DEFENDING SMART CARDS AGAINST ATTACKS BY REDUNDANT PROCESSING
    1.
    发明申请
    DEFENDING SMART CARDS AGAINST ATTACKS BY REDUNDANT PROCESSING 审中-公开
    通过冗余处理保护智能卡免受攻击

    公开(公告)号:WO2008043647A3

    公开(公告)日:2008-07-17

    申请号:PCT/EP2007059882

    申请日:2007-09-19

    Abstract: In order to provide protection for an application against attacks, a method is provided which defends a computer program independently of the complexity of the program. A request to invoke the application is received (1110). A process execution state is set (405) to indicate a first execution. The application is executed (420; 520; 1120) in response to the request, and application data and control information calculated by the application is stored (420, 520) while the application is executed. The process execution state is set (405, 1130) to indicate a subsequent execution. At least part of the application is executed (1140) for at least one subsequent time. Application data and control information calculated by the application during subsequent executions is compared (430; 530; 1210; 1310) with the data/information stored during first execution. The comparison is done by operation system services which are responsive to the process execution state. When the comparison shows a discrepancy in the compared application data and control information, appropriate error handling takes place.

    Abstract translation: 为了防止应用程序受到攻击,提供了一种方法,它可以独立于程序的复杂性来维护计算机程序。 接收调用应用程序的请求(1110)。 处理执行状态被设置(405)以指示第一次执行。 响应于该请求执行应用程序(420; 520; 1120),并且在应用程序被执行时存储由应用程序计算的应用程序数据和控制信息(420,520)。 处理执行状态被设置(405,1130)以指示后续执行。 对于至少一个随后的时间,至少部分应用程序被执行(1140)。 在后续执行期间由应用计算的应用数据和控制信息与第一次执行期间存储的数据/信息进行比较(430; 530; 1210; 1310)。 比较由对流程执行状态作出响应的操作系统服务完成。 当比较显示比较的应用数据和控制信息存在差异时,进行适当的错误处理。

    Verfahren und System zum Optimieren des Platzierens virtueller Maschinen in Cloud-Computing-Umgebungen

    公开(公告)号:DE102012217202B4

    公开(公告)日:2020-06-18

    申请号:DE102012217202

    申请日:2012-09-24

    Applicant: IBM

    Abstract: Die Erfindung stellt ein Verfahren und ein System zum Optimieren des Platzierens von Instanzen der Abbilder (103) virtueller Maschinen in einer Cloud-Computing-Umgebung bereit. Das Verfahren umfasst die Schritte zum Empfangen einer Anforderung zum Nutzen einer neuen Instanz eines VM-Abbilds; Lesen von benutzerspezifischen und allgemeinen VM-Ressourcen-Nutzungsprofilen, die erste Ressourcen-Inanspruchnahmedaten umfassen; Lesen von Ressourcen-Poolprofilen, die zweite Ressourcen-Inanspruchnahmedaten umfassen; für jedes der Ressourcen-Poolprofile Analysieren und Angleichen des gelesenen VM-Ressourcen-Nutzungsprofils an die gelesenen Ressourcen-Poolprofile, Berechnen eines kumulierten Ressourcen-Inanspruchnahmeprofils und Ermitteln des einen der mehreren Ressourcen-Pools, der die geringste kumulierte Ressourcen-Inanspruchnahme aufweist.

    Adaptive state management for stateless services

    公开(公告)号:AU2021236960A1

    公开(公告)日:2022-09-01

    申请号:AU2021236960

    申请日:2021-02-11

    Applicant: IBM

    Abstract: A computer-implemented method for controlling state updates in a cloud service environment may be provided. The method includes maintaining a set of state provider definitions, wherein each state provider definition comprising a set of required input variable definitions, a set of output variable definitions and related metadata. The method also includes determining a set of input variable definitions required by an invoked service, receiving the determined set of input variable definitions by the state provider management service, selecting a state provider definition, wherein the selected state provider definition is to be compatible with the received set of input variable definitions, determining a set of matching state provider services matching the selected state provider definition, scoring the determined set of state provider services, invoking the highest scoring state provider service, and passing the state data to the invoked service.

