator code, at a fourth time after the second time, wherein the locator code gathers information indicative of a location of the unauthorized environment, and transmits a message including the information indicative of the location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus for detecting an unauthorized use of a virtual machine, the apparatus comprising:
-
a physical machine; the physical machine storing a virtual machine at a first time; at least one of the physical machine and the virtual machine storing a software program to cause the virtual machine to; point a boot pointer to a locator code at the first time; start a boot process of booting the virtual machine at a second time after the first time, the boot process including at least one of; responsive to the virtual machine being in an authorized environment, which exists when the physical machine and the virtual machine are both registered with a management system and associated with each other by the management system, which manages at least one physical machine and at least one virtual machine, bypass the locator code, at a third time after the second time, by adjusting the boot pointer, from pointing to the locator code, to pointing to a boot code of the virtual machine, and responsive to the virtual machine being in an unauthorized environment, which exists when the virtual machine is not in an authorized environment, execute the locator code, at a fourth time after the second, wherein the locator code gathers information indicative of a location of the unauthorized environment, and transmits a message including the information indicative of the location.
-
-
14. A non-transitory computer readable media storing software instructions to detect an unauthorized use of a virtual machine, the software instructions causing a computing device to:
-
store a virtual machine on a physical machine at a first time, the virtual machine including a boot pointer; point the boot pointer to a locator code at the first time; start a boot process of booting the virtual machine at a second time after the first time, the boot process including at least one of; responsive to the virtual machine being in an authorized environment, which exists when the physical machine and the virtual machine are both registered with a management system and associated with each other by the management system, which manages at least one physical machine and at least one virtual machine, bypass the locator code, at a third time after the second time, by adjusting the boot pointer, from pointing to the locator code, to pointing to a boot code of the virtual machine, and responsive to the virtual machine being in an unauthorized environment, which exists when the virtual machine is not in an authorized environment, execute the locator code, at a fourth time after the second time, wherein the locator code gathers information indicative of a location of the unauthorized environment, and transmits a message including the information indicative of the location.
-
Specification