会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • SYSTEM AND METHOD FOR SECURING LEASED IMAGES IN A CLOUD ENVIRONMENT
    • 用于在云环境中保护租赁图像的系统和方法
    • US20130227710A1
    • 2013-08-29
    • US13406036
    • 2012-02-27
    • Nir BarakEitan Hadar
    • Nir BarakEitan Hadar
    • G06F21/24
    • G06F21/10
    • Provided is a system, method, and computer-readable storage medium having one or more computer-readable instructions thereon for providing leased images in cloud computing environments. The method includes monitoring a usage of a leased image provided by a cloud vendor, by a client computing device. A threshold period of time associated with the usage is determined. Whether an access to the leased image should be terminated based upon an expiry of the threshold period of time or based upon a request received from the client computing device is determined. The image is locked based upon whether the access to the leased image should be terminated. An access request received for the locked image is monitored; and access to the locked image is enabled when it is determined that the access request is valid.
    • 提供了一种系统,方法和计算机可读存储介质,其上具有一个或多个计算机可读指令,用于在云计算环境中提供租用图像。 该方法包括由客户端计算设备监视由云供应商提供的租用图像的使用。 确定与使用相关联的阈值时间段。 基于阈值时间段的到期或基于从客户端计算设备接收到的请求,确定对租用图像的访问是否被终止。 基于是否应该终止对租用图像的访问来锁定图像。 监视针对锁定图像接收的访问请求; 并且当确定访问请求有效时,启用对锁定图像的访问。
    • 3. 发明授权
    • Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment
    • 自适应和主动的虚拟机映像调整到云环境中的环境安全风险
    • US09503475B2
    • 2016-11-22
    • US13585288
    • 2012-08-14
    • Itzhak FadidaNir BarakEitan Hadar
    • Itzhak FadidaNir BarakEitan Hadar
    • G06F21/57H04L29/06H04L29/08
    • H04L63/20H04L63/1408H04L67/34
    • A computer system includes a security coordinator configured to be communicatively coupled to a plurality of managed machines deployed in a same computing environment and managed by an environment manager. The security coordinator is configured to detect a security condition with respect to a first one of the managed machines, and to automatically initiate modification of a second one of the managed machines in the same computing environment responsive to detection of the security condition. The security coordinator is configured to initiate the modification of the second one of the managed machines prior to occurrence of a security condition therein and prior to action by the environment manager with respect to the second one of the managed machines in response to the detected security condition.
    • 计算机系统包括安全协调器,其被配置为通信地耦合到部署在相同计算环境中并由环境管理器管理的多个被管理机器。 安全协调器被配置为检测相对于被管理机器中的第一个的安全状况,并且响应于检测到安全条件,在相同的计算环境中自动发起对被管理机器中的第二个的修改。 安全协调器被配置为响应于检测到的安全条件,在其中发生安全条件之前以及环境管理器针对被管理机器中的第二管理机器采取行动之前发起对被管理机器中的第二个的修改 。
    • 10. 发明授权
    • System and method for virtual image security in a cloud environment
    • 云环境中虚拟图像安全的系统和方法
    • US08839447B2
    • 2014-09-16
    • US13405973
    • 2012-02-27
    • Nir BarakEitan Hadar
    • Nir BarakEitan Hadar
    • G06F17/13
    • H04L63/101G06F9/45558G06F9/468G06F21/60G06F2009/45587G06F2009/45595H04L63/0823H04L63/10H04W4/60
    • Provided herein are systems and method enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to indicator to guest virtual machines (virtual images) that provide applications and other services to cloud consumers in the cloud environment. A virtual appliance machine in the cloud environment maintains the status of the guest virtual machines and makes decisions based on the status as to whether to allow access to the guest virtual machines. These decisions are transmitted to local elements on the guest virtual machines, which enforce access control on a local level. In this manner, unauthorized virtual image access is prevented providing increased security and data integrity.
    • 本文提供的是在虚拟或云计算环境中实现安全虚拟映像访问的系统和方法。 系统和方法包括将状态指定给客户虚拟机(虚拟映像),为云环境中的云消费者提供应用程序和其他服务。 云环境中的虚拟设备机器维护客户虚拟机的状态,并根据是否允许访问来宾虚拟机的状态进行决策。 这些决定被传送到访客虚拟机上的本地元素,这在本地级别上实施访问控制。 以这种方式,防止未经授权的虚拟图像访问提供增加的安全性和数据完整性。