METHOD FOR CONTROLLING EXECUTION OF APPLICATION PROGRAMS WRITTEN IN HIGH LEVEL PROGRAM LANGUAGE

    公开(公告)号:CA1234635A

    公开(公告)日:1988-03-29

    申请号:CA494156

    申请日:1985-10-29

    Applicant: IBM

    Abstract: A method for executing application programs written in a high level program language on tightly coupled multiprocessor systems in a Multiple Instruction/Multiple Data (MIMD) environment includes the steps of: initializing a MIMD environment in a data processing system by a call to an initialization routine from an application program; maintaining the MIMD environment until all independently executable portions of the application program have been executed; scheduling execution of those tasks representing independently executable portions of the application program; synchronizing execution and completion of the tasks until all tasks have completed execution; terminating the MIMD environment on completion of all the tasks.

    CRYPTOGRAPHIC FILE SECURITY FOR MULTIPLE DOMAIN NETWORKS

    公开(公告)号:CA1121013A

    公开(公告)日:1982-03-30

    申请号:CA317142

    申请日:1978-11-30

    Applicant: IBM

    Abstract: A file security system for data files created at a first host system in one domain and recovered at a second host system in another domain of a multiple domain network. Each of said host systems contain a data security device provided with multiple host keys capable of performing a variety of cryptographic operations. Creation and recovery of a secure data file is accomplished without revealing the keys of either of the host systems to the other of the host systems. When the data file is to be created at the first host system, the first host system data security device provides a file recovery key for subsequent recovery of the data file at the second host system and enciphers first host system plaintext under a primary file key, which is related to the file recovery key, to obtain first host system ciphertext as the data file. The file recovery key is used as header information for the data file or maintained as a private file recovery key. When the data file is to be recovered at the second host system, the file second host system data security device performs a cryptographic operation to transform the file recovery key into a form which is usable to decipher the data file. The second host system data security device then uses the transformed file recovery key to perform a cryptographic operation to obtain the first host system ciphertext in clear form at the second host system.

Patent Agency Ranking