Computing environment and apparatuses with integrity based fail over
First Claim
1. In a computing environment having a plurality of computing units, a method of operation comprising:
- determining whether integrity of a first of the computing units of the computing environment has been compromised; and
determining a degree of compromise, if the first computing unit is determined to have been compromised; and
failing the first computing unit over to one or more of the other computing units, if the degree of compromise is determined to be below a predetermined threshold.
10 Assignments
0 Petitions
Accused Products
Abstract
Computing units of a computing environment are equipped with means to determine their respective integrity. Further, each computing unit is equipped, such that if its integrity is determined to have been compromised, the computing unit automatically takes itself out of service. In one embodiment, prior to the automatically removing itself from service, a degree of compromise is determined. If the degree of compromise is determined to be within an acceptable risk level, the compromised computing unit fails itself over to one or more other computing units in the computing environment.
-
Citations
26 Claims
-
1. In a computing environment having a plurality of computing units, a method of operation comprising:
-
determining whether integrity of a first of the computing units of the computing environment has been compromised; and
determining a degree of compromise, if the first computing unit is determined to have been compromised; and
failing the first computing unit over to one or more of the other computing units, if the degree of compromise is determined to be below a predetermined threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computing apparatus comprising:
-
storage medium having stored therein a plurality of programming instructions designed to determine whether integrity of the computing apparatus has been compromised, determine a degree of compromise, if it is determined that the integrity of the computing apparatus has been compromised; and
automatically failing the computing apparatus over to one or more of companion computing apparatuses, if the degree of compromise is determined to be below a predetermined threshold; and
a processor coupled to the storage medium to execute the programming instructions. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An apparatus comprising:
-
means for determining whether integrity of the apparatus has been compromised;
means for determining a degree of compromise, if it is determined that the integrity of the apparatus has been compromised, and means for failing the apparatus over to one or more companion apparatuses, if the degree of compromise is determined to be below a predetermined threshold.
-
-
26. A computing environment, comprising
a first computing unit equipped to regularly determine whether its integrity has been compromised, and upon determining its integrity has been compromised, determine a degree of compromise, and failing itself over to at least a second computing unit, if the degree of compromise is determined to be below a predetermined threshold; - and
the second computing unit, with the second computing unit being also equipped to regularly determine whether its integrity has been compromised, and upon determining its integrity has been compromised, determine a degree of compromise, and failing itself over to at least the first computing unit, if the degree of compromise is determined to be below a predetermined threshold.
- and
Specification