摘要:
Computers connected to a private network are monitored and controlled through the use of a client agent that operates in association with the computer and a server client that establishing security parameters, privileges and authorizations for the computer. The invention can prevent access to certain devices according to an active security policy. Any activity of the computer, such as a request to transfer data to an external device, access a particular file, etc. is monitored and controlled by the client agent. No operations or procedures are allowed by the computer inconsistent with the active security policy. The security policy may be set by the administrator of the private network according to the user rights and position in the organization
摘要:
Secure operation of SEMDs on a client computer in a host system is obtained by controlling what applications (i.e., U3 applications) that can run on the host system and access data on the SEMD. Applications allowed to run on each host machine are identified and any access to the SEMD by an allowed application is permitted and other access are prohibited. Security and/or privacy for data that is stored on a SEMD is provided by only allowing approved USB memory card based applications to access the data stored on the SEMD. All other applications, either unapproved USB memory card based applications or non-SEMD resident cannot access the data on the SEMD. Other security is provided by preventing access to the SEMD except for computers or systems that are a part of a company's private network and maintaining the data on the SEMD in an encrypted state.
摘要:
A system apparatus and method for emulating a computing device are provided. Operational parameters of a server may be obtained and provided to an emulating computing device. An emulating device may emulate the server. While being emulated, a server may operate in a reduced functionality mode. Emulation of a server may be transparent to client or other machines associated with an emulated server. Conditions requiring a termination of an emulation of a server may be detected. Upon detecting conditions requiring a termination of an emulation of a server, operational or other parameters may be provided to the server and the server may assume full, or other, operational mode. Other embodiments are described and claimed.
摘要:
A system and method for a contextual control of resources of a computer. A plurality of detection modules may inform a configuration module of context changes and events. A database may store a plurality of configuration parameters and policies. A configuration module may configure a BIOS of a computer according to events, context and configuration policies. Other embodiments are described and claimed.
摘要:
Location information is translated from a variety of formats to a common uniform format and then fed into a GPS device in an easy and automatic manner. A global canonical and unique numeric representation of a specific location is created. This involves a global bi-directional translation method between an address, which may reside or presently exist in one of many possible formats, into a uniform standardized canonical representation of location. The uniform location representation can be read by, and later transferred into, a GPS device. Advantageously, this eases the process of finding desired destinations in various ways, and the ease of storing location data regarding those destinations.
摘要:
Computers connected to a private network are monitored and controlled through the use of a client agent that operates in association with the computer and a server client that establishing security parameters, privileges and authorizations for the computer. The invention can prevent access to certain devices according to an active security policy. Any activity of the computer, such as a request to transfer data to an external device, access a particular file, etc. is monitored and controlled by the client agent. No operations or procedures are allowed by the computer inconsistent with the active security policy. The security policy may be set by the administrator of the private network according to the user rights and position in the organization.
摘要:
A system and method for a contextual control of resources of a computer. A plurality of detection modules may inform a configuration module of context changes and events. A database may store a plurality of configuration parameters and policies. A configuration module may configure a BIOS of a computer according to events, context and configuration policies. Other embodiments are described and claimed.
摘要:
The pureness of a connection between an external device and a host computer can be inspected or monitored to determine the status: connected or disconnected. When it is determined that a disconnection state is entered, an indication can be sent to the host and, in parallel, the data transportation from and/or to the external device may be manipulated. In some embodiments an exemplary connection protector device (CPD) may be added to the connection in between the external device and the host. The CPD can have two connectors one for the host and one for the cable of the external device. The CPD can be adapted to identify any disconnection in the connection with the host and/or the connection with the external device on the other side of the CPD.
摘要:
The pureness of a connection between an external device and a host computer can be inspected or monitored to determine the status: connected or disconnected. When it is determined that a disconnection state is entered, an indication can be sent to the host and, in parallel, the data transportation from and/or to the external device may be manipulated. In some embodiments an exemplary connection protector device (CPD) may be added to the connection in between the external device and the host. The CPD can have two connectors one for the host and one for the cable of the external device. The CPD can be adapted to identify any disconnection in the connection with the host and/or the connection with the external device on the other side of the CPD.
摘要:
An entity can request the generation of a unique identifier to serve as a common identifier for the entity immune to changes in the entities contact information. A data base entry indexed at least in part by the unique identifier can be created for housing further contact information for the entity. The unique identifier can remain a constant focal point for contacting the entity or obtaining contact information about the entity. The entity can update contact information in the data base entry and as such, the unique identifier can be used to access current contact information.