1
Rajiv Augu, Steven A Bade, Jeb R Linton, Dimitrios Pendarakis, George C Wilson, Lee Hardy Wilson: Virtual machine images encryption using trusted computing group sealing. International Business Machines Corporation, David Mims, Robert C Rolnik, April 8, 2014: US08694786 (4 worldwide citation)

A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on customer inputs, to form a customer's configured virtual machine. The host machine creates an image from ...


2
VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING. INTERNATIONAL BUSINESS MACHINES CORPORATION, April 4, 2013: US20130086383-A1

A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on customer inputs, to form a customer's configured virtual machine. The host machine creates an image from ...