SYSTEM INTEGRITY MANAGER
First Claim
1. A method for providing security, comprising transforming an operational behavior of an instance of a computing system from a general purpose computing system to a special purpose computing system, wherein the operational behavior is transformed by using at least one of a system integrity sensor, a system integrity effector, a set of system integrity policies, and system integrity data.
1 Assignment
0 Petitions
Accused Products
Abstract
A system integrity manager, system, computer program product and method for providing security may include transforming an operational behavior of an instance of a computing system from a general purpose computing system to a special purpose computing system. The operational behavior may be transformed by using at least one of a system integrity sensor and a system integrity effector and a set of system integrity policies and system integrity data.
-
Citations
25 Claims
- 1. A method for providing security, comprising transforming an operational behavior of an instance of a computing system from a general purpose computing system to a special purpose computing system, wherein the operational behavior is transformed by using at least one of a system integrity sensor, a system integrity effector, a set of system integrity policies, and system integrity data.
-
11. A system for providing security, comprising:
-
a system integrity manager for transforming an operational behavior of an instance of a computing system from a general purpose computing system to a special purpose environment; and
at least one system integrity sensor to gather operational data related to operating conditions and operations within the computing system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for providing security, the computer program product comprising:
a computer useable medium having computer useable program code embodied therein, the computer useable medium comprising;
computer useable program code configured to transform an operational behavior of an instance of a computing system from a general purpose computing system to a special purpose computing system. - View Dependent Claims (20, 21, 22, 23, 24, 25)
Specification