throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2010/0169948 A1
`(43) Pub. Date:
`Jul. 1, 2010
`Budko et al.
`
`US 20100169948A1
`
`(54) INTELLIGENT SECURITY CONTROL
`SYSTEM FOR VIRTUALIZED ECOSYSTEMS
`
`(75) Inventors:
`
`Renata Budko, Sunnyvale, CA
`(US); Hemma Prafullchandra,
`Mountain View, CA (US); Eric
`Ming Chiu, Los Altos, CA (US);
`Boris Strongin, Redwood City, CA
`(US)
`Correspondence Address:
`SONNENSCHEN NATH & ROSENTHAL LLP
`P.O. BOX 061080, WACKER DRIVE STATION,
`WILLIS TOWER
`CHICAGO, IL 60606-1080 (US)
`
`(73) Assignee:
`
`HyTrust, Inc., Mountain View, CA
`(US)
`
`(21) Appl. No.:
`
`12/347,315
`
`(22) Filed:
`
`Dec. 31, 2008
`
`Publication Classification
`
`(51) Int. Cl.
`(2006.01)
`G06F 9/455
`(2006.01)
`H04L 9/30
`(2006.01)
`G06F2L/00
`(2006.01)
`GO6F 2 1/22
`(52) U.S. Cl. ................... 726/1: 718/1713/189: 706/53;
`706/12; 726/21
`
`ABSTRACT
`(57)
`Resources of a virtualized ecosystem are intelligently secured
`by defining and analyzing object handling security control
`information for one or more logical resources in the virtual
`ized ecosystem and deriving therefrom object properties for
`each of the logical resources involved in the execution of a
`virtual machine in any given context within the virtualized
`ecosystem.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Active
`Directory
`116
`
`ASSet
`Management
`System 118
`
`
`
`Vulnerability
`Scanning &
`Remediation
`System 120
`
`/
`
`1
`
`/
`
`Integration or import from
`extreme Sources of Security
`and Compliance Systems
`
`Management
`Client
`(e.g., VIC, SSH,
`Web.) 114
`
`Security Control
`System
`96
`
`Virtual
`Machine
`
`Virtualization Platform
`102
`
`Protected Virtual Infrastructure
`
`WIZ, Inc. EXHIBIT - 1081
`WIZ, Inc. v. Orca Security LTD.
`
`

`

`Patent Application Publication
`Patent Application Publication
`
`Jul. 1, 2010 Sheet 1 of 9
`Jul. 1,2010 Sheet 1 of 9
`
`US 2010/0169948A1
`US 2010/0169948 Al
`
`
`
`Virtual Machines
`
`Application 224|Application 222Application 22
`
`Virtual Machines
`
`Server 16
`Server 16
`
`

`

`Patent Application Publication
`Patent Application Publication
`
`Jul. 1, 2010 Sheet 2 of 9
`Jul. 1,2010 Sheet 2 of 9
`
`US 2010/0169948A1
`US 2010/0169948 Al
`
`Virtual Machine
`44.
`
`
`
`
`
`
`
`
`
`Virtual Machine
`444
`
`a
`
`Virtual Machine
`443
`
`s.
`
`
`
`
`
`V Network
`42
`
`V PrOCeSSOr
`38
`Vuataion Layer
`Physical Computer(i.e. Host system) 24
`Physical Computer (i.e. Host system
`) 24
`
`
`PrOCeSSOr
`Disk
`30
`32
`
`
`
`Memory
`28
`
`
`
`
`
` ododefateSSLayer,
`
`Memory Progessor|OS Progessor|OS28 Network34
`
`NetWOrk
`34
`
`FIG.2
`FIG. 2
`
`

