Patent application number | Description | Published |
20110060947 | HARDWARE TRUST ANCHOR - A target computing environment is secured by a hardware trust anchor that provides a trust state of the target computing environment based upon a security audit of the target computing environment. And diagnosing the target computing environment can be diagnosed by the hardware trust anchor according to the security diagnostic information. | 03-10-2011 |
20110162076 | DATA PROTECTING DEVICE - An event condition is checked, using a computer and data content of the computer is additionally protected in relation to a normal data protection according to the event condition. The event condition is detecting by the computer a remote command and/or detecting a state according to a policy. | 06-30-2011 |
20110238837 | Method and System for Providing Services - Methods and systems for providing services and/or computing resources are provided. A method may include receiving an application from an application provider. The method may further include receiving data from a data provider. The method may also include receiving a first request from the data provider to execute the application and apply the data as input to the application. Additionally, the method may include executing the application in response to receiving the first request. The method may also include storing output data resulting from execution of the application. The method may further include receiving a second request from the data provider to transmit the output data to the data provider. The method may additionally include communicating the output data to the data provider in response to the second request. | 09-29-2011 |
20110314549 | METHOD AND APPARATUS FOR PERIODIC CONTEXT-AWARE AUTHENTICATION - A method for authenticating access to an electronic document. The method includes identifying a context event associated with a user seeking access to the electronic document, receiving from the user a plurality of context data, and analyzing the plurality of context data to generate a one or more derived context data. The method may also include receiving from an authentication module a context request, and in response to the context request, generating a context report, wherein the context report includes at least the one or more derived context data, and is configured to enable the authentication module to authenticate the user's access to the electronic document using a first authentication mechanism. The method may also include communicating the context report to the authentication module, monitoring the user to identify an occurrence of the context event, and upon identifying the occurrence of the context event, generating a context event flag, the context event flag configured to inform the authentication module to reauthenticate the user's access to the electronic document. | 12-22-2011 |
20110314558 | METHOD AND APPARATUS FOR CONTEXT-AWARE AUTHENTICATION - A method for authenticating access to an electronic document. The method includes receiving an authentication request from a user, receiving an aggregate risk score, selecting an authentication mechanism based at least on the aggregate risk score, and applying the authentication mechanism to decide the authentication request from the user. The aggregate risk score may be based at least on a comparison of the user's past behavior with a plurality of context data associated with the user. | 12-22-2011 |
20120260113 | Changing Device Behavior Based on External Information - A first electronic device comprises an information-filtering module configured to identify one or more second electronic devices that supply one or more types of information needed by the first electronic device; an information-gathering module coupled to the information-filtering module configured to collect information from the second electronic devices; and an operation module coupled to the information-gathering module configured to adjust operational behavior of the first electronic device based on the collected information. | 10-11-2012 |
20120265357 | Measure Energy Consumption and Determine Energy-Consumption Patterns for Electricity-Consuming Devices - In one embodiment, one or more electronic devices access energy-consumption data at each of a plurality of electricity-consuming devices, the energy-consumption data at each of the electricity-consuming devices indicating for each of a plurality of past pre-determined time periods an aggregate energy usage by the electricity-consuming device over the past pre-determined time period, an energy-measurement unit at the electricity-consuming device having measured and recorded the aggregate energy usage by the electricity-consuming device for each of the past pre-determined time periods for later access, each of the energy-measurement units having a substantially unique identifier (ID), each of the electricity-consuming devices having its own one of the energy-measurement units; and based on the energy-consumption data, determine one or more energy-consumption patterns across the electricity-consuming devices over at least the past pre-determined time periods. | 10-18-2012 |
20120311574 | SYSTEM AND METHOD FOR PROVIDING EVIDENCE OF THE PHYSICAL PRESENCE OF VIRTUAL MACHINES - In accordance with some embodiments of the present disclosure a method for providing evidence of a physical location of a virtual machine comprises launching, by an information technology (IT) resource, a virtual machine from a virtual machine image. The method further comprises generating, by the IT resource, a chain entry in a physical presence chain of the virtual machine image, the chain entry including an identifier of the IT resource indicating that the IT resource launched the virtual machine. | 12-06-2012 |
