Protecting computing devices from unauthorized access

ABSTRACT

Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function, role and rule-based policies, validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors and other virtual machine monitors or managers.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of U.S. patent application Ser. No. 16/520,051filed Jul. 23, 2019, which application is a continuation of U.S. patentapplication Ser. No. 16/168,517 filed on Oct. 23, 2018 and issued asU.S. Pat. No. 10,402,568, which application is a continuation of U.S.patent application Ser. No. 15/939,802 filed Mar. 29, 2018 entitled“PROTECTING COMPUTING DEVICES FROM UNAUTHORIZED ACCESS” and issued asU.S. Pat. No. 10,140,452, which application is a divisional applicationof U.S. patent application Ser. No. 14/937,315, filed Nov. 10, 2015entitled “Client Authentication and Data Management”, which is adivisional application of U.S. patent application Ser. No. 13/917,092,filed Jun. 13, 2013 entitled “Client Authentication and DataManagement”, now abandoned, which is a continuation application of U.S.patent application Ser. No. 12/514,222 filed May 8, 2009, entitled“Client Authentication and Data Management”, now U.S. Pat. No.8,468,591, which application claims the benefit of PCT Application No.PCT/US2007/081386, filed Oct. 13, 2007, entitled “Client Authenticationand Data Management System”, which application claims the priority toU.S. Provisional Patent Application Ser. No. 60/829,346, entitled“Secure Mobile Environment”, filed Oct. 13, 2006 and U.S. ProvisionalPatent Application Ser. No. 60/939,394, entitled “Client Authenticationand Data Management System Using Hypervisor Controller”, filed May 22,2007, each of which is incorporated herein by reference as if set forthherein in its entirety.

TECHNICAL FIELD

The present invention relates generally to data protection, and moreparticularly to a centrally-managed data protection system for use withcomputers and in computer systems, and more specifically, (i) systemsand methods for protecting individual computing devices (e.g., desktops,laptops, cell phones, PDAs) or confidential, sensitive, or otherproprietary data stored thereon from unauthorized access, (ii) systemsand methods for enabling the recovery of data when such computingdevices are lost or stolen or rendered inoperable and (iii) systems andmethods for enabling the communication, in real-time or otherwise,between hypervisors and one another, many others, or other control andany computer device. Such systems and methods, optionally, can takeadvantage of hypervisor technologies, as described herein.

BACKGROUND

Businesses and users are increasingly storing corporate, confidential,or sensitive data on personal digital assistants (PDAs), mobile phones,laptops, and other mobile devices that are not properly protected withinthe confines of a secure building or secure network at all times.Without the proper data protections, a thief has potential access tosensitive information, such as corporate financial data, word documents,and private client information stored on such mobile devices. The valueof the lost or stolen data is typically much higher than the value ofthe physical asset upon which it is stored. Even within the confines ofa secure building, there are reasons and needs to protect and to be ableto recover sensitive information stored on desktops, laptops, PDAs,mobile phones, and other computing devices (hereinafter, collectively,“computing devices”).

Protecting and securing data is also a high legislative priority, asevidenced by numerous laws that have been passed by Congress for manyindustries. For example, in the financial industry, theGramm-Leach-Bliley Act addresses the collection and disclosure ofpersonal financial information by financial institutions. It requiresall financial institutions to design, implement, and maintain safeguardsto protect customer information. A customer's confidential and financialelectronic documents are usually maintained in a storage database. Thedatabase security compliance obligations required by the Act includecontinual monitoring of data and the review and management ofpermissions granted to the database. Other laws and regulations such asPayment Card Industry security protection initiative, the HealthInsurance Portability and Accountability Act, Sarbanes-Oxley Act,Canadian Personal Information Protection and the Electronic DocumentsAct require information protection and strict security for electronicdocuments.

Further, most organizations do not have policies or procedures toeffectively implement disaster recovery for computing devices that arelost, stolen, or that are disabled. Typically, a user has to initiateand take affirmative actions to backup data to a separate data storagemedium, such as DVD, memory chip, or network storage device. Thisprocess is inefficient, time consuming, and only sporadically followed.Because every user of a computing device does not backup stored data ona regular or frequent enough basis, information may not be recoverableif the computing device is lost, stolen, or destroyed. If this happens,the organization loses not only hardware and software, which aretypically replaceable, but essential data that has not been backed up,which may not be as easily, if at all, replaceable.

For all of the above reasons, there is a need for systems and methods toprotect sensitive, confidential, or important information fromforeseeable threats or loss.

There is a further need for systems and methods that provide accesscontrol to computing devices, especially when they are “in the field”and not within a secure or protected environment, wherein such systemsand methods include some or all of the following capabilities:authentication, authorization, reporting, compliance-checking, remotelycontrolling, communicating, controlling bandwidth and computing resourceusage, monitoring user actions, allowing and disallowing any and allinput and output methods per flexible criteria (which may include, butare not limited to: content, name, date, timestamp, user, type),logging, addressing, powering up and down, sharing, collaborating andauditing protocols.

There is a need for systems and methods to protect and backup corporateand confidential data stored on computing devices associated with anenterprise.

There is a need for systems and methods that enhances privacy, securityand disaster readiness for an organization's computing devices.

There is a further need for systems and methods providing centralizedmanagement, security, and backing-up of computing devices.

There are further needs for systems and methods that facilitate thetransfer and storage of data from a computing device in a secure andefficient manner.

There is yet a further need for systems and methods for providingcentralized management that incorporates off-site back-up recovery,computing device data recovery, end point protection, disk encryption,device disablement, post theft protection, and data leak protection

BRIEF SUMMARY

The present systems and methods, which will sometimes be referred to as“Kylie™” or “Cosmos™” hereinafter, includes computer hardware andsoftware components that enhance privacy, security, and disasterreadiness for an organization's computing assets and, in particular,mobile assets. This, in effect, turns computing assets into “greenterminals” from a security consideration point of view.

A “green terminal” is a type of terminal that consists of a keyboard anda display screen that can be used to enter and transmit data to, ordisplay data from, a central processing computer to which it isconnected. The present invention incorporates specified data orinformation on the computing device into an encrypted, protected “Realm”that, in one preferred embodiment, is not accessible by the deviceunless the device and a specified remote authentication serverauthenticate to each other.

As used herein, the term “Realm” means and refers to a concept ofassociated computing devices, that can be dynamically created, managedand controlled by, for example, an enterprise. The term Realm is createdto define a logical affinity, rather then the well known terms “domain”and “workgroup.”

On the other hand, the protected data that falls within the Realm iseasily and readily available to the device (and potentially to theenterprise that owns the device) when certain considerations are met. Ina preferred embodiment, these considerations do not require any hardwaretoken of any kind and provide intermittent backup of the contents of thecomputing device, to protect against a disaster, theft, or other loss.The present systems and methods block unauthorized access toconfidential or sensitive data stored on the computing devices or assetsof, as an example, an enterprise. The present systems and methods alsoenable the rapid recovery of data, ensure compliance with privacy laws,and extend and help manage enterprise data policies, including and notlimited to data protection policies.

