首页>
外国专利>
Methods and devices for trusted protocols for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
Methods and devices for trusted protocols for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
展开▼
机译:用于非安全,分布式环境的受信任协议的方法和设备,以及用于虚拟化和云计算安全性和管理的应用程序
展开▼
页面导航
摘要
著录项
相似文献
摘要
The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining that an untrusted computing resource is trustworthy, vouching for the untrusted resource as trustworthy by a trusted computing resource upon satisfying at least one criterion of: the trusted resource was directly involved in setting up and/or activating the untrusted resource; and/or has access to a database of identifying credentials and/or information which allow the trusted resource to verify that the untrusted resource is trustworthy; and concealing at least one secret that needs to be present on any computing resource, wherein at least one secret is concealed differently on each computing resource; and transmitting at least one secret from any computing resource to any other computing resource in a way that changes the step of concealing at least one secret without any computing resource knowing at least one secret.
展开▼