A security manager receives a request for data that is subject to data security management. The security manager operates independently of a host partition and is not directly accessible or detectable by the host partition. The security manager determines whether to grant or deny access to the requested data based at least in part on a requesting user's authentication credentials. If the data request is approved, a security policy associated with the data is determined. In addition, instructions are sent to a system hypervisor to create a secure partition. The hypervisor loads the requested data and a verified version of an application necessary to access the data into the secure partition creating a secure environment for accessing the data.

 
Web www.patentalert.com

< System security approaches using multiple processing units

> Classification of electronic mail into multiple directories based upon their spam-like properties

> System for reclassification of electronic messages in a spam filtering system

~ 00595