-
公开(公告)号:KR20100114066A
公开(公告)日:2010-10-22
申请号:KR20107017714
申请日:2009-01-28
Applicant: IBM
Inventor: PHILLIPS ANTHONY HOWARD
IPC: G06F21/62
CPC classification number: H04L63/20 , G06F21/6218 , G06F2221/2107
Abstract: 암호화된 파일 엑세스를 위한 방법 및 시스템이 제공된다. 상기 방법은 어플리케이션(110)에 의한 암호화된 파일(401-403)에 대한 엑세스 요청을 수신하는 단계(502,552); 상기 엑세스 요청을 생성하는 어플리케이션(110)을 결정하는 단계(503,553); 상기 어플리케이션이(110)이 엑세스에 대해 승인되어 있는지 여부를 체크하는 단계(505,555); 및 만약 승인되어 있으면, 상기 엑세스 요청을 허용하는 단계로 이루어진 단계들을 포함한다. 상기 엑세스 요청은 대상 또는 소스 어플리케이션(110)에 의한 판독 또는 기록 엑세스일 수 있다. 만약 상기 어플리케이션(110)이 엑세스에 대해 승인되어 있다면, 상기 방법은 상기 어플리케이션(110)이 암호화되지 않은 엑세스들에 대해 승인되어 있는지 여부를 체크한다(508,558); 만약 승인 되었다면, 암호화되지 않은 파일 엑세스를 허용한다.
-
公开(公告)号:WO2009095413A3
公开(公告)日:2010-04-29
申请号:PCT/EP2009050953
申请日:2009-01-28
Applicant: IBM , PHILLIPS ANTHONY HOWARD
Inventor: PHILLIPS ANTHONY HOWARD
IPC: G06F21/62
CPC classification number: H04L63/20 , G06F21/6218 , G06F2221/2107
Abstract: A method and system for encrypted file access are provided. The method includes the steps of: receiving (502, 552) an access request for an encrypted file (401-403) by an application (110); determining (503, 553) the application (110) making the access request; checking (505, 555) if the application (110) is authorised for access; and if authorised, allowing the access request. The access request may be a read or write access by a destination or source application (110). If the application (110) is authorised for access, the method checks (508, 558) if the application (110) is authorised for unencrypted access; and if so, allowing unencrypted file access.
Abstract translation: 提供了一种用于加密文件访问的方法和系统。 该方法包括以下步骤:由应用(110)接收(502,552)对加密文件(401-403)的访问请求; 确定(503,553)进行访问请求的应用(110); 如果应用程序(110)被授权访问,则检查(505,555); 如果授权,允许访问请求。 访问请求可以是目的地或源应用程序(110)的读或写访问。 如果应用程序(110)被授权访问,则方法检查(508,558)如果应用程序(110)被授权用于未加密的访问; 如果是这样,允许不加密的文件访问。
-
公开(公告)号:AT520080T
公开(公告)日:2011-08-15
申请号:AT08854638
申请日:2008-11-27
Applicant: IBM
Inventor: PHILLIPS ANTHONY HOWARD , WHARMBY ANDREW DEAN
IPC: G06F12/02
Abstract: A method of memory management for a software application in execution in a computer system, the method comprising the steps of: a memory manager supplying a first unit of memory having a predetermined size as a first allocation space for the software application; the software application storing data in the first allocation space; and discarding inactive data in the first allocation space by the steps of: a) the memory manager supplying a second unit of memory for the software application; b) identifying active data in the first allocation space and copying said active data to the second unit of memory, the active data including at least data that is in use by the software application; c) indicating, in the first allocation space, that the active data has become inactive; d) mapping a portion of the first allocation space to be logically contiguous with the second unit of memory to define a second allocation space for the software application whereby the second allocation space has a size that is equivalent to the predetermined size; and e) returning a remaining portion of the first allocation to the memory manager as a unit of memory suitable for reuse.
-
公开(公告)号:CA2693592A1
公开(公告)日:2009-06-04
申请号:CA2693592
申请日:2008-11-27
Applicant: IBM
Inventor: PHILLIPS ANTHONY HOWARD , WHARMBY ANDREW DEAN
IPC: G06F12/02
Abstract: A method of memory management for a software application in execution in a computer system, the method comprising the steps of: a memory manager supplying a first unit of memory having a predetermined size as a first allocation space for the software application; the software application storing data in the first allocation space; and discarding inactive data in the first allocation space by the steps of: a) the memory manager supplying a second unit of memory for the software application; b) identifying active data in the first allocation space and copying said active data to the second unit of memory, the active data including at least data that is in use by the software application; c) indicating, in the first allocation space, that the active data has become inactive; d) mapping a portion of the first allocation space to be logically contiguous with the second unit of memory to define a second allocation space for the software application whereby the second allocation space has a size that is equivalent to the predetermined size; and e) returning a remaining portion of the first allocation to the memory manager as a unit of memory suitable for reuse.
-
公开(公告)号:CA2693592C
公开(公告)日:2016-10-18
申请号:CA2693592
申请日:2008-11-27
Applicant: IBM
Inventor: PHILLIPS ANTHONY HOWARD , WHARMBY ANDREW DEAN
IPC: G06F12/02
Abstract: A method of memory management for a software application in execution in a computer system, the method comprising the steps of: a memory manager supplying a first unit of memory having a predetermined size as a first allocation space for the software application; the software application storing data in the first allocation space; and discarding inactive data in the first allocation space by the steps of: a) the memory manager supplying a second unit of memory for the software application; b) identifying active data in the first allocation space and copying said active data to the second unit of memory, the active data including at least data that is in use by the software application; c) indicating, in the first allocation space, that the active data has become inactive; d) mapping a portion of the first allocation space to be logically contiguous with the second unit of memory to define a second allocation space for the software application whereby the second allocation space has a size that is equivalent to the predetermined size; and e) returning a remaining portion of the first allocation to the memory manager as a unit of memory suitable for reuse.
-
-
-
-