Invention Grant
US08954760B2 Authentication of solution topology 有权
解决方案拓扑的认证

Authentication of solution topology
Abstract:
A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology.
Public/Granted literature
Information query
Patent Agency Ranking
0/0