发明申请
- 专利标题: Enhanced Secure Virtual Machine Provisioning
- 专利标题(中): 增强的安全虚拟机配置
-
申请号: US14399393申请日: 2012-05-24
-
公开(公告)号: US20150134965A1公开(公告)日: 2015-05-14
- 发明人: Fredric Morenius , Christian Gehrmann , András Méhes
- 申请人: Fredric Morenius , Christian Gehrmann , András Méhes
- 申请人地址: SE STOCKHOLM
- 专利权人: Telefonaktiebolaget L M Ericsson (publ)
- 当前专利权人: Telefonaktiebolaget L M Ericsson (publ)
- 当前专利权人地址: SE STOCKHOLM
- 国际申请: PCT/EP2012/059768 WO 20120524
- 主分类号: H04L29/06
- IPC分类号: H04L29/06 ; G06F9/455
摘要:
In a method of provisioning a virtual machine (VM) to a computing network (401), a VM manager or provisioner (403, 408) encrypts a virtual machine using a key bound to at least one security profile indicative of one or more security requirements that a computing resource (402) of the computing network (401) must satisfy in order to be able to decrypt the VM. A key for use in decrypting the VM has previously been sealed into multiple (and preferably into all) computing resources (402) in the network into which the VM is to be provisioned, and has been sealed such that a computing resource can obtain the key only if it is in a state that satisfies the security profile, or at least one security profile, to which the key is bound The VM manager or provisioner (403, 408) creates a VM launch package that includes the encrypted VM and that also includes a key that may be used in decrypting the encrypted VM. When the VM launch package is received at a computing resource (402), the computing resource will not be able to recover the key for use in decrypting the VM—and hence will be unable to decrypt the VM—unless the computing resource satisfies the security requirements indicated by the security profile. The VM manager or provisioner can thus be sure that the VM will not be launched on a computing resource that does not meet the desired security profile. Alternatively the VM manager or provisioner (403, 408) may send a token corresponding to a desired security profile with an encrypted VM. A computing resource uses the token to obtain a key to decrypt the VM but the computing resource will not be able to recover the key unless the computing resource satisfies the security requirements indicated by the token.
信息查询