The assignee for this patent application is
Reporters obtained the following quote from the background information supplied by the inventors: "The present disclosure relates to computer systems, and in particular to managing access to resources of computer systems, such as in virtualized computer environments.
"Virtualized computer environments, also referred to as cloud computer systems, are used to provide computer resources to end users. In a cloud computer environment, the physical hardware configuration is hidden from the end user. Cloud computer systems may include servers, network storage devices, routers, gateways, communication links, and other devices. However, because the physical hardware and software platforms on which cloud computer system is implemented are hidden within a 'cloud,' they can be managed, upgraded, replaced or otherwise changed by a system administrator without the customer being aware of or affected by the change.
"In a typical cloud computer environment, applications may be executed on virtual machines, which are isolated guest operating systems installed within a host system. Virtual machines are typically implemented with software emulation, hardware virtualization, or both. A single hardware and/or software platform may host a number of virtual machines, each of which may have access to some portion of the platform's resources, such as program code processing resources, storage resources, display resources, communication interfaces, etc.
"Because cloud computing treats computer resources as remote services that are accessed by customers, and because the actual physical resources that are used to implement a cloud computing environment may be accessed by many different customers, security is an important aspect of cloud computing."
In addition to obtaining background information on this patent application, VerticalNews editors also obtained the inventors' summary information for this patent application: "Some embodiments disclosed herein are directed to a computer system that includes a host operating system and a virtual hypervisor that operates under management of the host operating system to control operations of virtual machines operating under management of the virtual hypervisor. The virtual hypervisor provides an interface between the virtual machines and the host operating system. A signing component generates digital signatures which identify owners of the virtual machines and associates the digital signatures with the virtual machines. A signature validation component determines the owners of the virtual machines using the digital signatures and responsive to occurrence of defined events.
"Some other embodiments disclosed herein are directed to a method of operating a computer system that includes a plurality of virtual machines that are managed by a virtual hypervisor. Digital signatures are generated which identify owners of the virtual machines. The digital signatures are associated with the virtual machines. Owners of the virtual machines are determined using the associated digital signatures responsive to occurrence of defined events.
"Some other embodiments disclosed herein are directed to a computer program product for operating a computer system that includes a plurality of virtual machines that are managed by a virtual hypervisor. The computer program product includes a computer readable storage medium having computer readable program code embodied in the medium. The computer readable program code comprises computer readable program code configured to generate digital signatures which identify owners of the virtual machines, computer readable program code configured to associate the digital signatures with the virtual machines, and computer readable program code configured to determine the owners of the virtual machines using the associated digital signatures and responsive to occurrence of defined events.
"It is noted that aspects described with respect to one embodiment may be incorporated in different embodiments although not specifically described relative thereto. That is, all embodiments and/or features of any embodiments can be combined in any way and/or combination. Moreover, other systems, methods, and/or computer program products according to embodiments will be or become apparent to one with skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, and/or computer program products be included within this description and protected by the accompanying claims.
BRIEF DESCRIPTION OF THE DRAWINGS
"The accompanying drawings illustrate various embodiments of the invention, and are incorporated herein and constitute a part of this application. In the drawings:
"FIG. 1 is a block diagram of a virtualized computer environment that manages access by virtual machines to resources of a computer system using digital signatures;
"FIG. 2 illustrates a distributed computer environment that manages access to resources using digital signatures according to some embodiments; and
"FIGS. 3-10 are flowcharts that illustrate methods and operations for generating digital signatures for owners of virtual machines, associating the digital signatures with the virtual machines, and managing the virtual machines responsive to the digital signatures according to some embodiments."
For more information, see this patent application: Shimoni,
Keywords for this news article include:
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- Chobani Counters Competition With Expanded Lineup
- What to Expect From an Amazon Smartphone
- Clinton Sought GOP Support for Health Plan
- Saucedo Mercer Running on Empty in Arizona
- Spring Salmon Return to San Joaquin
- Auto Parts Plant Opening in Pa., Jobs on Tap
- IPO Market Shows Signs of Settling Down to Earth
- Pakistan Library Dedicated to 'Osama bin Laden, the Martyr'
- 'Beige Book' Federal Reserve Survey, April 2014: Full Text
- Venture Investments in U.S. Highest Since 2001