One embodiment provides a system for protecting computing devices andassociated secure data stored in at least one secure data storagecomponent from unauthorized access, the system comprising at least oneprotected computing device configured for communication through anetwork with a storage controller to access the secure data, theprotected computing device further configured for using a virtualmachine, an authentication server configured for authenticating theprotected computing device for access to the secure data; and a controlconsole configured for access to devices connected to the network,wherein the control console is configured to exert control over thedevices, wherein a virtual machine manager is launched during boot ofthe protected computing device, and wherein the virtual machineauthenticates the computing device to the authentication server.

Another embodiment provides a method for protecting computing devicesfrom unauthorized access, the method comprising: initiating a bootcommand of a protected computing device, wherein the boot command isconfigured to initiate the launch of an operating system, interceptingthe boot command, launching a virtual machine prior to the operatingsystem launch, at the virtual machine, authenticating the protectedcomputing device to an authentication server, receiving at the virtualmachine, a response from the authentication server, the responseindicating the authentication status of the protected computing device,and causing the protected computing device to enter a specified statebased on the authentication status of the protected computing device.

In one embodiment, the system performs an authenticated boot of acomputer system using the thin layer of a virtual machine on a computingdevice. The virtual machine accepts a start instruction from the deviceupon which it is installed. The start instruction may be in the form ofa power on, or a BIOS instruction, among others. It should be noted thatthe computing device may also be a mobile computing device, for example.Additionally, the computing device has an optional connection to othercommunication devices such as, for example, a centralized authenticationserver, or a replication or representation device thereof. An exemplaryauthentication server can be accessed through a gateway, or a proxy,among others. The virtual machine authenticates the validity ofinformation within the device to the authentication server.Additionally, information provided by the user of the computing devicecan also be authenticated to the authentication server. Also, theauthentication server is optionally authenticated to the computingdevice on which the virtual machine is installed using a two-wayauthentication protocol. Upon failure to authenticate, the bootingprocess of the computing device is halted. Failure to authenticate canoccur due to receiving a not-approve status, not receiving a reply, ornot receiving a valid reply, among others. Upon successful connectionand authentication, a bootstrap start is provided to the main (host)operating system.

Another embodiment provides a data processing system for anauthenticated client including, a plurality of protected client devices,a plurality of server systems for providing authentication to theprotected client devices, and a network connection between the protectedclient device(s) and the server system(s). Those of skill in the artwill readily note that the network connection can be a temporary orpermanent connection. Thus, the data processing system may provideclient authentication with or without a network connection. An innerlayer of a virtual machine on the computing device is maintained and/orfor a predetermined interval. The interval is defined in the policiesinstalled in the device, remotely downloaded from the authenticationserver, remotely downloaded from the enterprise control console, orentered by a user. The computing device continues normal operation ofthe “inner” machine and operating environment. While no longer connectedand/or after the predetermined interval to disconnect, the computingdevice shuts down or takes other action to prevent the utilization ofthe “inner” machine and operating environment. Optionally, the computingdevice re-encrypts the protected “partitions.” Of course, otherspecified areas of the storage medium can also be re-encrypted asnecessary. Upon unsuccessful connection and/or authentication, thecomputing device potentially turns off, shuts down, and/or leaves thedevice in a state such that the protected information, and also theunprotected information, on the “main” portion of the computing deviceis left in an encrypted or otherwise unintelligible condition. Optionsfor computing device handling of an unsuccessful connection andauthentication are definable by the policies, for example provided by anenterprise, using the system and are limitless.

Another embodiment of the present invention uses a hypervisor to enablea system administrator to have centralized control over every functionof the computing device. Such control is typically expressed byinput/output (I/O) control, but is not limited to those. Additionally,the hypervisor can be used for enabling encryption and decryption forprotected partitions. The hypervisor can also be used for enablingnetwork access and control.

Another embodiment provides for encryption and decryption services forprotected partitions on a computing device, and network access controlare an optional part of the hypervisor's functionally. It should benoted however, that such functions could reside in the hypervisor, onthe agent on top of the operating system, or elsewhere. Protectedpartitions are defined as files, protected areas, protected datasets,defined areas within a file system, physical drives, directories, bits,and areas of memory, among others. The information in a protectedpartition is protected from access by the hypervisor based on policiesthat include user-specific, group, subset, enterprise-specific, or somecombination of the policies. At least four different modes of operationare provided: (1) native mode, (2) replication mode, (3) reconsolidationmode, and (4) no connectivity mode.

In another embodiment, a hypervisor is configured to communicate with astorage controller to monitor any changes in protected data. Secure orprotected data on the computing device is backed up in real time or nearreal time according to pre-defined parameters. The backed up data issent to the storage controller. The storage controller acts as a fileserver. Those of skill in the art will readily understand, however, thatthe storage controller could also act as a file server controller.

In yet another embodiment, the system enables periodic backup of data onthe computing device. During an initial authentication,re-authentication procedure, set intervals, or a schedule as establishedby policies on the device, the hypervisor communicates with the remoteauthentication server to send modified data or updates to the storagecontroller associated with the authentication server.

In yet another embodiment, the system enables periodic backup of data onthe computing device. During initial authentication, re-authenticationprocedure, set intervals, or a schedule as established by policies onthe device, the hypervisor communicates with the remote authenticationserver to send the modified data or updates to the storage controllerassociated with the authentication server as above. Additionally,however, data from the computing device is indexed and stored inassociation with that particular device. The data is maintained for use,retrieval, and re-imaging onto another device upon loss, theft or damageto the original device. Additionally, the data storage also provides theenterprise with a central database of critical documents and informationthat is stored on devices throughout the enterprise.

In yet another embodiment, the system enables periodic backup of data onthe computing device. During initial authentication, re-authenticationprocedure, set intervals, or a schedule as established by policies onthe device, the hypervisor communicates with the remote authenticationserver to send the modified data or updates to the storage controllerassociated with the authentication server. Additionally, specifiedintervals can be configured for the hypervisor to communicate with theauthentication server to authenticate the device. If the specificmachine's credentials are expired or rendered invalid on theauthentication server, the system can (1) prevent the machine operatingor from continuing to operate and, depending upon policy can, (2) wait acertain interval and then shut down the machine, or (3) may encrypt,format or destroy the protected partitions and/or their contents.

In yet another embodiment, the system enables periodic backup of data onthe computing device in conditions where there is no communicationmedium available for the computing device to access the authenticationserver. During initial authentication, re-authentication procedure, setintervals, or a schedule as established by policies on the device, thehypervisor communicates with the remote authentication server to sendthe modified data or updates to the storage controller associated withthe authentication server as above. When connectivity is not possible,the device cannot be authenticated in real time. The policies for thehypervisor can either be set to prevent use of the device or,alternatively, the hypervisor allows the operating system to load. Inreplication mode, the user or enterprise allows sonic files to be copiedor created into an unprotected area, and the user is permitted to readand write files into this unprotected area. In this replication mode,once the device is next able to communicate with the authenticationserver, and after the hypervisor authenticates, the files are copiedinto the protected partition. The original files remain in theunprotected area. The reconsolidation mode also allows some files to becopied or created into an unprotected area, and the user is permitted toread and write files into this unprotected area. Similarly, in thereconsolidation mode, once the device is next able to communicate withthe authentication server, and alter the hypervisor authenticates, thefiles are copied into the protected partition. However, the files in theunprotected partition are securely automatically deleted after the fileshave been copied and saved into the protected partition or area. The “noconnectivity” mode applies when there is no communication mediumavailable for the device to access the authentication server or,alternatively, if the device is unable to authenticate but theenterprise wants the device user to have another means of authenticatingto the enterprise. In the no connectivity mode, other means ofgenerating authorization, such as, but not restricted to entering apassword or other token, allow the device to continue and authenticate,and/or operate. If alternative means are made available, the systemoptionally includes safeguards against entry of multiple incorrecttokens. Additionally, operation of the device can be disallowed orprevented.

Yet another embodiment provides a data processing system for anauthenticated client including, a plurality of protected client devices,a plurality of server systems for providing authentication to theprotected client devices, and a network connection between the protectedclient device(s) and the server system(s). Those of skill in the artwill readily note that the network connection can be a temporary orpermanent connection. Thus, the data processing system may provideclient authentication with or without a network connection.Additionally, a control console may be used to advantage by theenterprise or by a system operator to manage and control devices of theenterprise in an efficient and controlled manner. The control consolecan be used to assign policies to one or more devices within theenterprise based on any number of factors including, but not limited to,the identification of the user, the device location (present location orallowed location), the information stored on the device, and user accessto the device, among others. For security reasons, policies establishedand pushed out by the control console to devices in the enterprise maytake precedence over any policies that are hardwired or assigneddirectly on the device. The policies can be pushed out by the controlconsole to a device as part of or during an initial authenticationprocedure during boot up of the device, during any periodicre-authentication procedure required of the device, as part of thebackup protocol, or as part of any standard re-authentication proceduremandated by the policies of the device. The system, with access to thehypervisor of-each device within the enterprise, enables the enterpriseto push out software or policy updates, modifications, or changes, toinstall new programs, operating systems, or drivers, and to push outdocuments or other files, data, or information to the device, as needed.

In yet another embodiment, the hypervisor functionality allows eachdevice within the enterprise to be linked together to any other devicewithin the enterprise, through or by the control of the control console,the central authentication server(s), or another designated devise. Thecentral authentication server(s), or another authorized device, canallocate memory, space, or network or processor bandwidth of one or moredevices within the enterprise to any other one or more devices withinthe enterprise on an as needed, or as desired, basis. Further, thehypervisor on each machine can be used to communicate with hypervisorson one or more authorized machines to achieve efficiency, security,redundancy and other benefits that are inherent to communicativecomputer systems. Thus, one or more collaborative extensible hypervisorsystems are created, which is analogous to a super computer andfacilitates the notion of grid computing. This implementation has manybenefits including, but not limited to, processing capability,collaboration, less servers, and efficiency. This reduces the amount ofservers needed within an enterprise because the processing power of theCPU's of the computing devices of the enterprise are now available tothe enterprise

Other systems, methods, features and advantages of the present inventionwill be or become apparent to one with skill in the art upon examinationof the following drawings and detailed description and supporting claimsattached hereto. It is intended that all such additional systems,methods, features, and advantages be included within this descriptionand be within the scope of the present disclosure.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING

Many aspects of the invention can be better understood with reference tothe following drawings. The components in the drawings are notnecessarily to scale, emphasis instead being placed upon clearlyillustrating the principles of the present invention. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout the several views.

FIG. 1 is a system diagram illustrating a Kylie™ platform for protectionof computing devices, backup and recovery of data, and communicationwith other computing devices.

FIG. 2 is a diagram illustrating a client architecture for the system asin FIG. 1.

FIG. 3 is a diagram illustrating workflow for the system as in FIG. 1.

FIG. 4 is a workflow diagram illustrating the modes of operation for thesystem as in FIG. 1

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Reference is now made in detail to the description of the embodiments ofsystems and methods for automatic configuration of a generic digitaldevice on a wireless network as illustrated in the drawings. Theinvention may, however, be embodied in many different forms and shouldnot be construed as limited to the embodiments set forth herein; rather,these embodiments are intended to convey the scope of the invention tothose skilled in the art. Furthermore, all “examples” given herein areintended to be non-limiting.

The present invention uses a thin layer of a virtual machine on acomputing device to protect computing devices (e.g., desktops, laptops,cell phones, PDAs, among others) or data (confidential, sensitive,proprietary) stored thereon from unauthorized access. Additionally,recovery of data is enabled when such devices are lost, stolen, orotherwise rendered inoperable. Further, communication is enabled(real-time or otherwise) between hypervisors and the computingdevice(s), or other control or computer device(s). Hypervisortechnologies, as described herein, may optionally be utilized by thepresent invention.

In one embodiment, a thin layer of a virtual machine on a computingdevice accepts a “start” instruction from the device upon which it isinstalled. The start instruction can be in such forms as “power on,” and“BIOS” instructions, among others. Alternatively, the thin layer of avirtual machine could be installed on a mobile computing device toprovide significant additional benefits. Additionally, the computingdevice connects, via a choice from several available communicationoptions, to another, possibly remote, centralized authentication server,or replication or representation device thereof (e.g., a gateway, proxyor such other terms). The computing device authenticates the validity ofcertain credentials installed within the device and/or provided by auser of the device to such server or gateway. Optionally, the computingdevice authenticates the server as well, in a two-way authenticationprotocol. Failure to communicate, optionally leads to halting thebooting of the computing device. (Failure to communicate can be due toreceiving a not-approve status, not receiving a reply, or not receivinga valid reply, for example.) Upon successful connection andauthentication, the computing device provides a bootstrap start to the“main” operating system installed in the same or other “partition(s)” onthe computing device, such as, but not limited to, drives or memory.(Partitions are discussed in further detail below.) This “inner” layeris stored in a manner optionally to provide (a) encryption of datatherein, and/or (b) striping (as in a RAID technology) of data thereinfor purposes that include disaster recovery and encryption, amongothers. While this connection is maintained and/or for a predeterminedinterval thereafter (wherein the interval is, as non-limiting examples,defined in the policies installed in the device, is remotely downloadedfrom the authentication server or enterprise control console, or enteredby a user), the computing device continues normal operation of the“inner” machine and operating environment. While no longer connectedand/or after such predetermined interval to disconnect, the computingdevice shuts down or otherwise prevents the utilization of the “inner”machine and operating environment. Optionally, the computing devicere-encrypts the protected “partitions.” Upon unsuccessful connectionand/or authentication, the computing device potentially turns off, shutsdown, and/or leaves the device in a state whereby the protectedinformation and also the unprotected information on the “main” portionof the computing device is left in an encrypted or otherwiseunintelligible condition. Options for computing device handling of anunsuccessful connection and authentication are definable by thepolicies, for example provided by an enterprise, using the system andare limitless.

Preferably, the systems and methods of the present invention use a“hypervisor” to enable a system administrator to have centralizedcontrol over every-function of the computing device. Such control istypically expressed by input/output (I/O) control, but is not limited tothose.

A hypervisor is similar to, but slightly different from a“virtualization manager” or “virtual machine monitor” (VMM). Ahypervisor is a software program or system layered between the devicehardware and the operating system(s), if one or more are present. In afurther embodiment of the current invention, a hypervisor is integratedinto the circuitry installed on a device that allows one or moreoperating systems (which, for example, can include different operatingsystems or multiple instances of the same operating system or nooperating system at all) to share a single hardware processor. Thus, ahypervisor is a virtualization platform that allows none, one, or moreoperating systems to run on a host computer at the same time. The termhypervisor usually refers to an implementation using fullvirtualization. Hypervisors have traditionally been used on servers toenable the server to run multiple operating systems simultaneously. Itwill be readily understood by one of skill in the art that a virtualmachine (VM) includes a virtual machine monitor (also known as a virtualmachine manager or VMM) and includes capability for monitoring,managing, and/or controlling a virtual machine.

Hypervisors are currently classified into several types. A type 1hypervisor (or type 1 virtual machine monitor) is software that runsdirectly on a given hardware platform (as an operating system controlprogram). A “guest” operating system thus runs at the second level abovethe hardware. The classic type 1 hypervisor was CP/CMS, developed at IBMin the 1960s, ancestor of IBM's current z/VM. Another type ofhypervisor, called paravirtualization in Xen, a hypercall in ParallelsWorkstation, and a DIAGNOSE code in IBM's VM, is one that requires aguest operating system to be modified to make system calls to thehypervisor, rather than executing machine I/O instructions which arethen simulated by the hypervisor. Recent examples include Xen, VMware'sESX Server, and Sun's Logical Domains Hypervisor (released in 2005). Atype 2 hypervisor (or type 2 virtual machine monitor) is software thatruns within an operating system environment. A “guest” operating systemthus runs at the third level above the hardware. Examples include VMwareserver and Microsoft Virtual Server.

A hypervisor is a computer within a computer, implemented in software.It is a virtual machine that emulates a complete hardware system,including the video card, hard drive, network interface card, processorand memory. Therefore, the hypervisor controls the processor and managesthe processors resources such as memory, input- and output, networkinterface, etc.

The systems and methods of the present invention take advantage of ahypervisor's capabilities for previously unused purposes, particularlywhen used on a device other than a server, such as, for example, amobile computing device. In particular, the hypervisor can be programmedand configured to enable authentication of a computing device to aremote authentication server and to enable centralized control overevery function of the computing device. Either or both can circumventthe traditional OS that may be installed on said device, and isdescribed in greater detail hereinafter.

Typically, a hypervisor is designed for a particular processorarchitecture. Exemplary processors for which a hypervisor is designedinclude for example, the AMD processor with “Pacifica” (also known asAMD-V) and the Intel processor with VT-x and/or VT-d, among others. AnAMD processor with Pacifica, for example, provides the capability to usevirtualization software and a hypervisor, and wherein the, hypervisor isthe host environment. The AMD Pacifica technology enables partitioningand memory access to and from the processing core. The AMD Pacificatechnology distinguishes its processor technology from others by, amongother reasons, integrating the memory controller into the processor.Memory controllers contain logic necessary to read and write dynamicrandom access memory. AMD-V virtualization technology introduces uniquenew instructions that enable memory modes and features exclusive to itsdesign. Most of these instructions handle the memory management unit(MMU), which provides memory allocation. Under virtualization, the MMUcan map multiple operating systems, running multiple applications linkedto physical memory addresses. AMD-V offers advanced memory features,including Tagged Translation Look-Aside Buffers, which increaseperformance of this table of recently accessed memory pages by taggingthem specifically to their virtual machines. This maximizes bandwidthand minimizes latency.

I. System Architecture

Turning now to FIG. 1, an overall view of a preferred system and majorcomponents that comprise the “Kylie™ Platform” system 100 areillustrated. Specifically, computing devices 110, such as a laptopcomputer 110 a, a PDA 110 b, a cell/mobile phone 110 c, or desktopcomputer, are in communication, through the Internet 120 (or otherconventional communication network, such as a wireless, cell phone,satellite, or broadband network), with an authentication server 130.Preferably, the computing devices 110 are also in communication with astorage controller 140 with access to one or more secure data storagecomponents 150. Preferably, a control console 160, used by a systemadministrator, has access to each of the other components in the networkand has the ability to monitor or exert control over such othercomponents of the system, as will be described in greater detail herein.The system 100 typically includes at least one protected client, atleast one server system serving as the authentication mechanism to theclient(s), and a connection between at least two such systems. Theconnection can be temporary or permanent.

Turning now to FIG. 2, a simplified client architecture 200 installed ona computing device 100 is illustrated. The architecture includes, at itsbase level, a central processing unit (CPU) 210, such as an AMDw/“Pacifica” or Intel w/“VT-x” or “VT-d” with enhanced virtualizationtechnology. Running on or in control by the CPU 210 is a hypervisor 220,suitably configured and having software programming controls based onthe Kylie™ system 100. The configured hypervisor 220 includes a set ofpolicies 225 that are configurable and having capability for use in avariety of manners, as described in greater detail hereinafter.(Exemplary hypervisor policies 225 are provided below.) Above thehypervisor 220, is a conventional user environment 250 of the computingdevice 110. Such user environment 250 may include a standard orconventional operating system (or more than one) (OS) 260 and any numberof conventional software applications 280. Optionally, the userenvironment 250 also contains a Kylie™ Agent application 270 thatprovides additional functionality, such as continuous or on-going databackup and protection, as will be described in greater detail herein.

Encryption and decryption services for protected partitions and networkaccess control are an optional part of the Kylie™ hypervisor'sfunctionally. It should be noted however, that such functions couldreside in the hypervisor, on the agent on top of the operating system,or elsewhere. Protected partitions are defined as files, protectedareas, protected datasets, defined areas within a file system, physicaldrives, directories, bits, areas of memory, and the like. Theinformation in a protected partition is protected from access by thehypervisor 220 based on its policies 225. Such information is also,optionally, backed up, indexed, and stored in the secure data storagecomponents 150 within, for example, an enterprise storage system, again,based on the policies 225 of the configured hypervisor 220. As anexample, The Kylie™ hypervisor could be optionally loaded for the harddrive, from the motherboard, resident in system memory, from the CPU orchipset directly or from another chip installed on the motherboard.

As noted above, exemplary hypervisor policies 225 include, but are notlimited to groups including (I) authorization/authentication, (II)encryption, (III) device related, (IV) communications, (V) counters, and(VI) storage. Other hypervisor policies can and will flow from thecontrol console 160.

