A secure virtualization environment bootable from an external media device

A virtualized environment and external media technology, applied in the direction of boot programs, micro-control devices, program control devices, etc., can solve problems such as retention and endangering security

Active Publication Date: 2012-10-24
CITRIX SYST INC
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These solutions are challenging as there are often application and driver compatibility issues, and system traces often remain on individual desktop machines, compromising security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure virtualization environment bootable from an external media device
  • A secure virtualization environment bootable from an external media device
  • A secure virtualization environment bootable from an external media device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Figure 1A One embodiment of a computing environment 101 is described that includes one or more clients 102A-102N (herein collectively referred to as "client 102"). Installed between the client 102 and the server 106 is a network.

[0028] In one embodiment, computing environment 101 may include a device (not shown) installed between server 106 and client 102 . The appliance manages client / server connections and, in some cases, has the ability to load balance client connections across multiple backend servers.

[0029]In some embodiments, a client 102 may be considered a single client 102 or a single group of clients 102 and a server 106 may be considered a single server 106 or a single group of servers 106 . In one embodiment, a single client 102 communicates with more than one server 106, while in another embodiment, a single server 106 communicates with more than one client 102, and in yet another embodiment, a single client 102 communicates with a single Server 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment bootable from an external media device. A host computing device loads and boots a common operating system image stored on an external media device. A client agent stored on the external media device and executing in the common operating system image creates an adapted operating system image by copying the operating system of the host computing device, eliminating all unnecessary files and data and storing the adapted operating system image to the external media device. The host computing device provides a secure virtualized environment by booting the adapted operating system image.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Provisional Application Serial No. 61 / 286210, filed December 14, 2009, entitled "Secure Virtualization Environment Bootable from an External Media Device," the entire disclosure of which is for all purposes Included herein by reference. technical field [0003] This application generally relates to streaming applications. More specifically, the present application relates to a secure computing environment bootable from an external media device. Background technique [0004] As the number of mobile, remote, client, and task-based employees increases, the need for computing systems that limit the information available to each type of employee and segregate employee personal data from work-related data increases. Many companies provide their own employees with laptops, remote access to the company intranet, remote access to applications used by employees, remote access to employe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F9/445G06F9/24
CPCG06F9/4401G06F21/572G06F21/57G06F21/00G06F2009/45579G06F9/45558G06F21/74G06F2009/45587
Inventor Z·吴D·奥特韦R·范德林登J·瑞比
Owner CITRIX SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products