Resource authorizations dependent on emulation environment isolation policies
First Claim
Patent Images
1. An apparatus comprising:
- one or more non-transitory computer-readable storage media containing executable code to implement a method including at least;
creating multiple emulation environments including at least a virtual environment and a physical emulation environment;
selecting an emulation environment from the multiple emulation environments in response to an identified event category;
obtaining a resource authorization dependent upon at least a monitoring system output, a user input, or a system-wide policy signifying an apparent compliance with a policy of causing the selected emulation environment to isolate a first software object type from a second software object type, wherein the isolate the first software object type is at least one of a temporary isolation; and
signaling a decision whether to comply with the policy of causing the selected emulation environment to isolate the first software object type from the second software object type, wherein the policy is selectively,associated with one or more resources or resource types; and
implemented according to an apparent nature of a potential vulnerability.
5 Assignments
0 Petitions
Accused Products
Abstract
A system, method, computer program product, and carrier are described for obtaining a resource authorization dependent upon apparent compliance with a policy of causing an emulation environment to isolate a first software object type from a second software object type; and signaling a decision whether to comply with the policy of causing the emulation environment to isolate the first software object type from the second software object type.
-
Citations
26 Claims
-
1. An apparatus comprising:
one or more non-transitory computer-readable storage media containing executable code to implement a method including at least; creating multiple emulation environments including at least a virtual environment and a physical emulation environment; selecting an emulation environment from the multiple emulation environments in response to an identified event category; obtaining a resource authorization dependent upon at least a monitoring system output, a user input, or a system-wide policy signifying an apparent compliance with a policy of causing the selected emulation environment to isolate a first software object type from a second software object type, wherein the isolate the first software object type is at least one of a temporary isolation; and signaling a decision whether to comply with the policy of causing the selected emulation environment to isolate the first software object type from the second software object type, wherein the policy is selectively, associated with one or more resources or resource types; and implemented according to an apparent nature of a potential vulnerability. - View Dependent Claims (2, 3, 4)
-
5. An apparatus comprising:
-
one or more emulation environments including at least a virtual environment and a physical emulation environment; an emulation environment selected from the multiple emulation environments in response to the specific event category identified; one or more non-transitory computer-readable storage media storing a device-detectable output indicating an occurrence of obtaining a resource authorization dependent upon at least a monitoring system output, a user input, or a system-wide policy signifying an apparent compliance with a policy of causing the selected emulation environment to isolate a first software object type from a second software object type, wherein the isolate the first software object type is at least one of a temporary isolation; and circuitry for signaling a decision whether to comply with the policy of causing the selected emulation environment to isolate the first software object type from the second software object type, wherein the policy is selectively associated with one or more resources or resource types, associated with one or more resources or resource types; and implemented according to an apparent nature of a potential vulnerability. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A device implemented method comprising:
performing, on the device, a reception of or a transmission of one or more instructions in relation to a second method that includes at least; creating one or more emulation environments including at least a virtual environment and a physical emulation environment; selecting an emulation environment from the multiple emulation environments in response to the specific event category identified; obtaining a resource authorization dependent upon at least a monitoring system output, a user input, or system-wide policy signifying an apparent compliance with a policy of causing the selected emulation environment to isolate a first software object type from a second software object type, wherein the isolate the first software object type is at least one of a temporary isolation; and signaling a decision whether to comply with the policy of causing the selected emulation environment to isolate the first software object type from the second software object type, wherein the policy is selectively associated with one or more resources or resource types, associated with one or more resources or resource types; and implemented according to an apparent nature of a potential vulnerability. - View Dependent Claims (26)
Specification