Software appliance management using broadcast technique
First Claim
1. A method comprising:
- receiving a plurality of broadcasts comprising information identifying execution states and configurations associated with a plurality of virtual machines, each broadcast is from a client system of a plurality of client systems, wherein at least two of the plurality of virtual machines are installed on each of the plurality of client systems;
determining, by a processor, whether a first virtual machine of the plurality of virtual machines that is installed on a first client system of the plurality of client systems is associated with an unauthorized installation in view of an execution state associated with the first virtual machine and a configuration associated with a second virtual machine of the plurality of virtual machines; and
generating a control action for the first client system when the first virtual machine is determined to be associated with the unauthorized installation.
0 Assignments
0 Petitions
Accused Products
Abstract
Broadcasts identifying executed execution states and configurations of a plurality of virtual machines may be received. Each of the broadcasts may be received from a client system of a plurality of client systems. At least two of the virtual machines may be installed on each of the plurality of client systems. A determination may be made as to whether a first virtual machine of the plurality of virtual machines that is installed on a first client system of the plurality of client systems is unauthorized in view of an execution state of the first virtual machine and a configuration of a second virtual machine of the plurality of virtual machine. A control action for the first client system may be generated when the first virtual machine is determined to be unauthorized.
254 Citations
20 Claims
-
1. A method comprising:
-
receiving a plurality of broadcasts comprising information identifying execution states and configurations associated with a plurality of virtual machines, each broadcast is from a client system of a plurality of client systems, wherein at least two of the plurality of virtual machines are installed on each of the plurality of client systems; determining, by a processor, whether a first virtual machine of the plurality of virtual machines that is installed on a first client system of the plurality of client systems is associated with an unauthorized installation in view of an execution state associated with the first virtual machine and a configuration associated with a second virtual machine of the plurality of virtual machines; and generating a control action for the first client system when the first virtual machine is determined to be associated with the unauthorized installation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving a plurality of broadcasts comprising information identifying execution states and configurations associated with a plurality of containers, each broadcast is from a client system of a plurality of client systems, wherein at least two of the plurality of containers are installed on each of the plurality of client systems; determining, by a processor, whether a first container of the plurality of containers that is installed on a first client system of the plurality of client systems is associated with an unauthorized installation in view of an execution state associated with the first container and a configuration associated with a second container of the plurality of containers; and generating a control action for the first client system when the first container is determined to be associated with the unauthorized installation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving a plurality of broadcasts comprising information identifying execution states and configurations of a plurality of software instances, each broadcast is from a client system of a plurality of client systems, wherein at least two of the software instances are installed on each of the plurality of client systems; determining, by a processor, whether a first software instance of the plurality of software instances that is installed on a first client system of the plurality of client systems is unauthorized in view of an execution state of the first software instance and a configuration of a second software instance of the plurality of software instances; and generating a control action for the first client system when the first software instance is determined to be unauthorized. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification