Validity Report
Basic Report
US9678774B2 — Secure migration of virtual machines
Priority Date: 2012-03-08, Publication Date: 2017-06-13, Current Assignee: INVINCIBLE IP LLCReport Generated: 2021-07-23

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP2156310B1●●●●●VIRTUAL MACHINE MIGRATIONGRANT2018-10-312007-04-25GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8321862B2●●●●●System for migrating a virtual machine and resource usage data to a chosen target host based on a migration policyGRANT2012-11-272009-03-20GreatOracle America IncOracle America Inc
EP2724509B1●●●●●METHOD OF DETECTION AND PROTECTION AGAINST ATTACKSGRANT2017-02-012011-06-24GreatOrange SAOrange SA
US8413147B2●●●●●Method  apparatus and system for making a decision about virtual machine migrationGRANT2013-04-022009-07-01GreatHuawei Technologies Co LtdHuawei Technologies Co Ltd
US8954961B2●●●●●Geophysical virtual machine policy allocation using a GPS  atomic clock source or regional peering hostGRANT2015-02-102011-06-30GreatInternational Business Machines CorpInternational Business Machines Corp
EP2737668A1●●●●●VIRTUAL MACHINE MIGRATION TO MINIMIZE PACKET LOSS IN VIRTUALIZED NETWORKGRANT2014-06-042011-07-27GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US9176766B2●●●●●Configurable planned virtual machinesGRANT2015-11-032011-07-06GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2791817B1●●●●●CRYPTOGRAPHIC CERTIFICATION OF SECURE HOSTED EXECUTION ENVIRONMENTSGRANT2018-07-252011-12-12GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9286099B2●●●●●Balancing virtual machine loadsGRANT2016-03-152011-11-22GreatHangzhou H3C Technologies Co LtdHewlett Packard Enterprise Development LP
US10228959B1●●●●●Virtual network for virtual machine communication and migrationGRANT2019-03-122011-06-02GreatGoogle LLCGoogle LLC
EP2488986B1●●●●●METHOD AND DEVICE FOR OPERATING A VIRTUAL MACHINE IN ACCORDANCE WITH AN ASSOCIATED INFORMATION ON ASSIGNMENT OF RIGHTSGRANT2018-03-282009-12-29GreatSiemens AGSiemens AG
US8694638B2●●●●●Selecting a host from a host cluster to run a virtual machineGRANT2014-04-082009-06-29GreatRed Hat Israel LtdRed Hat Israel Ltd
EP2577539A1●●●●●SECURING CUSTOMER VIRTUAL MACHINES IN A MULTI-TENANT CLOUDGRANT2013-04-102010-06-02GreatVMware IncVMware Inc
EP2053509B1●●●●●System for and method of migrating one or more virtual machinesGRANT2018-06-272007-09-30GreatSymantec CorpNortonLifeLock Inc
US7900005B2●●●●●Method and system for the transparent migration of virtual machines storageGRANT2011-03-012007-02-21GreatZimory GmbHZimory GmbH
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeHIGH
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
862
Recommended Classes
216
Government Assigned Classes
11
CPC
Title
Score
G06F9/45533Hypervisors| Virtual machine monitors●●●●●
G06F12/08in hierarchically structured memory systems  e.g. virtual memory systems●●●●●
G06F9/45558Hypervisor-specific management and integration aspects●●●●●
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)●●●●●
G06F21/602Providing cryptographic facilities or services●●●●●
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload●●●●●
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities●●●●●
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)●●●●●
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)●●●●●
H04L41/0866Checking configuration●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.