`

`Patent Application Publication
`
`Jul. 1, 2010
`
`Sheet 3 of 9
`
`US 2010/0169948 A1
`
`
`
`
`W emery ES V_Disk + JG Network 一
`7 五
`i
`eS
`
`Machine
`
`
`
`
`Machine
`Virtual
`
`ae,
`ree
`
`Lanter
`
`7
`
`sens
`
`
`
`-
`
`Pen Bee
`
`
`
`|
`
`es
`t
`ae aE
`
`.
`
`
`
`
`
`
`
`Machine
`Virtual
`
`
`
`
`
`
`
`
`
`Machine
`Virtual
`
`
`
`
`Machine
`Virtual
`
`Machine
`Virtual
`
`
`
`
`
`
`
`
`
`
`ee
`
`站
`
`了
`
`Virtual
`
`
`
`
`Machine
`Virtual
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` Memory
`
`
`
`
`
`
`46a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Disk
`
`
`
`
`
`
`
`Processor
`
`
`
`
`
`
`
`Memory
`
`
`
`
`Network
`
`
`
`
`
`
`
`
`Physical Computer (ie. Host st system)
`
`46c
`
`
`
`
`
`
`
`FIG. 3
`
`48
`
`Physical Network
`
`
`
`
`
`
`
`Network
`
`
`
`
`
`
`
`
`
`
`Disk
`
`
`
`
`
`
`
`
`
`
`
`
`Processor
`
`
`
`
`
`
`
`Memory
`
`
`
`
`Physical Computer ie H Host ot system)
`
`
`
`
`
`
`
`

`

`Patent Application Publi cation
`
`Jul. 1,2010
`
`Sheet 4 of 9
`
`US 2010/0169948 A1
`
`
`
`
`
`
`
`
`
`
`| Network
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Disk | 「 Network ow Processor ~~ | Disk
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Processor
`
`
`
`
`
`
`
`
`
`
`
`
`48a
`
`Physical Network - Site A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Physical Computer (i.e. Host system)
`
`ss
`
`
`
`
`
`
`
`work +} V_M vemory =p) @ = V_Disk + = Network +
`
`Ce V_Disk + m=) Gn Network
`
`SE Pres
`
`V_Mem mory
`
`ro
`
`
`
`
`
`
`
`aT Te
`
`
`
`
`
`
`
`Machine
`Virtual
`
`DO a5 as eee
`
`as
`
`susnee
`
`oun
`
`wf
`
`of
`
`了
`
`Machine
`Virtual
`
`
`
`
`
`
`
`-
`
`Machine
`Virtual
`
`e@ee
`
`還
`
`還
`
`aounuee
`
`ee ee
`ee, woneee®
`
`Machine
`Virtual
`
`.
`
`
`
`
` 個
`
`
`
`
`
`
`
`
`
`
`
`

`

`Patent Application Publication
`
`Jul. 1,2010
`
`Sheet 5 of 9
`
`US 2010/0169948 A1
`
` FIG. 4(Cont.)
`
`
`
`
`
`
`48b
`
`Physical Network - Site B
`
`
`
`
`
`
`
`Network
`
`
`
`
`
`
`
`
`
`
`Disk
`
`
`
`
`
`
`
`
`
`
`
`
`
`Physical Computer (i {ie
`
`同
`
`
`
`
`Processor
`
`
`
`
`
`
`
`Memory
`
`
`
`
`ae
`
`——_ = =
`
`oe
`
`
`
`
`
`
`
`
`
`
`Network
`
`a
`
`
`
`
`
`
`
`Disk
`
`
`
`
`
`
`
`
`
`
`
`cs ——_——=_ =
`
`
`
`Physical Computer lie. Host system)
`
`
`
`
`
`
`
`
`
`
`Memory
`Processor
` — — i op o
`
`
`
`
`
`
`
`¢ _t
`
`
`
`
`
`
`-
`
`s
`
`ie emi +
`
`an
`met pets nem
`
`:
`
`Povo
`
`: at Layer. 和
`
`
`
`
`
`
`
`
`
`
`
`
`
`区 emery Je Processor 放 V_Disk + Jee Network mie
`
`
`
`
`Machine
`Virtual
`
`Machine
`Virtual ee ee
`
`MNES
`
`【
`
`
`
`
`Machine
`Virtual
`
`ra
`
`Machine
`Virtual
`
`
`
`
`Machine
`Virtual
`
`Machine
`Virtual
`
`
`
`
`Machine
`Virtual
`
`
`
`
`<A
`_ Network K+)
`Trewern dden =e
`Machine
`Virtual
`
`

