Secure virtual machine
First Claim
Patent Images
1. A method, comprising:
- initiating operation of a virtual machine on a computing device, wherein a user cannot access a user interface of the virtual machine until after a virtual private network is established;
sending a token from the computing device to the virtual machine, wherein the token is used to connect the computing device to the virtual machine;
establishing the virtual private network between the virtual machine and a network node using the token; and
launching the user interface of the virtual machine on the computing device after the virtual private network has been established.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments pertain to computing devices and virtual machines. In particular, various embodiments relate to the start-up, operation, and communication of virtual machines. A method includes initiating operation of a virtual machine on a computing device, and sending a token from the computing device to a virtual machine, where the token is used to connect the computing device and the virtual machine. The method also includes establishing a virtual private network between the virtual machine and a network node using the token, and launching a user interface of the virtual machine on the computing device after the virtual private network has been established.
-
Citations
38 Claims
-
1. A method, comprising:
-
initiating operation of a virtual machine on a computing device, wherein a user cannot access a user interface of the virtual machine until after a virtual private network is established; sending a token from the computing device to the virtual machine, wherein the token is used to connect the computing device to the virtual machine; establishing the virtual private network between the virtual machine and a network node using the token; and launching the user interface of the virtual machine on the computing device after the virtual private network has been established. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising:
-
at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to; initiate operation of a virtual machine on a computing device, wherein a user cannot access a user interface of the virtual machine until after a virtual private network is established; send a token from the computing device to the virtual machine, wherein the token is used to connect the computing device to the virtual machine; establish the virtual private network between the virtual machine and a network node using the token; and launch the user interface of the virtual machine on the computing device after the virtual private network has been established. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
receiving a token initiating operation of a virtual machine, wherein a user cannot access a user interface of the virtual machine until after a virtual private network is established; establishing the virtual private network between the virtual machine and a network node using the token before displaying the user interface to the virtual machine on the computing device; and communicating with the virtual machine. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. An apparatus comprising:
-
at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to; receive a token initiating operation of a virtual machine, wherein a user cannot access a user interface of the virtual machine until after a virtual private network is established; establish the virtual private network between the virtual machine and a network node using the token before displaying the user interface to the virtual machine on the computing device; and communicate with the virtual machine. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38)
-
Specification