PREDICTIVE DISASTER RECOVERY SYSTEM

    公开(公告)号:US20170308421A1

    公开(公告)日:2017-10-26

    申请号:US15138276

    申请日:2016-04-26

    IPC分类号: G06F11/07

    摘要: Environmental data, associated with a first computer, is received. Social media data, associated with the first computer, is also received. A first severity value, based on the environmental data, is determined. A second severity value, based on the social media data, is determined. A first weighted severity score is determined. The first weighted severity score is a combination of the first and second severity values. One or more actions is determined. The determined action is one of a recovery point objective action or a recovery time objective action. Each action has a threshold. Whether the first weighted severity score is equal to or greater than any threshold associated with any action is determined. In response to determining that the first weighted severity score is equal to or greater than one or more thresholds, each action associated with each threshold is implemented.

    School perimeter security system
    14.
    发明授权
    School perimeter security system 有权
    学校周边安全系统

    公开(公告)号:US09460599B1

    公开(公告)日:2016-10-04

    申请号:US15166610

    申请日:2016-05-27

    IPC分类号: G08B13/24 H04W4/04 H04W4/02

    摘要: A school perimeter security system includes a registry database including: registered student mobile device identifiers, registered non-student mobile device identifiers, and a matching of students with authorized non-students with whom the students are permitted to be paired with near the perimeter. At least three beacon devices are located within the school's perimeter, positioned to establish a boundary area near the perimeter, detect and establish communication with mobile devices entering the boundary area, obtain an identifier from each mobile device that enters the boundary area, and facilitate tracking of all mobile devices within the boundary area. The processor and beacon devices interact to identify every mobile device entering the boundary area, track their location within the boundary area, compare the identified mobile devices with identifiers in the registry database and, transmit an alert notice when a condition is satisfied but not transmit that alert when a different condition is satisfied.

    摘要翻译: 学校周边安全系统包括注册数据库,包括:注册的学生移动设备标识符,注册的非学生移动设备标识符,以及学生与被允许与学生在附近配对的授权非学生的匹配。 至少三个信标设备位于学校的周边内,定位为在周边附近建立边界区域,检测并建立与进入边界区域的移动设备的通信,从进入边界区域的每个移动设备获取标识符,并便于跟踪 的边界区域内的所有移动设备。 处理器和信标设备进行交互以识别进入边界区域的每个移动设备,跟踪其在边界区域内的位置,将识别的移动设备与注册表数据库中的标识符进行比较,并且当条件满足时发送警报通知,但是不发送 当满足不同的条件时提醒。

    DISTRIBUTED DIGITAL RIGHTS-MANAGED FILE TRANSFER AND ACCESS CONTROL
    15.
    发明申请
    DISTRIBUTED DIGITAL RIGHTS-MANAGED FILE TRANSFER AND ACCESS CONTROL 有权
    分布式数字权限管理的文件传输和访问控制

    公开(公告)号:US20160224956A1

    公开(公告)日:2016-08-04

    申请号:US14608339

    申请日:2015-01-29

    IPC分类号: G06Q20/12 H04L29/06 H04L29/08

    摘要: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.

    摘要翻译: 用于将数字权限管理(DRM)文件从第一卖方设备传送到买方设备的系统涉及被配置为接收具有DRM文件的文件包的买方设备。 某些文件包也可能具有DRM文件访问密钥。 该系统还具有其上存储有DRM文件的第一卖方装置,并且被配置为接收购买DRM文件的请求(具有DRM文件标识符的请求); 接收与请求相关联的买方标识符; 将文件包转移到买方设备到买方设备; 通过网络连接检测数字版权管理服务器; 并且响应于检测到所述数字版权管理服务器,向所述数字版权管理服务器发送销售记录,其中所述销售记录包括所述DRM文件标识符和所述买方标识符。

    Unlocking a computing device via images
    16.
    发明授权
    Unlocking a computing device via images 有权
    通过图像解锁计算设备

    公开(公告)号:US09292678B2

    公开(公告)日:2016-03-22

    申请号:US14219461

    申请日:2014-03-19

    摘要: A mechanism is provided for unlocking a locked computing device based on a knowledge of a user. Responsive to detecting an intent to utilize the locked computing device, a subset of the images is randomly selecting in an identified tag category from a plurality of tagged images, the subset of images comprising a plurality of tags in the identified tag category. An order in which the user must gesture to the plurality of tags in the subset of images is randomly selected. The subset of images and the order in which the user must gesture to the plurality of tags in the subset of images to the user is presented to the user. Responsive to the user gesturing to a subset of tags in the subset of images in the selected order, the locked computing device is unlocked.

    摘要翻译: 提供了一种用于基于用户的知识来解锁锁定的计算设备的机制。 响应于检测利用锁定的计算设备的意图,图像的子集从多个标记的图像中随机地选择识别的标签类别,所述图像的子集包括所识别的标签类别中的多个标签。 随机选择用户必须在图像子集中对多个标签进行手势的顺序。 向用户呈现图像的子集和用户必须向图像的子集中向多个标签手势的顺序。 响应于用户以所选择的顺序打印到图像子集中的标签的子集,锁定的计算设备被解锁。

    Virtual machine migration
    17.
    发明授权
    Virtual machine migration 有权
    虚拟机迁移

    公开(公告)号:US09251349B2

    公开(公告)日:2016-02-02

    申请号:US13781581

    申请日:2013-02-28

    摘要: Attesting a virtual machine that is migrating from a first environment to a second environment includes in response to initiation of migration of the virtual machine from the first environment to the second environment, accessing one or more stored trust values generated during the trusted boot of the virtual machine in the first environment, determining if the accessed trust values define a security setting sufficient for the second environment, and if the accessed trust values do not define a security setting sufficient for the second environment, performing a predetermined action in relation to the migration of the virtual machine to the second environment.

    摘要翻译: 验证从第一环境迁移到第二环境的虚拟机包括响应于虚拟机从第一环境迁移到第二环境的响应,访问在虚拟机的可信引导期间生成的一个或多个存储的信任值 机器在第一环境中,确定所访问的信任值是否定义足够用于第二环境的安全设置,并且如果所访问的信任值没有定义足够用于第二环境的安全设置,则执行关于迁移的预定动作 虚拟机到第二个环境。

    Alternate notification selection
    18.
    发明授权

    公开(公告)号:US09160832B2

    公开(公告)日:2015-10-13

    申请号:US13737057

    申请日:2013-01-09

    摘要: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.

    Start method for application cryptographic keystores
    19.
    发明授权
    Start method for application cryptographic keystores 有权
    应用加密密钥库的启动方法

    公开(公告)号:US08856519B2

    公开(公告)日:2014-10-07

    申请号:US13869179

    申请日:2013-04-24

    IPC分类号: G06F21/57 G06F21/72 G06F21/00

    摘要: Provided are techniques for encrypting a resource associated with an application with a first key; generating, at an install time of the application, a first hash code for an executable daemon associated with the application; encrypting the first key with the first hash code to produce a protected first key; generating, at a load time of an application, a second hash code for the executable daemon; deriving the first key by decrypting the protected first key using the second hash code to produce a derived first key; and accessing the resource by the executable daemon by employing the derived first key. Examples of protected resource include, but are not limited to, databases, communication devices and a lightweight directory access protocol server.

    摘要翻译: 提供了用于利用第一密钥加密与应用相关联的资源的技术; 在所述应用的安装时生成用于与所述应用相关联的可执行守护进程的第一散列码; 用第一哈希码加密第一密钥以产生受保护的第一密钥; 在应用的加载时间生成用于所述可执行守护程序的第二哈希码; 通过使用第二散列码解密受保护的第一密钥来产生第一密钥以产生导出的第一密钥; 以及通过使用导出的第一密钥由可执行守护程序访问资源。 受保护资源的示例包括但不限于数据库,通信设备和轻量级目录访问协议服务器。

    ALTERNATE NOTIFICATION SELECTION
    20.
    发明申请
    ALTERNATE NOTIFICATION SELECTION 有权
    备选通知选择

    公开(公告)号:US20140194101A1

    公开(公告)日:2014-07-10

    申请号:US13737057

    申请日:2013-01-09

    IPC分类号: H04M1/725

    摘要: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.

    摘要翻译: 本发明的实施例涉及响应于在限定区域中的移动设备的到达和离开的通知的管理。 优先列表在定义区域中的移动设备之间共享。 一旦检测到,移动设备将其各自选择的通知添加到优先列表中。 进入定义区域的移动设备接收优先列表,并且响应于在优先级列表上检测到共享的选择的通知,该区域中的一个移动设备将其选择的通知改变为备选通知。 进入定义区域的第二移动设备同样将接收优先级列表,并且响应于列表上共享的所选通知将其选择的通知改变为第二备选通知。 在设备离开该区域时,该列表将再次被更新,并且从该列表中删除该设备专用的所有通知。