`

`Patent Application Publication
`Patent Application Publication
`
`Jul. 1, 2010 Sheet 6 of 9
`Jul. 1,2010 Sheet 6 of 9
`
`US 2010/0169948A1
`US 2010/0169948 Al
`
`Patch Frequency = 4
`
`
`
`
`
`FIG. 5
`FIG. 5
`
`Patch Frequency = 1
`Patch_Frequency = 1
`
`
`
`64
`64
`
`64
`64
`
`
`
`
`Embedded
`Embedded
`Control
`Control
`Block
`Block
`
`Embedded
`Embedded
`Control
`Control
`Block
`Block
`
`
`
`
`
`Virtual
`Virtual
`
`Add
`Object
`Object
`Add
`(VO)
`COntrols
`(VO)
`Controls
`62
`62
`
`FIG. 6
`FIG. 6
`
`

`

`Patent Application Publication
`Patent Application Publication
`
`Jul. 1, 2010 Sheet 7 of 9
`Jul. 1,2010 Sheet 7 of 9
`
`US 2010/0169948A1
`US 2010/0169948 Al
`
`
`
`
`
`Establish a new lock On the virtual machine
`Establish a new lock on the virtual machine
`and its assOciated virtual disk files.
`and its associated virtual disk files.
`70
`70
`
`Determine the level of protection required
`Determine thelevelof protection required
`and encryption tuning parameters.
`and encryption tuning parameters.
`72
`72
`
`Select an appropriate cipher algorithm and
`Select an appropriate cipher algorithm and
`generate encryption keyS.
`generate encryption keys.
`74.
`74
`
`Apply any re-formatting changes, if
`Apply any re-formatting changes, if
`needed.
`needed.
`76
`16
`
`Encrypt the sector(s) of databased on
`Encrypt the sector(s) of data based on
`the specified level of protection.
`the specified level of protection.
`78
`78
`
`Encrypt the symmetric encryption key with
`Encrypt the symmetric encryption key with
`an asymmetric public key.
`an asymmetric public key.
`80
`80
`
`Add any necessary metadata into the
`Add any necessary metadatainto the
`protected virtual machine.
`protected virtual machine.
`82
`82
`
`U
`O
`
`FIG. 7
`FIG. 7
`
`

`

`Patent Application Publication
`Patent Application Publication
`
`Jul. 1, 2010 Sheet 8 of 9
`Jul. 1,2010 Sheet 8 of 9
`
`US 2010/0169948A1
`US 2010/0169948 Al
`
`S
`O
`
`~
`84
`
`
`
`Retrieve the metadata from the protected
`Retrieve the metadata from the protected
`WM disk file.
`VM disk file.
`86
`86
`
`92
`
`Retrieve the identity/location information
`Retrieve the identity/location information
`of the associated asymmetric private key.
`of the associated asymmetric private key.
`88
`88
`
`Decrypt the symmetric encryption key
`Decrypt the symmetric encryption key
`using the asymmetric private key.
`using the asymmetric private key.
`90
`90
`
`Decrypt the protected disk files with the
`Decrypt the protected disk files with the
`symmetric encryption key.
`symmetric encryption key.
`92.
`
`F.G. 8
`FIG. 8
`
`

`

`Patent Application Publication
`Patent Application Publication
`
`Jul. 1, 2010 Sheet 9 of 9
`Jul. 1,2010 Sheet 9 of 9
`
`US 2010/0169948A1
`US 2010/0169948 Al
`
`
`
`System 120
`
`Vulnerability
`Vulnerability
`Scanning &
`Scanning &
`Remediation
`Remediation
`System 120
`
`7
`/
`
`1
`“
`
`7
`/
`
`Integration or import from
`Integration or import from
`extreme Sources of Security
`extreme sourcesof security
`and Compliance Systems
`and Compliance Systems
`
`Security Control
`Security Control
`System
`System
`96
`96
`
`
`
`
`
`Management
`Management
`Client
`Client
`(e.g., VIC, SSH,
`(e.g., VIC, SSH,
`Web.) 114
`Web...) 114
`
`
`ASSet
`Asset
`
`
`ACtive
`Active
`Management
`Management
`Directory
`
`Directory
`System 118
`system 118
`116
`116
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Virtualization Platform
`102
`
`Protected Virtual Infrastructure
`Protected Virtual Infrastructure
`
`FIG. 9
`FIG. 9
`
`

