VMware, Inc.
Binding a trusted virtual machine to a trusted host computer

Last updated:

Abstract:

An example method of authenticating software executing in a computer system includes verifying first software executing on the computer system, the software including a hypervisor, verifying second software executing in a virtual machine (VM) managed by the hypervisor, generating a binding key having public and private portions, signing an object to identifies the VM using the private portion of the binding key, and verifying a signature of the object using a public portion of the binding key.

Status:
Grant
Type:

Utility

Filling date:

23 Jul 2018

Issue date:

1 Dec 2020