INTEGRITY VERIFICATION USING A PERIPHERAL DEVICE
    1.
    发明申请
    INTEGRITY VERIFICATION USING A PERIPHERAL DEVICE 审中-公开
    使用外设进行完整性验证

    公开(公告)号:WO2010103466A3

    公开(公告)日:2010-11-04

    申请号:PCT/IB2010051027

    申请日:2010-03-10

    CPC classification number: G06F21/57

    Abstract: A peripheral device includes an interface configured to communicate with a computer, the peripheral device; logic configured to perform an integrity verification of an operating system of the computer; and a display configured to display a result of the integrity verification. A method for integrity verification of a computer using a peripheral device includes connecting the peripheral device to the computer; sending a challenge from the device to the computer; computing attestation data using the challenge and information stored in the computer, retrieving the attestation data from the computer by a client program running on the computer; sending the attestation data to the peripheral device; and verifying the attestation data by the peripheral device.

    Abstract translation: 外围设备包括被配置为与计算机通信的接口,外围设备; 经配置以执行所述计算机的操作系统的完整性验证的逻辑; 以及被配置为显示完整性验证的结果的显示器。 一种使用外围设备对计算机进行完整性验证的方法,包括:将外围设备连接到计算机; 从设备向计算机发送挑战; 使用存储在计算机中的询问和信息来计算证明数据,通过在计算机上运行的客户端程序从计算机检索证明数据; 将证明数据发送到外围设备; 并通过外围设备验证证明数据。

    Automated network deployment of cloud services into a network by matching security requirements

    公开(公告)号:GB2504487A

    公开(公告)日:2014-02-05

    申请号:GB201213507

    申请日:2012-07-30

    Applicant: IBM

    Abstract: Disclosed is a method of automated network deployment of cloud services CS into a network 10. The method starts by receiving a cloud service with a specific resource protection template RPT, specifying an isolation policy for isolating zones in the network. Next the customer protection parameters CPP specifying customer needs regarding protection in the network or received. The next step, is providing security requirements SR matching the received resource protection templates and the received customer protection parameters. Then the cloud service is automatically deployed into the network by using the provided security requirements. The isolation policy may specify a set of zones using IP addresses allocated to resources. The automatically deploying the cloud service may include instancing a virtualised routing application configured using the provided security requirements.

Patent Agency Ranking