`

`US 2010/0169948 A1
`US 2010/0169948 Al
`
`Jul. 1, 2010
`Jul. 1, 2010
`
`INTELLIGENT SECURITY CONTROL
`INTELLIGENT SECURITY CONTROL
`SYSTEM FOR VIRTUALIZED ECOSYSTEMS
`SYSTEM FOR VIRTUALIZED ECOSYSTEMS
`
`FIELD OF THE INVENTION
`FIELD OF THE INVENTION
`0001. The present invention relates to a security control
`[0001] The present invention relates to a security control
`system adapted to define and analyze object handling control
`system adaptedto define and analyze object handling control
`information, for example, control information that may influ
`information, for example, control information that may influ-
`ence or impact security and compliance of a virtualized eco
`ence or impact security and complianceof a virtualized eco-
`system and derive from it object properties for each of a
`system and derive from it object properties for each of a
`number of logical resources involved in the execution of a
`numberof logical resources involved in the execution of a
`virtual machine in any given context within the virtualized
`virtual machine in any given context within the virtualized
`ecosystem.
`ecosystem.
`
`BACKGROUND
`BACKGROUND
`0002 Virtualization is a term that has been coined to refer
`[0002] Virtualization is a term that has been coinedto refer
`to the abstraction of computer resources. This includes
`to the abstraction of computer resources. This includes
`abstraction of both hardware and software at multiple levels,
`abstraction of both hardware and software at multiple levels,
`from individual servers and clients to storage to complete
`from individual servers and clients to storage to complete
`networks. In this latter instance, the term “virtual infrastruc
`networks. In this latter instance, the term “virtual infrastruc-
`ture” has been used to refer to abstracted resources of a
`ture' has been used to refer to abstracted resources of a
`computer network, inclusive of all the hardware and software.
`computer network,inclusive ofall the hardware and software.
`Virtualization thus transforms physical hardware and soft
`Virtualization thus transforms physical hardware and soft-
`ware resources into virtual machines (and other virtual
`ware resources into virtual machines (and other virtual
`objects) that are capable of running their own operating sys
`objects) that are capable of running their own operating sys-
`tems and applications across any of a variety of platforms.
`tems and applications across any of a variety of platforms.
`Virtualization also allows the packaging of complete operat
`Virtualization also allows the packaging of complete operat-
`ing system and applications as a portable virtual environment
`ing system andapplicationsas a portable virtual environment
`(also referred to as encapsulation), which can be moved from
`(also referred to as encapsulation), which can be moved from
`one virtualization platform to another (regardless of vendor).
`onevirtualization platform to another (regardless of vendor).
`0003. Among the many benefits afforded by virtualization
`[0003] Among the many benefits afforded by virtualization
`technology are increased flexibility and reduced cost of infra
`technologyare increasedflexibility and reduced cost of infra-
`structure management largely driven by encapsulation and
`structure management largely driven by encapsulation and
`portability inherent to virtual machines. With the benefits of
`portability inherent to virtual machines. With the benefits of
`visualization, however, come several serious security risks.
`visualization, however, come several serious security risks.
`Because virtual infrastructures can now be managed remotely
`Becausevirtual infrastructures can now be managed remotely
`through software, controls that existed in the pre-virtualiza
`through software, controls that existed in the pre-virtualiza-
`tion world are now relaxed or bypassed altogether. Users with
`tion world are now relaxed or bypassed altogether. Users with
`access to Software management facilities now can create cop
`access to software managementfacilities now can create cop-
`ies of the virtual machine disks with sensitive data, cause
`ies of the virtual machine disks with sensitive data, cause
`denial of service to an important application by starving it of
`denial of service to an important application by starving it of
`resources or accidentally connecting a critical virtual
`resources or accidentally connecting a critical virtual
`machine to an insecure network. More maliciousattacks are
`machine to an insecure network. More malicious attacks are
`also possible. Indeed, the data of virtualization applications,
`also possible. Indeed, the data of virtualization applications,
`both run-time and its associated data set, need to be protected
`both run-timeandits associated data set, need to be protected
`as it represents base hardware structures in relation to execut
`as it represents base hardwarestructures in relation to execut-
`ing payload of the operating system and application. More
`ing payload of the operating system and application. More-
`over, the portability of virtual machines and the fact that the
`over, the portability of virtual machinesandthe factthat the
`application/data reader is encapsulated together with the data,
`application/data reader is encapsulated together withthe data,
`invalidates data protection methodologies of separation that
`invalidates data protection methodologies of separation that
`rely on the security of physical storage devices.
`rely on the security of physical storage devices.
`0004 Dynamic allocation of physical and logical
`[0004] Dynamic
`allocation of physical
`and logical
`resources for each instantiated virtual machine requires that
`resources for each instantiated virtual machine requires that
`every resource provider be defined separately with its own
`every resource provider be defined separately with its own
`access and allocation rules; creating a multi-node service
`access and allocation rules; creating a multi-node service
`provider access system as compared to legacy environment
`provider access system as compared to legacy environment
`where a physical system with processor, memory, storage and
`wherea physical system with processor, memory, storage and
`network resources was a single bundled service provider.
`network resources was a single bundled service provider.
`Moreover, the rate of change of the virtualized system makes
`Moreover, the rate of change of the virtualized system makes
`it impractical to require human intervention when adjusting
`it impractical to require human intervention when adjusting
`the access and allocation rules with every change. To be
`the access and allocation rules with every change. To be
`useful, the controls need to have higher level of abstraction
`useful, the controls need to have higher level of abstraction
`and generalization. Further, persistence, inheritance and tight
`and generalization. Further, persistence, inheritance and tight
`coupling between the data set and the associated controls are
`coupling betweenthe data set and the associated controls are
`
`important as the data set routinely migrates and/or Survives
`important as the data set routinely migrates and/or survives
`specific physical environments or virtualized environments.
`specific physical environments or virtualized environments.
`0005. These and other considerations demand that virtu
`[0005] These and other considerations demandthat virtu-
`alized resources be placed under the control of stringent Secu
`alized resources be placed underthe control of stringent secu-
`rity facilities.
`rity facilities.
`
`SUMMARY OF THE INVENTION
`SUMMARY OF THE INVENTION
`
`0006. The present invention address the above-described
`[0006] The present invention address the above-described
`concerns by providing, in one embodiment, a security control
`concerns by providing, in one embodiment, a security control
`system adapted to define and analyze object handling control
`system adaptedto define and analyze object handling control
`information, for example, control information that may influ
`information, for example, control information that may influ-
`ence or impact security and compliance of a virtualized eco
`ence or impact security and complianceof a virtualized eco-
`system and derive from it object properties for each of a
`system and derive from it object properties for each of a
`number of logical resources involved in the execution of a
`numberof logical resources involved in the execution of a
`virtual machine in any given context within the virtualized
`virtual machine in any given context within the virtualized
`ecosystem.
`ecosystem.
`0007. In one embodiment of the invention, resources of a
`[0007]
`In one embodimentofthe invention, resources of a
`virtualized ecosystem are secured by defining and analyzing
`virtualized ecosystem are secured by defining and analyzing
`object handling control information for one or more logical
`object handling control information for one or more logical
`resources in the virtualized ecosystem and deriving therefrom
`resourcesin the virtualized ecosystem and deriving therefrom
`object properties for each of the logical resources involved in
`object properties for each of the logical resources involved in
`the execution of a virtual machine in any given context within
`the execution ofa virtual machinein any given context within
`the virtualized ecosystem. Deriving object properties in Such
`the virtualized ecosystem. Deriving object properties in such
`a scheme may involve defining, managing and enforcing con
`ascheme mayinvolve defining, managing and enforcing con-
`trols for interactions amongst the logical resources and their
`trols for interactions amongst the logical resources and their
`interactions with an underlying physical, computer-based
`interactions with an underlying physical, computer-based
`environment abstracted by the virtualized ecosystem. Fur
`environment abstracted by the virtualized ecosystem. Fur-
`ther, the controls may be evaluated in response to an attempt
`ther, the controls may be evaluated in response to an attempt
`to manipulate one or more of the logical resources and pre
`to manipulate one or more of the logical resources and pre-
`scribed behavior for the logical controls may be enforced
`scribed behavior for the logical controls may be enforced
`according to a context within which the attempted manipula
`according to a context within which the attempted manipula-
`tion is being performed and one or more properties of the
`tion is being performed and one or more properties of the
`logical resources.
`logical resources.
`0008. In some cases, logical and physical objects of the
`[0008]
`In some cases, logical and physical objects of the
`virtualized ecosystem may be categorized so that objects with
`virtualized ecosystem maybe categorized so that objects with
`similar properties are grouped together and a taxonomy of
`similar properties are grouped together and a taxonomy of
`allowed hierarchical relationships of these groupings may
`allowed hierarchical relationships of these groupings may
`define higher groupings thereof. In Such instances, controls
`define higher groupings thereof. In such instances, controls
`may be defined for the groupings within the taxonomy of
`may be defined for the groupings within the taxonomy of
`allowed hierarchical relationships. Such taxonomies of
`allowed hierarchical
`relationships. Such taxonomies of
`allowed hierarchical relationships may be learned from the
`allowed hierarchical relationships may be learned from the
`virtualized ecosystem and/or imported from existing systems
`virtualized ecosystem and/or imported from existing systems
`and Subsequently augmented.
`and subsequently augmented.
`0009. The properties of the logical resources and the
`[0009] The properties of the logical resources and the
`underlying physical, computer-based environment, which
`underlying physical, computer-based environment, which
`make up the virtualized ecosystem may, in Some cases, be
`make up the virtualized ecosystem may, in some cases, be
`automatically discovered through available interfaces and
`automatically discovered through available interfaces and
`management clients for the virtualized ecosystem. Further,
`managementclients for the virtualized ecosystem. Further,
`the controls may be embedded as control blocks within the
`the controls may be embeddedas control blocks within the
`logical resources, and, as such, may dictate where, when, how
`logical resources, and, as such, may dictate where, when, how
`and using what resources the logical resources can operate
`and using what resources the logical resources can operate
`within the virtualized ecosystem. Logical resources at rest in
`within the virtualized ecosystem. Logical resourcesat rest in
`the virtualized ecosystem may be encrypted according to a
`the virtualized ecosystem may be encrypted according to a
`varying level of protection that depends on an environmental
`varying level of protection that depends on an environmental
`context of the logical resources.
`context of the logical resources.
`0010. The controls may be enforced after being validated,
`[0010] The controls may be enforced after being validated,
`for example by verifying digital signatures associated with
`for example by verifying digital signatures associated with
`the controls. Such enforcement may then be achieved by
`the controls. Such enforcement may then be achieved by
`evaluating intentions specified in the controls, operations on
`evaluating intentions specified in the controls, operations on
`the logical resources being performed and environments in
`the logical resources being performed and environments in
`which they are being performed. In some cases, the control
`which they are being performed. In some cases, the control
`information will include control information that influences
`information will include control information that influences
`
`

`

`US 2010/0169948 A1
`US 2010/0169948 Al
`
`Jul. 1, 2010
`Jul. 1, 2010
`
`or impacts security of the virtualized ecosystem. For
`or
`impacts
`security of the virtualized ecosystem. For
`example, the control information may be security and com
`example, the control information may be security and com-
`pliance control information.
`pliance control information.
`0011. A further embodiment of the invention includes a
`[0011] A further embodiment of the invention includes a
`system made up of a virtual infrastructure and a security
`system made up of a virtual infrastructure and a security
`control system communicatively coupled thereto. The Secu
`control system communicatively coupled thereto. The secu-
`rity control system may be configured for securing resources
`rity control system may be configured for securing resources
`of the virtual infrastructure by defining and analyzing object
`of the virtual infrastructure by defining and analyzing object
`handling control information for one or more logical
`handling control
`information for one or more logical
`resources in the virtual infrastructure and deriving therefrom
`resources in the virtual infrastructure and deriving therefrom
`object properties for each of the logical resources involved in
`object properties for each of the logical resources involved in
`the execution of one or more virtual machines in any given
`the execution of one or more virtual machines in any given
`context within the virtual infrastructure. The virtual machines
`context within the virtual infrastructure. The virtual machines
`may execute on one or more virtualization platforms, at least
`may execute on one or morevirtualization platforms, at least
`Some of which have associated security control system agents
`some ofwhich have associated security control system agents
`for communication with the security control system. The
`for communication with the security control system. The
`virtual infrastructure may also include a storage system used
`virtualinfrastructure may also include a storage system used
`by at least Some of virtual machines, and the storage system
`by at least some of virtual machines, and the storage system
`may have its own associated security control system agent. In
`mayhaveits own associated security control system agent.In
`other cases, some of the components of the virtual infrastruc
`other cases, some of the components ofthe virtual infrastruc-
`ture may communicate with the security control system
`ture may communicate with the security control system
`through one or more management clients or interfaces.
`through one or more managementclients or interfaces.
`0012. The virtual infrastructure abstracts an underlying
`[0012] The virtual infrastructure abstracts an underlying
`physical, computer-based environment and the security con
`physical, computer-based environment and the security con-
`trol system is, in Some instances, configured to define, man
`trol system is, in some instances, configured to define, man-
`age and enforce controls for interactions amongst the logical
`age and enforce controls for interactions amongstthe logical
`resources and their interactions with the computer-based
`resources and their interactions with the computer-based
`environment. For example, the security control system may
`environment. For example, the security control system may
`be configured to evaluate the controls in response to attempts
`be configured to evaluate the controls in responseto attempts
`to manipulate one or more of the logical resources and to
`to manipulate one or more of the logical resources and to
`enforce prescribed (or learned) behavior for the controls
`enforce prescribed (or learned) behavior for the controls
`according to a context within which the attempted manipula
`according to a context within which the attempted manipula-
`tion is being performed and one or more properties of the
`tion is being performed and one or more properties of the
`logical resources. For new virtual objects or new contexts, the
`logical resources. For new virtual objects or new contexts, the
`present security control system dynamically generates con
`present security control system dynamically generates con-
`trols based on learned controls that are enforced for similar/
`trols based on learned controls that are enforced for similar/
`like objects or contexts and automatically enforces them, thus
`like objects or contexts and automatically enforces them,thus
`preventing any security or compliance breaches. Logical and
`preventing any security or compliance breaches. Logical and
`physical objects of the virtual infrastructure may be catego
`physical objects of the virtual infrastructure may be catego-
`rized so that objects with similar properties are grouped
`rized so that objects with similar properties are grouped
`together and a taxonomy of allowed hierarchical relation
`together and a taxonomy of allowed hierarchical relation-
`ships of these groupings defines higher groupings thereof and
`ships ofthese groupings defines higher groupings thereof and
`the controls may be defined for the groupings within the
`the controls may be defined for the groupings within the
`taxonomy of allowed hierarchical relationships.
`taxonomy ofallowed hierarchical relationships.
`0013 Still further embodiments of the present invention
`[0013]
`Still further embodiments of the present invention
`provide for protecting a virtual machine by establishing a lock
`provide for protecting a virtual machinebyestablishing a lock
`on the virtual machine and its associated virtual disk files;
`on the virtual machine andits associated virtual disk files;
`determining a required level of protection for the virtual
`determining a required level of protection for the virtual
`machine and encryption tuning parameters; selecting a cipher
`machine and encryption tuning parameters; selecting a cipher
`algorithm and generating encryption keys according to the
`algorithm and generating encryption keys according to the
`encryption tuning parameters; applying re-formatting
`encryption tuning parameters;
`applying re-formatting
`changes, if needed; encrypting sectors of databased on the
`changes, if needed; encrypting sectors of data based on the
`determined level of protection; encrypting a symmetric
`determined level of protection; encrypting a symmetric
`encryption key with an asymmetric public key, and adding
`encryption key with an asymmetric public key, and adding
`metadata along with the encrypted symmetric key into the
`metadata along with the encrypted symmetric key into the
`virtual machine.
`virtual machine.
`0014. The protected virtual machine may be un-protected
`[0014] The protected virtual machine may be un-protected
`by retrieving metadata from a protected virtual machine disk
`by retrieving metadata from a protected virtual machine disk
`file; retrieving identity and/or location information of an asso
`file; retrieving identity and/or location informationofan asso-
`ciated protected asymmetric private key; decrypting a sym
`ciated protected asymmetric private key; decrypting a sym-
`metric encryption key using the unprotected asymmetric pri
`metric encryption key using the unprotected asymmetric pri-
`vate key; and decrypting the protected virtual machine disk
`vate key; and decrypting the protected virtual machine disk
`file with the symmetric encryption key. The identity and/or
`file with the symmetric encryption key. The identity and/or
`location of the protected asymmetric private key may be
`location of the protected asymmetric private key may be
`
`codified as a uniform resource locator (URL). The protection
`codified as a uniform resource locator (URL). The protection
`of the asymmetric private key may be provided by a user
`of the asymmetric private key may be provided by a user
`password-based encryption scheme or a security hardware
`password-based encryption scheme or a security hardware
`module.
`module.
`0015 Still another embodiment of the invention involves
`[0015]
`Still another embodimentof the invention involves
`evaluating and enforcing controls for attempted manipula
`evaluating and enforcing controls for attempted manipula-
`tions of virtual objects in a virtualized ecosystem according to
`tionsofvirtual objects in a virtualized ecosystem according to
`a context within which the attempted manipulations are being
`acontext within which the attempted manipulationsare being
`performed and the properties of the virtual objects. The con
`performed andthe properties of the virtual objects. The con-
`trols are embedded within the virtual objects and may include
`trols are embeddedwithin the virtual objects and may include
`entitlements and accessfuse policies for the virtual objects.
`entitlements and access/use policies for the virtual objects.
`0016. These and other features of the present invention are
`[0016] These andotherfeatures ofthe present invention are
`described in greater detail below.
`described in greater detail below.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`BRIEF DESCRIPTION OF THE DRAWINGS
`0017. The present invention is illustrated by way of
`[0017] The present
`invention is illustrated by way of
`example, and not limitation, in the figures of the accompany
`example, and not limitation, in the figures of the accompany-
`ing drawings in which:
`ing drawings in which:
`0018 FIG. 1 illustrates an example of several virtual
`[0018]
`FIG. 1 illustrates an example of several virtual
`machines executing on a server;
`machines executing on a server;
`0019 FIG. 2 illustrates an example of a single physical
`[0019]
`FIG. 2 illustrates an example of a single physical
`computer system with a virtualization layer and virtualized
`computer system with a virtualization layer and virtualized
`objects of the system's physical elements;
`objects of the system’s physical elements;
`0020 FIG. 3 illustrates an example of a virtualized eco
`[0020]
`FIG. 3 illustrates an example of a virtualized eco-
`system made up of groups of physical computer systems on
`system made up of groups of physical computer systems on
`one or more physical networks:
`one or more physical networks;
`0021
`FIG. 4 illustrates an example of a virtualized envi
`[0021]
`FIG. 4 illustrates an example of a virtualized envi-
`ronment spanning two physical sites;
`ronment spanning two physicalsites;
`0022 FIG. 5 illustrates an example of a hierarchy of vir
`[0022]
`FIG. 5 illustrates an example of a hierarchy of vir-
`tual object classifications according to a classification scheme
`tual object classifications accordingto a classificatio

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket