Virtual machine access control
First Claim
Patent Images
1. A method of mobile computing device operation, comprising:
- receiving a beacon signal at a computing device only upon the computing device entering within a beacon signal range;
determining that the computing device is in the beacon signal range from a strength thereof being above a predefined strength;
determining that a virtual machine associated with the beacon signal exists in the computing device;
running an instance of the virtual machine on the computing device within a host operating system using a component of the beacon signal while the computing device determinably remains within the beacon signal range from the strength thereof remaining above the predefined strength, wherein the component of the beacon signal comprises a private key by which the virtual machine is decrypted; and
enabling termination of the running of the instance of the virtual machine when the computing device is determinably outside beacon signal range from the strength thereof being below the predefined strength.
1 Assignment
0 Petitions
Accused Products
Abstract
A system is provided and includes a broadcasting device configured to emit a beacon signal over a predefined range and a mobile computing device. The mobile computing device is configured to run a host operating system at any location. The mobile computing device is further configured to run a virtual machine associated with the beacon signal within the host operating system but only when the computing device is in range of the beacon signal of a predefined strength.
-
Citations
6 Claims
-
1. A method of mobile computing device operation, comprising:
-
receiving a beacon signal at a computing device only upon the computing device entering within a beacon signal range; determining that the computing device is in the beacon signal range from a strength thereof being above a predefined strength; determining that a virtual machine associated with the beacon signal exists in the computing device; running an instance of the virtual machine on the computing device within a host operating system using a component of the beacon signal while the computing device determinably remains within the beacon signal range from the strength thereof remaining above the predefined strength, wherein the component of the beacon signal comprises a private key by which the virtual machine is decrypted; and enabling termination of the running of the instance of the virtual machine when the computing device is determinably outside beacon signal range from the strength thereof being below the predefined strength. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification