Abstract: A computer system (10) for providing virtual computers includes a pool facility (38) for storing a pool (40) of suspended virtual computers (42) based on at least one virtual computer template (44). A provision manager (32) provides a series (46) of virtual computers (18) as a result of a series (50) of system logon requests by a user (54). The provision manager (32) includes an update facility (100), a resume facility (102) and a customization facility (104). The update facility (104) is provided for updating the or each at least one virtual computer template (44). The resume facility (102) is provided for resuming virtual computers from the pool (40) of suspended virtual computers (42) provided by the pool facility (38). The customization facility (104) is provided for customizing virtual computers after being resumed from the pool (40) to provide active virtual computers.
Type:
Application
Filed:
July 8, 2019
Publication date:
March 12, 2020
Applicant:
GOPC PTY LTD
Inventors:
Graeme Speak, Neil Richardson, Chris Hoy Poy
Abstract: In one preferred form of the present invention, show in in FIGS. 1 to 3, there is provided a computer implemented security method (10) comprising: providing users (14) with first virtual machines (12), the first virtual machines (12) for being displayed on first electronic devices (18); and providing the users with virtual keyboards (22), the virtual keyboards (22) for providing user input to control the first virtual machines (12), the virtual keyboards (22) for being displayed on second electronic devices (24) that are different to the first electronic devices (18) to reduce the effectiveness of possible malware loggers on the first electronic devices (18).
Abstract: In one preferred form of the present invention shown in in FIG. 1 there is provided a computer implemented method 10. The method comprises: (A) providing at least one mobile electronics device, each device having a data store comprising a first area and a second area; the second area being distinct from the first area to assist with securing the first area; the first area being a system area and the second area for storing personal information; and (B) in connection with each mobile electronic device: associating personal information with computer identifying information to provide special personal information; storing the special personal information in the second area; and retrieving the personal information by: (i) reading the special personal information from the second area; and (ii) applying the computer identifying information to the special personal information.