MANAGING OBJECTS AND SHARING INFORMATION AMONG COMMUNITIES

    公开(公告)号:CA2339306A1

    公开(公告)日:2001-09-09

    申请号:CA2339306

    申请日:2001-03-02

    Applicant: IBM

    Abstract: A method for managing objects for users including providing a set of attributes and a set of containers each having attributes from the set. The method further provides a user interface for dynamically assigning attributes to the objects. The method further provides for selectively displaying, through a user interface, containers and objects in the containers. An object is displayed in a container if a condition is met. The condition is applied to the attributes of the container and the attributes of the object.

    12.
    发明专利
    未知

    公开(公告)号:DE69521977D1

    公开(公告)日:2001-09-06

    申请号:DE69521977

    申请日:1995-11-28

    Applicant: IBM

    Abstract: A method and system for detecting authorized programs within a data processing system. The present invention creates a validation structure for validating a program. The validation structure is embedded in the program and in response to an initiation of the program, a determination is made as to whether the program is an authorized program. The determination is made using the validation structure.

    METHOD AND SYSTEM FOR KEY DISTRIBUTION AND AUTHENTICATION IN A DATA COMMUNICATION NETWORK

    公开(公告)号:CA2130396C

    公开(公告)日:1998-03-31

    申请号:CA2130396

    申请日:1994-08-18

    Applicant: IBM

    Abstract: This invention deals with a safe key distribution and authentication in a data communication network (e.g. wireless LAN type of network). The network includes a network manager to which are connected, via a LAN wired circuit, one or more base stations. Individual remote stations are, in turn, wirelessly connected to an installed base station. One essential function for achieving security in such a network, is a mechanism to reliably authenticate the exchanges of data between communicating parties. This involves the establishment of session keys, which keys need to be distributed safely to the network components. An original and safe method is provided with this invention for key distribution and authentication during network installation, said method including using the first installed base station for generating a network key and a backbone key, and then using said first installed base station for subsequent remote station or additional base station installations while avoiding communicating said network key.

    Managing objects
    14.
    发明专利

    公开(公告)号:GB2367661A

    公开(公告)日:2002-04-10

    申请号:GB0104912

    申请日:2001-02-28

    Applicant: IBM

    Abstract: A method for managing objects for users includes providing a set of attributes and a set of containers each having attributes from the set. A user interface is provided for dynamically assigning attributes to the objects, and for selectively displaying containers and objects in the containers. An object is displayed in a container if a condition is met, the condition being applied to the attributes of the container and the attributes of the object. A computer system for managing the objects is also disclosed. Utility can be in sharing of bookmarks of frequently used URLs among web surfers.

    Conditional access control
    15.
    发明专利

    公开(公告)号:GB2365561A

    公开(公告)日:2002-02-20

    申请号:GB0030228

    申请日:2000-12-12

    Applicant: IBM

    Abstract: In a multi-user application environment with Java, both codesource access checking and verification of the user who is executing code are employed for access checking. An end user uses a Web browser to access a Web server. An execution thread is established for an end user. The HTTP page and function requested by the user cause the Web application server to invoke a Java Virtual Machine (JVM) which in turn invokes a requested Java servlet. When the Secure Class Loader loads a Java class into the JVM, the code base Uniform URL and the Digital Certificate that was used to sign the class are used by the Secure Class Loader to create the codesource Java object. The JVM includes a Java Security Manager (JSM) class that invokes classes that invoke an underlying system security manager. Conditional access checking includes the capability to control access to resources based on the user and on the Java servlet classes being executed. If the codesource indicated by a Conditional Access List matches the codesource specified in the profile, the system security manager will allow access.

Patent Agency Ranking