The authorization/authentication group includes policies such as (1)auto-shutdown, (2) auto-format, (3) auto-dial home (VPN, Modem, LAN,WAN, or Cellular), and (4) persistent connectivity request, amongothers.

The encryption group includes policies such as (1) when to encrypt, (2)when to decrypt, (3) when to format, expunge, or destroy the drive in aDoD 5802 compliant manner, for example, (4) what to do if the drive isremoved, (5) how to calculate checksums, CRC and other methods ofproving no tampering, (6) encryption algorithm settings, and (7)fail-over encryption settings.

The device related group includes policies such as (1) device identity(which drive), (2) device identity (which computer), and (3) deviceidentity (which NIC cards).

The communications group includes policies such as (1) preferredconnection order (network type), (2) preferred connection order (networkip address range), (3) mandatory choice (of 1), (4) mandatory choice (of2), (5) IP settings, (6) IPv6 settings, (7) notification serveraddresses, (8) gateway addresses, (9) storage addresses, (10) DNSaddresses, (11) call home settings, (12) “Lojack” functionalitysettings, (13) bandwidth throttling settings, (14) CPU throttlingsettings, (15) control console addresses, preferred and secondary, (16)USB pathway decryption, (17) USB autodetect settings, (18) USB firewallsettings, (19-21) pathway decryption, auto-detect, and firewall settingsfor CD/DVD drive, (22-24) pathway decryption, auto-detect, and firewallsettings for LAN access, (25-27) pathway decryption, auto-detect, andfirewall settings for floppy drive access, (28-30) pathway decryption,auto-detect, and firewall settings for printer access, (31-33) pathwaydecryption, auto-detect, and firewall settings for monitor access,(34-36) pathway decryption, auto-detect, and firewall settings for modemaccess, (37-39) pathway decryption, auto-detect, and firewall settingsfor hard disk drive access, (40-x) pathway decryption, auto-detect, andfirewall settings for any I/O function on the machine, whether throughCPU, network, bus, or other mechanism, (y) connectivity frequencydefault, (z) connectivity frequency fall-back, (a1) public signaturesfor recognized command consoles, (a2) public signatures for recognizedstorage controllers, (a3) public signatures for recognized mastercommand console, and (a4) public signatures for recognizedauthentication gateways.

The counters group includes policies such as (1) connectivity attempts,(2) connectivity failures, (3) connectivity pathways, (4) next hoprouters address storage, (5) boot cycles success, (6) boot cyclesfailure, (7) time running, (8) command transfer from management console,(9) data protection success, (10) data protection volume per session,and (22) data protection volume in total.

The storage group includes policies such as (1) compression ratio, (2)hardware protected area (HPA) addresses, (3) protected partitionpointers (4) file system type, (5) changed data areas, (6)consolidation, (7) reconsolidation, (8) auto consolidation settings, (9)storage filter sets, and removal device control policies.

II. Process and Methodology

FIG. 3 and FIG. 4 are workflow diagrams illustrating the Kylie™ workflow300 for the Kylie™ platform system 100. Both FIG. 3 and FIG. 4illustrate at least four exemplary modes of operation: (1) native mode,(2) replication mode, (3) reconsolidation mode, and (4) no connectivitymode. The user-specific, group, subset, or enterprise specific policiesassigned to each computing device by the enterprise remain active duringeach mode.

Specifically, FIG. 3 illustrates the workflow as viewed in a system 100setting. Operation begins with an initial boot of the computing deviceat step 310. The hardware initiates a call to the computing device 110at step 320, and the call is intercepted by a virtual machine managersuch as a hypervisor 220. After launch, the virtual machine manager‘calls home’ to the authentication server 130 to authenticate thecomputing device 110 at step 330. The virtual machine manager determineswhether the authentication passes or fails at step 340. Upon successfulauthentication, and as shown at step 350, the virtual machine manager,such as a hypervisor 220, performs continuous data protection duringnormal operation. This functionality is discussed in greater detailbelow in reference to FIG. 4.

FIG. 4 further illustrates different modes of operation for the system100. The modes of operation are as indicated above and include at least(1) native mode, (2) replication mode, (3) reconsolidation mode, and (4)no connectivity anode.

A. Native Mode

1. Device Powered on

The user of a computing device 10, such as a laptop 110 a, for example,initially boots the system at step 405 by powering on the CPU 210 orclient computing device. This initiates the BIOS.

2. Kylie™ Hypervisor Physical Loading

At step 410, the hardware initiates a call to the computing device 110and the call is intercepted by the Kylie™ hypervisor 220. Thus, theKylie™ hypervisor 220 is launched before the OS boots.

3. Start-Up Authentication

After launch, the configured hypervisor 220 causes the computing device110 to communicate with the authentication server 130 using acommunication protocol installed on the device. At step 445, the Kylie™hypervisor communicates with the platform and ‘calls home’ toauthenticate. The hypervisor 220 enables this communication withoutusing or launching the operating system installed on the computingdevice 110. It does this using a built-in or referenced communicationstack.

The computing device 110 authenticates to an authentication server 130using digital certificates or cryptographic keys. Optionally, theauthentication server 130 authenticates to the computing device 110also. As in step 435, the digital certificates and/or keys are exchangedor used to generate digital signatures between the computing device 110and the authentication server 130 so that each device can verify theauthenticity, validity, and currency, of the other device. Theauthentication process uses an authentication algorithm and uses, forexample, passwords, public key encryption, or other known authenticationmechanisms.

In a preferred embodiment, the authentication algorithm utilizes a2048-Bit encryption key that is passed and hashed. In step 450, theauthentication server 130 attempts to match the key in its authorizationdatabase, in step 455, to the known key that is stored on the device ina conventional “Challenge and Response” procedure.

4. Authentication Fails or Passes

Next, the Kylie™ hypervisor 220 determines whether the authenticationpasses or fails, at step 415. If authentication fails, it is assumedthat the integrity of the digital certificate is compromised, and isunrecognizable and invalid to the authentication server 130. Forexample, if Kylie™ has been modified in the boot sector of the computingdevice 110 associated with an enterprise, the device will not continuethe boot process. In a preferred embodiment, there are a set of policies225 or rule sets built into the Kylie™ hypervisor 220. As indicated instep 440, in the event authentication fails, the policies 225 assigned,for example, by the enterprise determine what state the device willenter upon a failed authentication. For example, if the device is a GSMwireless phone associated with an enterprise and fails to authenticate,the policy optionally specifies “destroy the SIM”.

Another policy example is “shut down the computer.” The enterprise canconfigure, using the policies installed on a particular computing device110, or based on the policies installed on all devices of theenterprise, or of a specific user or group of users, the resultingaction to the computing device due to an initial failure toauthenticate. (Exemplary hypervisor policies that can be implemented inthe hypervisor are described above.) The options for what occurs upon afailure to authenticate are essentially limitless.

After successful authentication, the Kylie™ hypervisor 220 decrypts theprotected partitions on the computing device 110, at step 420, and thestandard operating system(s) of the device, if any, is (are) launched atstep 425. The computing device 110 remains subject to the policiesimplemented by, for example, the enterprise.

