×

Techniques for establishing a trusted cloud service

  • US 8,813,192 B2
  • Filed: 05/04/2011
  • Issued: 08/19/2014
  • Est. Priority Date: 05/04/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • obtaining, by an ad hoc and untrusted service deployer executing on one or more processors, an environment specification for a target environment that is un-trusted, the environment specification obtained within a trusted environment;

    creating, by the ad hoc and untrusted service deployer, a package to include;

    certificates, a service image for a migrating service that is migrating to the target environment, a service identifier for the migrating service, and a package identifier for the package;

    establishing, by the ad hoc and untrusted service deployer, trust configuration information for the target environment having a trust configuration identifier;

    including, by the ad hoc and untrusted service deployer, the trust configuration information in the package;

    sending, by the ad hoc and untrusted service deployer, the package to a target service in the target environment for deployment of an instance of the migrating service, via the service image, within a created sub environment of the target environment that establishes trust with the trusted environment by processing components of the package;

    authenticating, by the ad hoc and untrusted service deployer, the target service via information received back from the target service from the target environment and acquired by the target service from the package;

    providing, by the ad hoc and untrusted service deployer, the target service a setup trust service for use in establishing the sub environment;

    receiving, by the ad hoc and untrusted service deployer, a request from a sub environment service created with the sub environment to establish trust with the trusted environment; and

    authenticating, by the ad hoc and untrusted service deployer, the sub environment as being trusted with the trusted environment based on interactions with the sub environment service.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×