DATA MANAGEMENT
First Claim
Patent Images
1. A method comprising:
- encrypting data;
managing the encrypted data using a virtual machine;
storing the encrypted data and a virtual machine together as a virtual machine-data image, wherein the virtual machine is configured to exert management control over the encrypted data based on policies set by an owner of the data;
transferring the virtual machine-data image as a mobile agent from a first web-based service provider to a second web-based service provider; and
controlling usage or movement of the data at the second web-based service provider using the virtual machine of the machine-data image.
2 Assignments
0 Petitions
Accused Products
Abstract
In one implementation, encrypted data and a virtual machine are stored together as a virtual machine-data image, wherein the virtual machine is configured to EXERT management control over the data based on policies set by an owner of the data. In another implementation, metadata defining or tagging policies for usage of data is associated with the data. Control capabilities of service providers are mapped to the policies, wherein those service provider environments that best satisfy the controls mapped to the policies are identified.
-
Citations
20 Claims
-
1. A method comprising:
-
encrypting data; managing the encrypted data using a virtual machine; storing the encrypted data and a virtual machine together as a virtual machine-data image, wherein the virtual machine is configured to exert management control over the encrypted data based on policies set by an owner of the data; transferring the virtual machine-data image as a mobile agent from a first web-based service provider to a second web-based service provider; and controlling usage or movement of the data at the second web-based service provider using the virtual machine of the machine-data image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
associating metadata with data, the metadata identifying policies for usage and movement of the data; mapping controls for satisfying the policies to the policies; and comparing control capabilities of a service provider environment to the controls mapped to the policies. - View Dependent Claims (11, 12, 13, 14, 15, 16, 18, 19, 20)
-
-
17. An apparatus comprising:
-
a persistent memory storage device; a virtual image stored on the persistent memory storage device, the virtual image comprising; encrypted data; and a virtual machine configured to exert management control over the encrypted data based on policies set by an owner of the data.
-
Specification