5. Continuous Data Protection and Backup

Advantageously, the hypervisor 220 or the Kylie™ agent application isalso able optionally to perform continuous data protection (CDP), anadvanced form of backup and recovery. As shown at step 430, thehypervisor 220 performs continuous data protection during normaloperation. For example, at a regular interval, the hypervisor 220 orKylie™ agents can be configured to communicate with the storagecontrollers 140. It monitors any changes in the protected data. Thesystem 100 backs up the secure or protected data that is on thecomputing device 110 in real time or near real time per pre-definedparameters and sends the modified data to the storage controller 140. Ina preferred embodiment, the storage controller 140 acts as a fileserver. Those of skill in the art will readily understand, however, thatthe storage controller could also act as a file server controller.

In another feature, the present system 100 enables periodic backup ofdata on the device. During an initial authentication, re-authenticationprocedure, or during set intervals or schedule as established bypolicies on the device, the hypervisor 220 communicates with the remoteauthentication server 130 to send modified data or updates to thestorage controller 140 associated with the authentication server 130.The data is indexed and stored in association with the particulardevice. Not only can such data be maintained for use, retrieval, andre-imaging onto a new device upon loss, theft or damage to the originaldevice, but such data storage also provides the enterprise with acentral database of critical documents and information that is stored ondevices throughout the enterprise.

6. Continuous Monitoring of Valid (Non-Compromised) State

Specified intervals can be configured for the hypervisor 220 or Kylie™agents to communicate with the authentication server 130 to authenticatethe device. If the specific machine's credentials are expired orrendered invalid on the authentication server, as validated at step 415,the system 100 can prevent the machine operating or from continuing tooperate, and, depending upon policy can, wait a certain interval, shutdown the machine and/or encrypt or format the protected partitions, asin step 440.

B. Replication Mode

Replication mode allows the operating system to load and for specifiedfiles to be copied or created into an unprotected area. In certainsituations, no communication medium is available for tie device toaccess the authentication server 130 as, for example, when the device ison a plane or in an area in which there is no wired or wirelessconnectivity. When connectivity is not possible, the device cannot beauthenticated in real time. The policies for the hypervisor 220 caneither be set to prevent use of the device at all or, alternatively, inreplication mode, the hypervisor 220 allows the operating system toload. The user or enterprise allows some files to be copied or createdinto the unprotected area, and the user is also permitted to read andwrite files into this unprotected area. In replication mode, once thedevice is next able to communicate with the authentication server 130,and after the hypervisor 220 authenticates, the files are copied intothe protected partition. The original files remain in the unprotectedarea. This mode is dependent upon the policies assigned to the computingdevice by, for example, the enterprise.

C. Reconsolidation Mode

This reconsolidation mode is similar to the replication mode in that theuser or enterprise allows some files to be copied or created into anunprotected area, and the user is permitted to read and write files intothis unprotected area. Similarly, in reconsolidation mode, once thedevice is next able to communicate with the authentication server 130,and after the hypervisor 220 authenticates, the files are copied intothe protected partition. However, the files in the unprotected partitionare securely automatically deleted after the files have been copied andsaved into the protected partition or area.

D. No Connectivity and Device is Unable to Authenticate Mode

The no connectivity mode applies when there is no communication mediumavailable for the device to access the authentication server 130 or,alternatively, if the device is unable to authenticate but theenterprise wants the device user to have another means of authenticatingto the enterprise. The enterprise can set a policy to enable the use ofalternative means to authenticate and gain access to the protected areasof the device. As above, the user or enterprise allows some files to becopied or created into an unprotected area, and the user is permitted toread and write files into this unprotected area. In the no connectivitymode, other means of generating authorization, such as, but notrestricted to entering a password or other token, allow the device tocontinue and authenticate, and/or operate. If alternative means are madeavailable, the system 100 optionally includes safeguards against entryof multiple incorrect tokens. Additionally, operation of the device canbe disallowed or prevented.

In one embodiment (if Internet connectivity is available), thehypervisor 220 launches a specified display, possibly in the form of awebpage that provides a phone number or email address for the user toobtain a code or to receive an email authorization to authenticate thedevice. If Internet connectivity is not available, the hypervisor 220can be programmed to display a phone number for the user to call topresent suitable credentials and to authenticate to the device outsideof the standard authentication used by the device and authenticationserver 130. The user then enters the code or number provided by thephone call or email and, if the number matches pre-defined criteriastored in the hypervisor 220, the device is able to boot its operatingsystem and provide, optionally, access to the protected areas or data onthe device. If the number does not match after some specified butlimited number of attempts, the enterprise can establish a policy andprogram the hypervisor 220 to act in a desired manner (i.e., not boot,boot but not provide access to protected areas of or protectedinformation on the device, prevent further start-up attempts, disablethe device, etc.).

III. Other Features and Aspects

The following are additional features and aspects of the presentinvention and are enabled by use of the hypervisor 220 as discussedabove.

Specifically, a control console 160 may be used to advantage by theenterprise or by a system operator to manage and control devices of theenterprise in an efficient and controlled manner. The control console160 can be used to assign policies 225 to one or more devices within theenterprise based on any number of factors including, but not limited to,the identification of the user, the device location (present location orallowed location), the information stored on the device, user access tothe device, and the like. For security reasons, policies 225 establishedand pushed out by the control console 160 to devices in the enterprisemay take precedence over any policies 225 that are hardwired or assigneddirectly on the device. Such policies can be pushed out by the controlconsole 160 to a device as part of or during an initial authenticationprocedure during boot up of the device, during any periodicre-authentication procedure required of the device, as part of thebackup protocol, or as part of any standard re-authentication proceduremandated by the policies 225 of the device.

Advantageously, the system 100, with access to the hypervisor 220 ofeach device within the enterprise, enables the enterprise to push outsoftware or policy updates, modifications, or changes, to install newprograms, operating systems, or drivers, and to push out documents orother files, data, or information to the device, as needed. Thefrequency of such updates is governed solely by how often the hypervisorpolicies 225 require the device to authenticate or re-authenticate withthe remote authentication server 130. Upon any contact or communicationby the device with the authentication server 130, such information canbe pushed out and required to be accepted or installed on the device aspart of the continuing authorization provided to the hypervisor 220 bythe authentication server 130 for the device to function properly ornormally.

In another embodiment, each device within the enterprise can be linkedtogether through or by the central authentication server(s) 130 throughthe hypervisor functions. The central authentication server(s) 130 canallocate memory, space, network or processor bandwidth of one or moredevices within the enterprise to any other one or more devices withinthe enterprise on an as needed or as desired basis. Further, thehypervisor 220 on each machine can be used to communicate withhypervisors 220 on one or more authorized machines to achieveefficiency, security, redundancy and other benefits that are inherent tocommunicative computer systems. Doing so, in one embodiment, creates onecollaborative extensible hypervisor system, which is analogous to asuper computer and facilitates, in certain embodiments, the computingGrid notion. This implementation has many benefits including forexample, processing capability, collaboration, less servers, andefficiency. This reduces the amount of servers needed within anenterprise because the processing power of the CPU's of the computingdevices of the enterprise are now available to the enterprise.

