Information security – Access control or authentication – Network
Reexamination Certificate
2008-09-12
2011-11-22
Vu, Kim (Department: 2435)
Information security
Access control or authentication
Network
C726S002000, C713S186000
Reexamination Certificate
active
08065714
ABSTRACT:
Virtualization platforms and management clients therefor are communicatively coupled to one another via a control layer logically disposed therebetween. The control layer is configured to proxy virtualization management commands from the management clients to the virtualization platforms, but only after successful authentication of users (which may include automated agents and processes) issuing those commands and privileges of those users as defined by access control information accessible to the control layer. The control layer may be instantiated as an application running on a physical appliance logically interposed between the virtualization platforms and management clients, or a software package running on dedicated hardware logically interposed between the virtualization platforms and management clients, or as an application encapsulated in a virtual machine running on a compatible virtualization platform logically interposed between the virtualization platforms and management clients.
REFERENCES:
patent: 5944824 (1999-08-01), He
patent: 6178511 (2001-01-01), Cohen et al.
patent: 2002/0169987 (2002-11-01), Meushaw et al.
patent: 2005/0210467 (2005-09-01), Zimmer et al.
patent: 2006/0026688 (2006-02-01), Shah
patent: 2007/0022138 (2007-01-01), Erasani et al.
patent: 2007/0022480 (2007-01-01), Charles
patent: 2007/0067351 (2007-03-01), Singh et al.
patent: 2007/0073858 (2007-03-01), Narayanan et al.
patent: 2007/0118350 (2007-05-01), Van Der Made
patent: 2007/0180493 (2007-08-01), Croft et al.
patent: 2007/0261121 (2007-11-01), Jacobson
patent: 2008/0034408 (2008-02-01), Duggal
patent: 2008/0098309 (2008-04-01), Fries et al.
patent: 2008/0256538 (2008-10-01), Carter et al.
patent: 2009/0061146 (2009-05-01), Jeong
patent: 10-2007-0112755 (2007-11-01), None
patent: WO 2005114439 (2005-12-01), None
Hytrust, Inc. et al., PCT/US2009/051995 filed Jul. 28, 2009; International Search Report and Written Opinion; ISA/KR; Feb. 24, 2010; 9pp.
Hytrust, Inc. et al., PCT/US2009/051590 filed Jul. 23, 2009; International Search Report; ISA/KR; Feb. 23, 2010; 8pp.
Hytrust, Inc. et al., PCT/US2009/051883 filed Jul. 27, 2009; International Search Report and Written Opinion; ISA/KR; Feb. 2, 2010; 9pp.
Charu Chaubal, VMware Infrastructure 3, Security Hardening, 2007, 19 pp. Palo Alto, USA.
Michael Hilker, Next Challenges in Bringing Artificial Immune Systems to Production in Network Security, Bionetics 2007 Dec. 10-12, 2001, Budapest, Hungary, 7 pp.
VMware ESX Server 3.x Benchmark—Version 1.0, The Center for Internet Security, Oct. 2007, 70pp.
VMware, VMware Esx Server 3-Best Practices for VMWare ESX Server 3, VMware White Paper, Copyright 1998-2006, 13pp, Palo Alto, USA.
National Security Agency, VMware ESX Server 3 Configuration Guide, Enterprise Applications Division of the Systems and Network Analysis Center (SNAC)—Information Assurance Directorate, Mar. 3, 2008, 26 pp, Ft. Meade, USA.
Intel Technology Journal, Autonomic Computing, vol. 10, Issue 04, Published Nov. 9, 2006, 84 pp.
Belov Boris
Budko Renata
Chiu Eric Ming
Prafullchandra Hemma
Strongin Boris
Hytrust, Inc.
Paliwal Yogesh
SNR Denton US LLP
Vu Kim
LandOfFree
Methods and systems for securely managing virtualization... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for securely managing virtualization..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for securely managing virtualization... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4282466