Trusted execution environment virtual machine cloning
    3.
    发明授权
    Trusted execution environment virtual machine cloning 有权
    可信执行环境虚拟机克隆

    公开(公告)号:US08954965B2

    公开(公告)日:2015-02-10

    申请号:US13566250

    申请日:2012-08-03

    IPC分类号: G06F9/455

    CPC分类号: G06F21/53

    摘要: Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.

    摘要翻译: 克隆具有可信执行环境的虚拟机,例如基于软件的可信平台模块。 为了克隆虚拟机,将复制源虚拟机的虚拟机状态以制定与目标虚拟机相关联的目标虚拟机状态。 目标虚拟机是源虚拟机状态的克隆,因此受信任执行环境的存储层次结构对于源虚拟机状态和目标虚拟机状态中的受信任执行环境可能相同。 然而,由于目标虚拟机的身份与源虚拟机的身份不同,所以目标虚拟机状态的认可层级被改变,使得其基于目标虚拟机的身份而不是源虚拟机 机。

    Network based management of protected data sets
    4.
    发明授权
    Network based management of protected data sets 有权
    基于网络的受保护数据集管理

    公开(公告)号:US08782423B2

    公开(公告)日:2014-07-15

    申请号:US13527439

    申请日:2012-06-19

    IPC分类号: G06F3/06

    摘要: A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected data set that is not readable outside of the system, and perhaps not even readable outside of the account. The particular data set corresponds to a particular entity assigned to the particular account and that includes keys corresponding to the particular entity. A security processor uses at least some of the plurality of keys to perform cryptographic processes in response to one or more trusted execution environment commands received from the particular entity.

    摘要翻译: 包括配置为维护受保护的帐户的帐户管理模块的系统。 例如,特定受保护的帐户包括在系统之外不可读的受保护的数据集,甚至在帐户之外甚至不可读。 特定数据集对应于分配给特定帐户的特定实体,并且包括与特定实体相对应的密钥。 响应于从特定实体接收到的一个或多个可信执行环境命令,安全处理器使用多个密钥中的至少一些来执行密码处理。

    NETWORK BASED MANAGEMENT OF PROTECTED DATA SETS
    5.
    发明申请
    NETWORK BASED MANAGEMENT OF PROTECTED DATA SETS 有权
    基于网络的保护数据集管理

    公开(公告)号:US20130339729A1

    公开(公告)日:2013-12-19

    申请号:US13527439

    申请日:2012-06-19

    IPC分类号: G06F21/00 G06F1/24 H04L29/06

    摘要: A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected data set that is not readable outside of the system, and perhaps not even readable outside of the account. The particular data set corresponds to a particular entity assigned to the particular account and that includes keys corresponding to the particular entity. A security processor uses at least some of the plurality of keys to perform cryptographic processes in response to one or more trusted execution environment commands received from the particular entity.

    摘要翻译: 包括配置为维护受保护的帐户的帐户管理模块的系统。 例如,特定受保护的帐户包括在系统之外不可读的受保护的数据集,甚至在帐户之外甚至不可读。 特定数据集对应于分配给特定帐户的特定实体,并且包括与特定实体相对应的密钥。 响应于从特定实体接收到的一个或多个可信执行环境命令,安全处理器使用多个密钥中的至少一些来执行密码处理。

    TRUSTED EXECUTION ENVIRONMENT VIRTUAL MACHINE CLONING
    6.
    发明申请
    TRUSTED EXECUTION ENVIRONMENT VIRTUAL MACHINE CLONING 有权
    实施执行环境虚拟机克隆

    公开(公告)号:US20140040890A1

    公开(公告)日:2014-02-06

    申请号:US13566250

    申请日:2012-08-03

    IPC分类号: G06F9/455

    CPC分类号: G06F21/53

    摘要: Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.

    摘要翻译: 克隆具有可信执行环境的虚拟机,例如基于软件的可信平台模块。 为了克隆虚拟机,将复制源虚拟机的虚拟机状态以制定与目标虚拟机相关联的目标虚拟机状态。 目标虚拟机是源虚拟机状态的克隆,因此受信任执行环境的存储层次结构对于源虚拟机状态和目标虚拟机状态中的受信任执行环境可能相同。 然而,由于目标虚拟机的身份与源虚拟机的身份不同,所以目标虚拟机状态的认可层级被改变,使得其基于目标虚拟机的身份而不是源虚拟机 机。