20120311575 | SYSTEM AND METHOD FOR ENFORCING POLICIES FOR VIRTUAL MACHINES - In accordance with some embodiments of the present disclosure, a method for enforcing a policy associated with a user of a cloud computing service comprises determining a policy associated with a user of a cloud computing service. The method further comprises determining whether an information technology (IT) resource complies with the policy. The method additionally comprises determining that the IT resource is to launch a virtual machine to perform a computing service requested by the user if the IT resource complies with the policy. | 12-06-2012 |
20130055228 | System and Method for Installing a Patch on a Computing System - According to one embodiment, a system includes a memory and a processor. The processor receives a message that includes a patch for installation and one or more requirements to be satisfied before the patch can be installed. The patch is configured to update the computing system. The processor also repeatedly collects information from one or more sensors until it is determined, based on the collected information, that the one or more requirements have been satisfied. Upon determining that the one or more requirements have been satisfied, the processor further conducts an installation process of the patch on the computing system. Upon determining that the installation process of the patch is finished, the processor further transmits a confirmation report indicating whether the patch was successfully installed. The confirmation report is generated and signed by a unique element associated with the computing system. | 02-28-2013 |
20130064365 | Data Destruction - In one embodiment, receive a first request in connection with accessing a set of encrypted data, wherein the set of encrypted data has an expiration date; the first request comprises a first key associated with the expiration date; and the set of encrypted data has been encrypted using the first key. Validate the first key by comparing the expiration date against a current time. Generate a second key for decrypting the set of encrypted data using the first key only if the expiration date has not passed. | 03-14-2013 |
20130179669 | TRUSTED NETWORK BOOTING SYSTEM AND METHOD - A system for trusted network booting of a server. The system may include a booting server that may contain a booting image and a network server that may boot with the booting image from the booting server. The network server may include a trust anchor that measures the booting image. The system may further include a network controller that controls access to a network. The network controller may verify the measurement of the booting image before allowing the network server to access the network. | 07-11-2013 |
20130191643 | ESTABLISHING A CHAIN OF TRUST WITHIN A VIRTUAL MACHINE - According to an aspect of an embodiment, a method of establishing a chain of trust into a virtual machine on a hardware system is described. The method may include measuring an immutable portion of a virtual machine image configured to instantiate as the virtual machine to generate a trust anchor measurement. The method may also include storing the trust anchor measurement in a sealed memory. | 07-25-2013 |
20130262265 | System and Method for Managing Software Licenses - A method for managing software licenses in a cloud environment includes receiving, by a license services system associated with the cloud environment, a request to use a first application from a first user associated with a first subscribing entity, and receiving, by the license services system, a request to use a second application from a second user associated with a second subscribing entity. The method also includes permitting, by the license services system, the first user to execute the first application if a license for the first application is available to the first subscribing entity, and permitting, by the license service system, the second user to execute the second application if a license for the second application is available to the second subscribing entity. | 10-03-2013 |
20140188977 | APPRATUS, METHOD FOR DEPLOYING APPLICATIONS IN A VIRTUAL DESKTOP INTERFACE SYSTEM - In a VDI session, an application is dynamically deployed in a host server or a client device to achieve improved performance. The host server establishes a VDI session with the client device and executes an application in response to a request from the client device. The host server determines, based on a set of performance parameters associated with the VDI session, that the client device is to take over the execution of the application. Execution of the application is then suspended, and state data of the application is collected when the application is suspended. Thereafter, the host server sends an instruction and the state data to the client device to instruct the client device to resume execution of the application from a state defined by the state data. | 07-03-2014 |
20150088826 | Enhanced Performance for Data Duplication - Systems, methods, computer program products, and apparatuses for enhancing the performance of data duplication are provided. A storage system receives an object, which requires data duplication for increased resiliency. A requisite number of copies of the object are created based on a minimum number defined by a system policy. The storage system stores the object and the requisite number of copies and monitors one or more events in the storage system against predetermined data duplication criteria. The predetermined data duplication criteria are defined within the system policy as criteria for making additional copies of the object over the minimum number. One or more additional copies over the requisite number are created and stored based on the occurrence of the one or more events. | 03-26-2015 |