Computing environment and apparatuses with integrity based fail over
First Claim
Patent Images
1. In a computing environment having a plurality of computing units, a method of operation comprising:
- determining whether integrity of a first of the computing units of the computing environment has been compromised;
determining a degree of compromise of the integrity of the first computing unit with respect to a level of risk, if the integrity of the first computing unit is determined to have been compromised; and
soft failing the first computing unit over to one or more of the other computing units, including transferring any active user sessions to the one or more of the other computing units, if the degree of compromise of the integrity of the first computing unit is determined to be below a predetermined threshold with respect to the level of risk.
10 Assignments
0 Petitions
Accused Products
Abstract
Computing units of a computing environment are equipped with means to determine their respective integrity. Further, each computing unit is equipped, such that if its integrity is determined to have been compromised, the computing unit automatically takes itself out of service. In one embodiment, prior to the automatically removing itself from service, a degree of compromise is determined. If the degree of compromise is determined to be within an acceptable risk level, the compromised computing unit fails itself over to one or more other computing units in the computing environment.
73 Citations
26 Claims
-
1. In a computing environment having a plurality of computing units, a method of operation comprising:
-
determining whether integrity of a first of the computing units of the computing environment has been compromised; determining a degree of compromise of the integrity of the first computing unit with respect to a level of risk, if the integrity of the first computing unit is determined to have been compromised; and soft failing the first computing unit over to one or more of the other computing units, including transferring any active user sessions to the one or more of the other computing units, if the degree of compromise of the integrity of the first computing unit is determined to be below a predetermined threshold with respect to the level of risk. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computing apparatus comprising:
storage medium having stored therein a plurality of programming instructions designed to determine whether integrity of the computing apparatus has been compromised; determine a degree of compromise with respect to the integrity of the computing apparatus with respect to a level of risk, if it is determined that the integrity of the computing apparatus has been compromised; and automatically soft failing the computing apparatus over to one or more of companion computing apparatuses. including transferring any active user sessions to the one or more of companion computing appratuses, if the degree of compromise with respect to the integrity of the first computing unit is determined to be below a predetermined threshold with respect to the level of risk; and a processor coupled to the storage medium to execute the programming instructions. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
25. An apparatus comprising:
-
means for determining whether integrity of the apparatus has been compromised; means for determining a degree of compromise with respect to the integrity of the apparatus with respect to a level of risk, if it is determined that the integrity of the apparatus has been compromised, and means for soft failing the apparatus over to one or more companion apparatuses, including transferring any active user sessions to the one or more companion apparatuses, if the degree of compromise with respect to the integrity of the apparatus is determined to be below a predetermined threshold with respect to the level of risk.
-
-
26. A computing environment, comprising:
-
a first computing unit equipped to regularly determine whether its integrity has been compromised, and upon determining its integrity has been compromised, determine a degree of compromise with respect to a level of risk, and soft failing it self over to at least a second computing unit, including transferring any active user sessions to the at least a second computing unit, if the degree of compromise is determined to be below a predetermined threshold with respect to the level of risk; and the second computing unit, with the second computing unit being also equipped to regularly determine whether its integrity has been compromised, and upon determining its integrity has been compromised with respect to a level of risk, determine a degree of compromise, and soft failing itself over to at least the first computing unit, including transferring any active user sessions to the at least the first computing unit, if the degree of compromise is determined to be below a predetermined threshold with respect to the level of risk.
-
Specification