FIELD: information technology.
SUBSTANCE: computer-implemented method of providing secure information exchange comprises, under the control of one or more computer systems configured by executable instructions, receiving, by a host system hypervisor, a secure connection request through a computing device with a guest operating system on the host system; the host system is configured to host a guest operating system; receiving, by the hypervisor, a set of cryptographic credentials associated with the guest operating system from a certificate storage; using, by the hypervisor, the set of cryptographic credentials on behalf of the guest operating system to set up a secure connection with the device, using a security protocol, in response to the secure connection request through the computing device, wherein the request is sent to the guest operating system from the set of guest operating systems supported by the hypervisor, wherein the hypervisor operates as the endpoint of the secure connection, which uses the set of cryptographic credentials; and sending, by the hypervisor via the secure connection, one or more information exchange messages between the guest operating system and the device, wherein the hypervisor processes the one or more information exchange messages to provide a secure connection.
EFFECT: more secure information exchange.
35 cl, 8 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT | 2017 |
|
RU2738021C2 |
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
PROTECTED STORAGE DEVICE | 2018 |
|
RU2768196C2 |
TELECOMMUNICATION CHIP-CARD | 2013 |
|
RU2628492C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY | 2017 |
|
RU2756048C2 |
SECURE AND PRIVATE BACKUP STORAGE AND PROCESSING FOR TRUSTED COMPUTING AND DATA SERVICES | 2010 |
|
RU2531569C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY | 2017 |
|
RU2756040C2 |
SYSTEM AND METHOD FOR HYPERVISOR USE TO CONTROL ACCESS TO COMPUTED GIVEN FOR RENT | 2007 |
|
RU2385483C2 |
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER | 2015 |
|
RU2693313C2 |
SEALING DATA WITH SEALING ENCLAVE | 2017 |
|
RU2759329C2 |
Authors
Dates
2016-05-20—Published
2012-09-28—Filed