In another embodiment, the hypervisor 220 enables a system administratorto have centralized control over every function of the computing devices110 within an enterprise. This level of functionality centralizescommunications, control, support, and enhances security along with thetraditional features of virtualization. Additional features includereduced boot time, central manageability, encryption adjustable fromhard drive/partition/folder/file/type, immediate and continuousback-ups, remote back-up capability, local restore capability, remoterestore capability, and remote policy extension. Further, there is noneed for a physical key, and no need for a TPM chip. Further featuresinclude remote computer look-up capability, remote expunge capability(remote formatting), Lojack, forced security option, asset management,reduced need for a local firewall, centralized data search capability,retention of company-compliant user authentication mechanisms, and isvirtually invisible to the user. Finally, additional features alsoinclude zero learning curve, simple distribution, create a securepathway to corporate intranet, works on desktops, works on laptops,works on cell phones, exports to OpenView, Tivoli, XML, SMTP, and SNMP,and other such standard formats, and provides corporate data recoveryability.

Accordingly, it will be understood that various embodiments of thepresent invention described herein are preferably implemented as aspecial purpose or general-purpose computer including various computerhardware as discussed in greater detail below. Embodiments within thescope of the present invention also include computer-readable media forcarrying or having computer-executable instructions or data structuresstored thereon. Such computer-readable media can be any available mediawhich can be accessed by a general purpose or special purpose computer,or downloadable to through wireless communication networks. By way ofexample, and not limitation, such computer-readable media can comprisephysical storage media such as RAM, ROM, flash memory, EEPROM, CD-ROM,DVD, or other optical disk storage, magnetic disk storage or othermagnetic storage devices, any type of removable non-volatile memoriessuch as secure digital (SD), flash memory, memory stick etc., or anyother medium which can be used to carry or store computer program codein the form of computer-executable instructions or data structures andwhich can be accessed by a general purpose or special purpose computer,or a mobile device.

When information is transferred or provided over a network or anothercommunications connection (either hardwired, wireless, or a combinationof hardwired or wireless) to a computer, the computer properly views theconnection as a computer-readable medium. Thus, any such a connection isproperly termed and considered a computer-readable medium. Combinationsof the above should also be included within the scope ofcomputer-readable media. Computer-executable instructions comprise, forexample, instructions and data which cause a general purpose computer,special purpose computer, or special purpose processing device such as amobile device processor to perform one specific function or a group offunctions.

Those skilled in the art will understand the features and aspects of asuitable computing environment in which aspects of the invention may beimplemented. Although not required, the inventions will be described inthe general context of computer-executable instructions, such as programmodules, being executed by computers in networked environments. Suchprogram modules are often reflected and illustrated by flow charts,sequence diagrams, exemplary screen displays, and other techniques usedby those skilled in the art to communicate how to make and use suchcomputer program modules. Generally, program modules include routines,programs, objects, components, data structures, etc. that performparticular tasks or implement particular abstract data types, within thecomputer. Computer-executable instructions, associated data structures,and program modules represent examples of the program code for executingsteps of the methods disclosed herein. The particular sequence of suchexecutable instructions or associated data structures represent examplesof corresponding acts for implementing the functions described in suchsteps.

Those skilled in the art will also appreciate that the invention may bepracticed in network computing environments with many types of computersystem configurations, including personal computers, hand-held devices,multi-processor systems, microprocessor-based or programmable consumerelectronics, networked PCs, minicomputers, mainframe computers, and thelike. The invention may also be practiced in distributed computingenvironments where tasks are performed by local and remote processingdevices that are linked (either by hardwired links, wireless links, orby a combination of hardwired or wireless links) through acommunications network. In a distributed computing environment, programmodules may be located in both local and remote memory storage devices.

An exemplary system for implementing the inventions, which is notillustrated, includes a general purpose computing device in the form ofa conventional computer, including a processing unit, a system memory,and a system bus that couples various system components including thesystem memory to the processing unit. The computer will typicallyinclude one or more magnetic hard disk drives (also called “data stores”or “data storage” or other names) for reading from and writing to. Thedrives and their associated computer-readable media provide nonvolatilestorage of computer-executable instructions, data structures, programmodules, and other data for the computer. Although the exemplaryenvironment described herein employs a magnetic hard disk, a removablemagnetic disk, removable optical disks, other types of computer readablemedia for storing data can be used, including magnetic cassettes, flashmemory cards, digital video disks (DVDs), Bernoulli cartridges, RAM,ROM, and the like.

Computer program code that implements most of the functionalitydescribed herein typically comprises one or more program modules may bestored on the hard disk or other storage medium. This program code, asis known to those skilled in the art, usually includes an operatingsystem, one or more application programs, other program modules, andprogram data. A user may enter commands and information into thecomputer through keyboard, pointing device, or other input devices (notshown), such as a microphone, game pad, satellite dish, scanner, or thelike. These and other input devices are often connected to theprocessing unit through known electrical, optical, or wirelessconnections.

The main computer that affects many aspects of the inventions willtypically operate in a networked environment using logical connectionsto one or more remote computers or data sources, which are describedfurther below. Remote computers may be another personal computer, aserver, a router, a network PC, a peer device or other common networknode, and typically include many or all of the elements described aboverelative to the main computer system in which the inventions areembodied. The logical connections between computers include a local areanetwork (LAN), a wide area network (WAN), and wireless networks,including cellular, WiFi, WiMax, and other networks, that are presentedhere by way of example and not limitation. Such networking environmentsare commonplace in office-wide or enterprise-wide computer networks,intranets and the Internet.

When used in a LAN or wireless networking environment, the main computersystem implementing aspects of the invention is connected to the localnetwork through a network interface or adapter. When used in a WAN orwireless networking environment, the computer may include a modem, awireless link, or other means for establishing communications over thewide area network, such as the Internet. In a networked environment,program modules depicted relative to the computer, or portions thereof,may be stored in a remote memory storage device. It will be appreciatedthat the network connections described or shown are exemplary and othermeans of establishing communications over wide area networks or theInternet may be used.

In view of the foregoing detailed description of preferred embodimentsof the present invention, it readily will be understood by those personsskilled in the art that the present invention is susceptible to broadutility and application. While various aspects have been described inthe context of a preferred embodiment, additional aspects, features, andmethodologies of the present invention will be readily discernabletherefrom. Many embodiments and adaptations of the present inventionother than those herein described, as well as many variations,modifications, and equivalent arrangements and methodologies, will beapparent from or reasonably suggested by the present invention and theforegoing description thereof, without departing from the substance orscope of the present invention. Furthermore, any sequence(s) and/ortemporal order of steps of various processes described and claimedherein are those considered to be the best mode contemplated forcarrying out the present invention. It should also be understood that,although steps of various processes may be shown and described as beingin a preferred sequence or temporal order, the steps of any suchprocesses are not limited to being carried out in any particularsequence or order, absent a specific indication of such to achieve aparticular intended result. In most cases, the steps of such processesmay be carried out in a variety of different sequences and orders, whilestill falling within the scope of the present inventions. In addition,some steps may be carried out simultaneously. Accordingly, while thepresent invention has been described herein in detail in relation topreferred embodiments, it is to be understood that this disclosure isonly illustrative and exemplary of the present invention and is mademerely for purposes of providing a full and enabling disclosure of theinvention. The foregoing disclosure is not intended nor is to beconstrued to limit the present invention or otherwise to exclude anysuch other embodiments, adaptations, variations, modifications andequivalent arrangements, the present invention being limited only by theclaims appended hereto and the equivalents thereof.

