-
公开(公告)号:CA2339306A1
公开(公告)日:2001-09-09
申请号:CA2339306
申请日:2001-03-02
Applicant: IBM
Inventor: RAVID YIFTACH , HERZBERG AMIR
Abstract: A method for managing objects for users including providing a set of attributes and a set of containers each having attributes from the set. The method further provides a user interface for dynamically assigning attributes to the objects. The method further provides for selectively displaying, through a user interface, containers and objects in the containers. An object is displayed in a container if a condition is met. The condition is applied to the attributes of the container and the attributes of the object.
-
公开(公告)号:DE69521977D1
公开(公告)日:2001-09-06
申请号:DE69521977
申请日:1995-11-28
Applicant: IBM
Inventor: HERZBERG AMIR , KRAWCZYK HUGO M , KUTTEN SHAY , VAN LE AN , MATYAS STEPHEN M , YUNG MARCEL M
Abstract: A method and system for detecting authorized programs within a data processing system. The present invention creates a validation structure for validating a program. The validation structure is embedded in the program and in response to an initiation of the program, a determination is made as to whether the program is an authorized program. The determination is made using the validation structure.
-
13.
公开(公告)号:CA2130396C
公开(公告)日:1998-03-31
申请号:CA2130396
申请日:1994-08-18
Applicant: IBM
Inventor: BJORKLUND RONALD E , BAUCHOT FREDERIC , WETTERWALD MICHELE M , HERZBERG AMIR , KUTTEN SHAY
Abstract: This invention deals with a safe key distribution and authentication in a data communication network (e.g. wireless LAN type of network). The network includes a network manager to which are connected, via a LAN wired circuit, one or more base stations. Individual remote stations are, in turn, wirelessly connected to an installed base station. One essential function for achieving security in such a network, is a mechanism to reliably authenticate the exchanges of data between communicating parties. This involves the establishment of session keys, which keys need to be distributed safely to the network components. An original and safe method is provided with this invention for key distribution and authentication during network installation, said method including using the first installed base station for generating a network key and a backbone key, and then using said first installed base station for subsequent remote station or additional base station installations while avoiding communicating said network key.
-
公开(公告)号:GB2367661A
公开(公告)日:2002-04-10
申请号:GB0104912
申请日:2001-02-28
Applicant: IBM
Inventor: HERZBERG AMIR , RAVID YIFTACH
Abstract: A method for managing objects for users includes providing a set of attributes and a set of containers each having attributes from the set. A user interface is provided for dynamically assigning attributes to the objects, and for selectively displaying containers and objects in the containers. An object is displayed in a container if a condition is met, the condition being applied to the attributes of the container and the attributes of the object. A computer system for managing the objects is also disclosed. Utility can be in sharing of bookmarks of frequently used URLs among web surfers.
-
公开(公告)号:GB2365561A
公开(公告)日:2002-02-20
申请号:GB0030228
申请日:2000-12-12
Applicant: IBM
Inventor: GUSKI RICHARD H , DILLENBERGER DONNA N , FARRELL WALTER B , HERZBERG AMIR , KOVED LAWRENCE , NADALIN ANTHONY J , RELLER DUANE F , SHIN JOHN H , SHMUELI ANAT S , SZCZYGIELSKI THOMAS J , THOMPSON JOHN M , WILLIAMS JOSEPH A
Abstract: In a multi-user application environment with Java, both codesource access checking and verification of the user who is executing code are employed for access checking. An end user uses a Web browser to access a Web server. An execution thread is established for an end user. The HTTP page and function requested by the user cause the Web application server to invoke a Java Virtual Machine (JVM) which in turn invokes a requested Java servlet. When the Secure Class Loader loads a Java class into the JVM, the code base Uniform URL and the Digital Certificate that was used to sign the class are used by the Secure Class Loader to create the codesource Java object. The JVM includes a Java Security Manager (JSM) class that invokes classes that invoke an underlying system security manager. Conditional access checking includes the capability to control access to resources based on the user and on the Java servlet classes being executed. If the codesource indicated by a Conditional Access List matches the codesource specified in the profile, the system security manager will allow access.
-
公开(公告)号:DE69330065D1
公开(公告)日:2001-05-03
申请号:DE69330065
申请日:1993-12-08
Applicant: IBM
Inventor: BJORKLUND RONALD EINAR , BAUCHOT FREDERIC , WETTERWALD MICHELE MARIE , KUTTEN SHAY , HERZBERG AMIR
-
-
-
-
-