METHODS AND SYSTEMS FOR SECURING APPLIANCES FOR USE IN A CLOUD COMPUTING ENVIRONMENT
First Claim
1. A method of providing security independent of a cloud computing environment, comprising:
- identifying an appliance to be instantiated in the cloud computing environment, the appliance comprising at least one application;
securing access to the at least one application of the appliance; and
determining an access level for each user in a set of users, the access level representing an ability of each user to access the at least one application of the appliance.
1 Assignment
0 Petitions
Accused Products
Abstract
An originator of an appliance can independently secure the appliance for instantiation in the cloud, separate from the security level of the cloud. The originator can secure the appliance utilizing a secure rights application. The secure rights application can be configured to “wrap” an appliance in a security container. The security container can limit access to the applications and operating systems contained in the appliance, but allow the appliance to operate normally once instantiated in the cloud. The secure rights application can be configured to cryptographically secure the appliance in order limit the ability of unauthorized parties from accessing the components of the appliance while maintaining the functionality of the appliance.
311 Citations
23 Claims
-
1. A method of providing security independent of a cloud computing environment, comprising:
-
identifying an appliance to be instantiated in the cloud computing environment, the appliance comprising at least one application; securing access to the at least one application of the appliance; and determining an access level for each user in a set of users, the access level representing an ability of each user to access the at least one application of the appliance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for providing security independent of a cloud computing environment, comprising:
-
a network interface to at least one cloud computing environment; and a secure rights application, executing on a computer processing system and communicating with the network interface, the secure rights application being configured to identify an appliance to be instantiated in the cloud computing environment, the appliance comprising at least one application; secure access to the at least one application of the appliance; and determine an access level for each user in a set of users, the access level representing an ability of each user to access the at least one application of the appliance. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A secure rights application, the secure rights application being embodied in a computer readable storage medium on a computer processing system and comprising instructions for causing the computer processing system to perform a method comprising:
-
identifying an appliance to be instantiated in the cloud computing environment, the appliance comprising at least one application; securing access to the at least one application of the appliance; and determining an access level for each user in a set of users, the access level representing an ability of each user to access the at least one application of the appliance. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
Specification