What is claimed is:
 1. A computer-implemented method of creating avirtual machine manager module comprising a hypervisor and a pluralityof virtual machines to protect against the unauthorized use of systemresources in a distributed computer system spread across multiplenetwork nodes, comprising the following steps in any sequential ornon-sequential order: (a) establishing a communication interface with afirst computing device located at a first network node after power-on ofsaid device over a network, said first computing device comprising atleast one of memory, storage, input/output functions and networkcapabilities; (b) providing a first virtual machine to run on said firstcomputing device, said first virtual machine corresponding to a firstoperating system; (c) launching said first operating systemcorresponding to said first virtual machine for use on said remotecomputing device; (d) communicating with second computing device locatedat a second network node, wherein in response to said first computingdevice requesting said first virtual machine, a computer code segment isused to request authentication prior to launching said first operatingsystem corresponding to said first virtual machine, said requestcomprising information relating to an attribute or characteristic ofsaid first computing device; (e) receiving a response token generated bysaid second computing device in response to said authentication request,wherein said first operating system is launched or not launched on saidfirst computing device depending at least in part upon the content ofsaid response token; (f) implementing a virtual machine-related policygoverning an attribute or characteristic of said first virtual machine;and (g) communicating with a control console, wherein said controlconsole monitors and presents data relating to said distributed computersystem, including data relating to at least one of said plurality ofvirtual machines, (h) permitting said first computing device to accessdata from a storage computing device located at a third network nodeafter said response token is generated and said first operating systemis launched.
 2. The method of claim 1, wherein said first computingdevice boots a host operating system prior to the launch of said firstvirtual machine and said first operating system.
 3. The method of claim1, wherein said virtual machine is launched during the boot of saidfirst computing device to run on said computing device without anunderlying host operating system.
 4. The method of claim 2, wherein atleast one attribute of said first virtual machine includes a limitationon memory, storage, or input/output functions according to said policy.5. The method of claim 4, wherein said control console is located at afourth network node.
 6. The method of claim 5, wherein said secondcomputing device is a server.
 7. A computer-implemented method ofcreating a distributed computer system spread across multiple networknodes and using an authentication routine to protect against theunauthorized access of system resources, comprising the following stepsin any order: (a) establishing an interface facilitating communicationover a network to a plurality of remote computing devices, each of saidcomputing devices comprising at least one of memory, storage,input/output functions, and network capabilities; (b) establishing avirtual machine manager module comprising a hypervisor sub-component anda communication interface subcomponent configured to receive a requestfrom a first of said plurality of remote computing devices located at afirst network node for a virtual machine, said virtual machinecorresponding to an operating system; (c) communicating via said virtualmachine manager module a request to authenticate to an authenticationserver located at a second network node prior to providing said virtualmachine and launching said operating system; (d) based at least in partupon an action undertaken by said authentication server in response tosaid request to authenticate, said virtual machine manager module eitherproviding said virtual machine and launching said operating system, ordeclining to launch at least one of said virtual machine or saidoperating system, (e) said virtual machine manager module communicatingwith a network administration computing device, wherein said networkadministration computing device monitors and presents data relating toan attribute or characteristic of at least one of said virtual machine,and (f) implementing a virtual machine-related policy governing anattribute or characteristic of said virtual machine.
 8. The method ofclaim 7, wherein said virtual machine manager module is used toimplement authorization of services associated with said virtualmachine.
 9. The method of claim 8, further comprising the step ofproviding a credential to said authentication server as part of saidrequest to authenticate, whereupon said authentication server respondsat least in part by supplying a token, said token comprising anauthorized scope of specific services or data associated with saidvirtual machine.
 10. The method of claim 9, wherein said networkadministration computing device is located at a third network node. 11.The method of claim 10, wherein at least one of said virtual machinemanager module and said network administration computing deviceimplements authorization of at least one service which said user isentitled to perform via said virtual machine.
 12. A computer-implementedmethod of distributing components across multiple network nodes of acomputer system using an authentication routine to enable access toauthorized system resources, comprising in any order: (a) using a firstcomputer program code segment to create an interface configured tocommunicate over a network comprising a plurality of computing devicesat multiple locations, each location comprising at least one networknode; (b) using a second computer program code segment to create aninterface configured to create a logical connection between a first ofsaid plurality of computing devices located at a first network node anda storage controller enabling access to data from a data storagerepository which is located at a second network node; (c) using a thirdcomputer program code segment to launch an operating systemcorresponding to said virtual machine on said first of said plurality ofcomputing devices, said third computer program code segment comprising ahypervisor and implemented in whole or in part on one or more of saidplurality of computing devices; (d) using a fourth computer program codesegment at an authentication server located at a third network node toauthenticate by generating an authorization token in response to aproper request for authentication, the content of said authorizationtoken providing an indicia of authorization to employ said operatingsystem on said first of said plurality of computing devices; (e) using afifth computer program code segment at a control console to control atleast one of said plurality of computing devices remotely; wherein saidvirtual machine is launched between the start time of the said first ofsaid plurality of computing devices and the launch time of saidoperating system for said first of said plurality of computing devices,based at least in part upon the content of said authorization token, 13.The method of claim 12, wherein the launch of said operating system doesnot occur without said authorization token.
 14. The method of claim 13,wherein said third computer program code segment does not reside in saidauthentication server.
 15. The method of claim 14, wherein said thirdcomputer program code segment comprises a hypervisor code sub-segmentand a communication code sub-segment, each of which executes at separatenetwork nodes.
 16. The method of claim 15, wherein said control consoleexerts direct or indirect control over said first of said plurality ofcomputing devices via at least one policy related to one or more ofinput/output, memory, or storage associated with said first of saidplurality of computing devices.
 17. The method of claim 16, wherein saidstorage controller is located ata fourth network node.
 18. The method ofclaim 17, wherein said control console is located at a fifth networknode.
 19. The method of claim 18, said authorization token comprisingindicia of an authorized scope of service or data.
 20. The method ofclaim 19, wherein said data from a data storage repository is encrypted.21. The method of claim 20, wherein said data from a data storagerepository is organized into partitioned volumes.
 22. The method ofclaim 21, wherein said first of said plurality of computing devices is aportable, handheld electronic device.
 23. The method of claim 21,wherein said first of said plurality of computing devices is a computer.24. The method of claim 21, wherein said first of said plurality ofcomputing devices is a server.