IMPLEMENTING SECURE INFORMATION EXCHANGE IN RUNTIME SYSTEM Russian patent published in 2016 - IPC G06F7/04 

Abstract RU 2584570 C2

FIELD: information technology.

SUBSTANCE: computer-implemented method of providing secure information exchange comprises, under the control of one or more computer systems configured by executable instructions, receiving, by a host system hypervisor, a secure connection request through a computing device with a guest operating system on the host system; the host system is configured to host a guest operating system; receiving, by the hypervisor, a set of cryptographic credentials associated with the guest operating system from a certificate storage; using, by the hypervisor, the set of cryptographic credentials on behalf of the guest operating system to set up a secure connection with the device, using a security protocol, in response to the secure connection request through the computing device, wherein the request is sent to the guest operating system from the set of guest operating systems supported by the hypervisor, wherein the hypervisor operates as the endpoint of the secure connection, which uses the set of cryptographic credentials; and sending, by the hypervisor via the secure connection, one or more information exchange messages between the guest operating system and the device, wherein the hypervisor processes the one or more information exchange messages to provide a secure connection.

EFFECT: more secure information exchange.

35 cl, 8 dwg

Similar patents RU2584570C2

Title Year Author Number
SYSTEM AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT 2017
  • Caragea Radu
RU2738021C2
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT 2015
  • Fergyuson Nils T.
  • Samsonov Evgenij Anatolevich
  • Kinskhumann
  • Chandrashekar Samartkha
  • Messek Dzhon Entoni
  • Novak Mark Fishel
  • Makkarron Kristofer
  • Temkhejn Amitabkh Prakash
  • Van Tsyan
  • Krus Devid Mettyu
  • Ben-Zvi Nir
  • Vinberg Anders Bertil
RU2679721C2
PROTECTED STORAGE DEVICE 2018
  • Lukaks Sandor
  • Turiku Dan-Kristyan
RU2768196C2
TELECOMMUNICATION CHIP-CARD 2013
  • Shriya Sandzhiv
  • Fogat Vikas
RU2628492C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
SECURE AND PRIVATE BACKUP STORAGE AND PROCESSING FOR TRUSTED COMPUTING AND DATA SERVICES 2010
  • Auradkar Rakhul V.
  • D`Suza Roj Piter
RU2531569C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY 2017
  • Novak, Mark, F.
RU2756040C2
SYSTEM AND METHOD FOR HYPERVISOR USE TO CONTROL ACCESS TO COMPUTED GIVEN FOR RENT 2007
  • Kromer Dehril Karvis
  • Loker Khovard Dzheffri
  • Springfild Rehndall Skott
RU2385483C2
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER 2015
  • Novak, Mark Fishel
  • Ben-Zvi, Nir
  • Ferguson, Niels T.
RU2693313C2
SEALING DATA WITH SEALING ENCLAVE 2017
  • Costa, Manuel
RU2759329C2

RU 2 584 570 C2

Authors

Rot Gregori B.

Krakhen Erik D.

Ber Grem D.

Brenduajn Erik Dzh.

Fitch Natan R.

Dates

2016-05-20Published

2012-09-28Filed