    Privacy centric data security in cloud environment

    公开(公告)号:AU2021253779A1

    公开(公告)日:2022-09-29

    申请号:AU2021253779

    申请日:2021-03-16

    Applicant: IBM

    Abstract: Techniques for privacy centric data security. A request to permit a data processor to access private data associated with a user is received at a cloud data privacy service. The request includes a request for a data access block relating to the private data, and a data filter describing one or more access parameters. The cloud privacy data service generates the first data access block, based on the private data and the data filter. The first data access block is transmitted from the cloud privacy service to a user device, which is configured to transmit the first data access block to the first data processor. The cloud data privacy service receives a request for the private data that includes the first data access block. The cloud data privacy service determines that the first data access block is valid, and grants the first data processor access to the private data.

    Method for securely managing EEPROM data files on chip cards and other computing devices

    公开(公告)号:DE10059006A1

    公开(公告)日:2001-07-19

    申请号:DE10059006

    申请日:2000-11-28

    Applicant: IBM

    Abstract: EEPROM data files are managed in order to restore data after abortion of a write operation, where data is stored in a record-oriented data structure with each of the records containing a status byte along with the data contents. All of the data files affected by the write operation contain either all of the data stored prior to the write operation, or all of the data as modified subsequent to the write operation. Each file is retained as active data, in case of a power failure, until all files have been successfully updated according to write operation. Independent claims are included for; (a) a system for managing EEPROM data files; and (b) a computer program product

    ADAPTIVE ZUSTANDSVERWALTUNG FÜR STATUSUNABHÄNGIGE SERVICES

    公开(公告)号:DE112021000619T5

    公开(公告)日:2022-11-10

    申请号:DE112021000619

    申请日:2021-02-11

    Applicant: IBM

    Abstract: Ein durch einen Computer ausgeführtes Verfahren kann bereitgestellt werden, um Zustandsaktualisierungen in einer Cloud-Service-Umgebung zu steuern. Das Verfahren weist ein Verwalten eines Satzes von Zustandsanbieterdefinitionen auf, wobei jede Zustandsanbieterdefinition einen Satz von erforderlichen Eingabevariablendefinitionen, einen Satz von Ausgabevariablendefinitionen sowie zugehörige Metadaten aufweist. Das Verfahren umfasst auch ein Feststellen eines Satzes von Eingabevariablendefinitionen, die von einem aufgerufenen Service benötigt werden, ein Empfangen des festgestellten Satzes von Eingabevariablendefinitionen durch den Zustandsanbieter-Verwaltungsservice, ein Auswählen einer Zustandsanbieterdefinition, wobei die ausgewählte Zustandsanbieterdefinition mit dem empfangenen Satz von Eingabevariablendefinitionen kompatibel sein soll, ein Feststellen eines Satzes von entsprechenden Zustandsanbieter-Services, die der ausgewählten Zustandsanbieterdefinition entsprechen, ein Bewerten des festgestellten Satzes von Zustandsanbieter-Services, ein Aufrufen des Zustandsanbieter-Service mit der höchsten Bewertung, und ein Übergeben der Zustandsdaten an den aufgerufenen Service.

    Method and system for optimizing virtual machines placement in cloud computing environments

    公开(公告)号:GB2495820A

    公开(公告)日:2013-04-24

    申请号:GB201217787

    申请日:2012-10-04

    Applicant: IBM

    Abstract: Optimised placement of virtual machine (VM) images in cloud computing environments, comprising: receiving user request for deploying and indicating new VM-image; reading VM resource usage profiles (user-specific if available) comprising first consumption data over first time period 303; reading resource pool profile comprising second resource consumption data over second time period 302; for each of the resource-pool profiles, aligning the read VM and resource-pool usage profiles, calculating an aggregated resource consumption profile 301 predictive of total resource consumption; and determining resource pools having the least aggregated consumption. Pool with least resource usage can have lowest integral resource consumption value of the aggregated not exceed threshold 306. User specific profile comprises rules for guaranteeing accordance with service level agreement. Advantages comprise: instantiation of VM-instances at future times when they are needed even if they cannot be provided at current time; automatic, dynamic instantiation of VM-instances adapted to changing workloads of resource-pool.

Patent Agency Ranking