INFORMATION PROTECTION METHOD AND SYSTEM
    4.
    发明申请
    INFORMATION PROTECTION METHOD AND SYSTEM 有权
    信息保护方法与系统

    公开(公告)号:US20150254478A1

    公开(公告)日:2015-09-10

    申请号:US14364076

    申请日:2013-09-27

    Inventor: Oscar Khesin

    Abstract: Techniques described herein generally relate to protecting information stored in a mobile communication device. In one embodiment, a mobile communication device may include a data security module, a control circuitry, a first memory unit configured to store a first information, a first battery unit configured to supply power to the mobile communication device, and a second battery unit configured to supply power to the data security module and the control circuitry in response to a trigger event. The data security module is further configured to activate the control circuitry to perform a particular action on the first information, such as at least a partial erasure of the first information.

    Abstract translation: 本文描述的技术通常涉及保护存储在移动通信设备中的信息。 在一个实施例中,移动通信设备可以包括数据安全模块,控制电路,被配置为存储第一信息的第一存储器单元,被配置为向移动通信设备供电的第一电池单元以及被配置为 以响应于触发事件向数据安全模块和控制电路供电。 数据安全模块还被配置为激活控制电路以对第一信息执行特定动作,例如至少部分擦除第一信息。

    SECURE MIGRATION OF VIRTUAL MACHINES
    5.
    发明申请
    SECURE MIGRATION OF VIRTUAL MACHINES 有权
    虚拟机的安全移动

    公开(公告)号:US20150220356A1

    公开(公告)日:2015-08-06

    申请号:US14686608

    申请日:2015-04-14

    Inventor: Oscar Khesin

    Abstract: Technologies are generally described for the secure live migration of virtual machines. The migration may take place in the context of, for example, public clouds. In various embodiments, by using a hidden process incorporated in a virtual machine's kernel and a trusted wireless and/or wired positioning service, a cloud provider and/or cloud user may be alerted about possible virtual machine hijacking/theft. The provider or user may also be provided with an approximate physical location of the platform running the compromised virtual machine for further investigation and enforcement measures.

    Abstract translation: 技术通常被描述为虚拟机的安全实时迁移。 迁移可能发生在例如公共云的上下文中。 在各种实施例中,通过使用结合在虚拟机的内核中的隐藏过程和可信赖的无线和/或有线定位服务,云提供商和/或云用户可能被警告可能的虚拟机劫持/窃取。 提供商或用户还可以被提供有运行受损虚拟机的平台的近似物理位置,以用于进一步的调查和执行措施。

Patent Agency Ranking