会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • System and method for multi-layered sensitive data protection in a virtual computing environment
    • 在虚拟计算环境中进行多层次敏感数据保护的系统和方法
    • US08700898B1
    • 2014-04-15
    • US13633454
    • 2012-10-02
    • Alex KorthnyNir BarakAmir Jerbi
    • Alex KorthnyNir BarakAmir Jerbi
    • H04L29/06H04L9/32G06F15/16
    • G06F21/6218G06F9/45545G06F9/45558G06F21/64G06F2009/45587G06F2221/2115
    • Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data control agent. The sensitive data control monitor generates encryption keys for each guest virtual machine which are sent to the local sensitive data control agents and used to encrypt data locally on a protected guest virtual machine. In this manner the data itself on the virtual (or physical) disc associated with the guest virtual machine is encrypted while access attempts are gated by a combination of the local agent and the environment-based monitor, providing for secure yet administrable sensitive data protection.
    • 在虚拟计算环境中提供敏感数据保护的系统和方法。 系统和方法利用虚拟设备机器上的敏感数据控制监视器来管理虚拟计算环境中的客体虚拟机,其中每个客体虚拟机可以包括本地敏感数据控制代理。 敏感数据控制监视器为每个客户虚拟机生成加密密钥,这些密钥发送到本地敏感数据控制代理,并用于在受保护的guest虚拟机上本地加密数据。 以这种方式,与访客虚拟机相关联的虚拟(或物理)盘上的数据本身被加密,而访问尝试被本地代理和基于环境的监视器的组合门控,从而提供安全但可管理的敏感数据保护。
    • 18. 发明申请
    • FILE ACCESS FOR APPLICATIONS DEPLOYED IN A CLOUD ENVIRONMENT
    • 文件访问在云环境中应用
    • US20140067864A1
    • 2014-03-06
    • US13605442
    • 2012-09-06
    • Yaron HollandAmir JerbiAvi KesselShalom Shimoni
    • Yaron HollandAmir JerbiAvi KesselShalom Shimoni
    • G06F17/30
    • G06F17/30233
    • A method of operating a virtual computer system including a file access interceptor and multiple virtual machines that are logically arranged in a virtualization environment that is managed by a virtualization environment manager is provided. The method includes reading file settings definitions that include identifications and properties of files that are configured to be accessed by a computer application, replacing operations of a file interface in the computer application using with file access interceptor operations that use the file settings to decouple file attributes from the computer application, managing file access via the file access interceptor operations to provide data file storage and read access to the files, and synchronizing file actions in each of a plurality of instances of the files. Related systems and computer program products are disclosed.
    • 提供了一种操作虚拟计算机系统的方法,该虚拟计算机系统包括文件访问拦截器和逻辑上排列在由虚拟化环境管理器管理的虚拟化环境中的多个虚拟机。 该方法包括读取文件设置定义,包括配置为由计算机应用程序访问的文件的标识和属性,使用文件访问拦截器操作替换计算机应用程序中的文件接口的操作,文件访问拦截器操作使用文件设置来解耦文件属性 从计算机应用程序,通过文件访问拦截器操作来管理文件访问以提供对文件的数据文件存储和读取访问,以及在文件的多个实例中的每一个中同步文件动作。 公开了相关系统和计算机程序产品。
    • 19. 发明申请
    • System, Method, and Software for Enforcing Access Control Policy Rules on Utility Computing Virtualization in Cloud Computing Systems
    • 系统,方法和软件,用于实施云计算系统中实用计算虚拟化的访问控制策略规则
    • US20110072486A1
    • 2011-03-24
    • US12565318
    • 2009-09-23
    • Ethan HadarNimrod VaxAmir JerbiMichael Kletskin
    • Ethan HadarNimrod VaxAmir JerbiMichael Kletskin
    • G06F21/00G06F9/455
    • H04L63/20G06F9/45558G06F21/6218G06F2009/45587
    • According to one embodiment, a system comprises one or more processors coupled to a memory and executing logic. A policy life cycle component is configured to maintain a repository of security policies. The repository of security policies comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host. The policy life cycle component is also configured to issue a compound policy for an identified virtual operating system running on the virtual host. The compound policy provides a virtual host policy and access rules for each of the plurality of virtual machines running on the virtual host. A topology manager is configured to receive the compound policy from the policy life cycle component, assign the compound to an access control agent, and maintain a security policy topology. The security policy topology stores associations between access control agents and compound policies.
    • 根据一个实施例,系统包括耦合到存储器和执行逻辑的一个或多个处理器。 策略生命周期组件配置为维护安全策略的存储库。 安全策略的存储库包括管理对虚拟主机和虚拟主机上运行的多个虚拟机的访问的策略。 策略生命周期组件还被配置为为在虚拟主机上运行的标识的虚拟操作系统发出复合策略。 复合策略为虚拟主机上运行的多个虚拟机中的每一个提供虚拟主机策略和访问规则。 拓扑管理器被配置为从策略生命周期组件接收复合策略,将化合物分配给访问控制代理,并维护安全策略拓扑。 安全策略拓扑存储访问控制代理和复合策略之间的关联。