Abstract:
PROBLEM TO BE SOLVED: To provide methods, systems, and articles to assign security ratings and enforce minimum security requirements during virtual-machine failover. SOLUTION: This method includes:receiving, by a fail-over computing device, a request to instantiate a virtual-machine in response to a virtual-machine failure on a separate physical device, the request including a minimum security rating; comparing, by the fail-over computing device, the minimum security rating against an assigned security rating of the fail-over computing device; and instantiating, by the fail-over computing device, the virtual-machine if the assigned security rating meets or exceeds the minimum security rating. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a secure environment capable of determining automatically each position in a platform, and capable of regulating dynamically the setting of security thereof. SOLUTION: This method/device/system of the present invention has a step for specifying a change of a network state of a device having a secure partition having a location-awareness agent, and a user partition, a step for deciding the connection of the device to the network, a step for deciding the security of the network when the device is connected to the network, a step for applying the first security control to an operating system, before allowing an access of the operating system of the user partition to the network, when the network is secure, and a step for applying the second security control to the operating system, when the network is non-secure. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
Methods, systems, and articles to receive, by a fail-over computing device, a request to instantiate a virtual-machine in response to a virtual-machine failure on a separate physical device. The request includes a minimum security rating. The fail-over computing device then compares the minimum security rating against an assigned security rating of the fail-over computing device and instantiates the virtual-machine if the assigned security rating meets or exceeds the minimum security rating.
Abstract:
Apparatuses and methods provide operating system independent digital rights management. A request can be made for data, which can be monitored by a security module. The security module is independent of a host operating system and manages digital rights for the requested data. Thus, digital rights management occurs outside the context of a host operating system. The security module may classify the data and determine a security policy based on the data classification. Policy may be stored locally or remotely, and may be associated with the data subject to the policy.
Abstract:
Apparatuses and methods provide operating system independent digital rights management. A request can be made for data, which can be monitored by a security module. The security module is independent of a host operating system and manages digital rights for the requested data. Thus, digital rights management occurs outside the context of a host operating system. The security module may classify the data and determine a security policy based on the data classification. Policy may be stored locally or remotely, and may be associated with the data subject to the policy.
Abstract:
Embodiments of techniques and systems for sharing user information between proximate devices are described. In embodiments, a first device may identify a physically-proximate device that may receive user information. Upon receiving an indication that a user of the first device may desire to share user information with a user of the second device, a determination may be made as to whether the two users have matching interests. In embodiments, the interest match determination may be made by a separate interest match evaluator. Upon determination of an interest match, the first device may then send a request to share user information to the second device. If a user of the second device approves the request, user information for the user of the first device may be shared with the user of the second device. Other embodiments may be described and claimed.
Abstract:
This disclosure relates generally to a system and method for translating between virtual machines. A network adaptor can be configured to be communicatively coupled to a server, the server comprising a first virtual machine having a first format, the network adaptor to receive input from the server. A translator can be configured to identify, from the input from the server, the first format of the first virtual machine and generate an output, compatible with a second format of a second virtual machine, based on the input from the server, the second format being incompatible with the first format.
Abstract:
A device, method, and system for portable configuration of vehicle controls includes a mobile communication device configured to communicate with an in-vehicle computing system of a vehicle. The mobile communication device stores user vehicle configuration settings, which are selectively transmitted to the in-vehicle computing system to cause the in-vehicle computing system to adjust vehicle controls based on the user vehicle configuration settings.