The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 05, 2017

Filed:

Nov. 04, 2015
Applicants:

Philip M Hoffman, Malvern, PA (US);

Sharon M Mauer, Malvern, PA (US);

Michael I Bell, Malvern, PA (US);

Greg L Gensichen, Malvern, PA (US);

Dwayne E Ebersole, Malvern, PA (US);

Tatyana Martsun, Malvern, PA (US);

Inventors:

Philip M Hoffman, Malvern, PA (US);

Sharon M Mauer, Malvern, PA (US);

Michael I Bell, Malvern, PA (US);

Greg L Gensichen, Malvern, PA (US);

Dwayne E Ebersole, Malvern, PA (US);

Tatyana Martsun, Malvern, PA (US);

Assignee:

Unisys Corporation, Blue Bell, PA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 9/44 (2006.01); G06F 9/45 (2006.01); G06F 9/445 (2006.01); G06F 9/455 (2006.01); G06F 21/12 (2013.01); G06F 11/26 (2006.01);
U.S. Cl.
CPC ...
G06F 8/61 (2013.01); G06F 21/121 (2013.01); G06F 11/261 (2013.01); G06F 2221/0704 (2013.01);
Abstract

A method and system for secure automated deployment of an emulated computer system. The method includes providing a download package for installation on a target machine. The download package includes a generic emulated computer system having no unique identity, no model identity, no features, and minimal processing components. The download package also includes a customer order file based on an order from a customer of the target machine. The customer order file includes a machine identity, at least one machine capability, and control data. The download package also includes at least one enabling key configured to enable the emulated computer system on the target machine. The enabling key is customized based on the order from the customer of the target machine, and includes identity information that restricts the use of the emulated computer system on any computer system other than the target machine. The method also includes delivering the download package to the target machine for installation of the emulated computer system on the target machine. The download package prevents the unauthorized cloning of the emulated computer system onto any hardware platforms other than the target machine, and prevents the unauthorized use of any hardware other than the hardware of the target machine.


Find Patent Forward Citations

Loading…