Virtual environment type verification for policy enforcement
A type and environment of technology, applied in the direction of program control design, instrumentation, program/content distribution protection, etc., can solve problems such as increasing user costs, inability to use user licenses or other strategies
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] The following description relates to tamper-resistant environment type detection to enable policy (including application permissions) to be shared between the host computing environment and the container virtual computing environment, while preventing such policy from being shared for malicious purposes, such as by deception by computing hardware or A computing environment hosted directly by a virtual machine so that it appears as a container virtual computing environment to improperly gain access to an application or specific functionality provided by it. Environment-type verification can provide tamper-resistant verification of the computing environment within which the environment-type verification is being performed. Such information can then be utilized to perform policy management, which can include omitting authentication to facilitate sharing of policies, such as application permissions, from the host computing environment to the container virtual computing envir...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


