Neural network
    11.
    发明专利

    公开(公告)号:GB2289970A

    公开(公告)日:1995-12-06

    申请号:GB9410417

    申请日:1994-05-24

    Applicant: IBM

    Abstract: To solve the problem of feed-forward neural networks converging to local minima in pattern classification tasks the order of pattern presentation is modified during training so that the minority classes get the same number of presentations as the majority class. Patterns from different classes are interleaved. This prevents the training process from finding a deep local minimum which classifies all of the minority class wrongly.

    Solder tool
    12.
    发明专利

    公开(公告)号:GB2289235A

    公开(公告)日:1995-11-15

    申请号:GB9409000

    申请日:1994-05-06

    Applicant: IBM

    Abstract: A tool for soldering pin-in-hole electronic circuit components includes a tool plate (10) with a set of holes (15) corresponding to the vias of a circuit board on which a circuit component is to be soldered. The board is aligned with the tool plate and hot gas is supplied through the set of holes to reflow solder in the vias. The tool is particularly suitable for use in removing a replacing circuit components. Use of particular gases allows soldering to be carried out without use of flux. Advantages of the tool are that it prevents burning the circuit board and/or unintentionally reflowing other circuit components mounted on the board.

    Electronic location tag
    14.
    发明专利

    公开(公告)号:GB2357611A

    公开(公告)日:2001-06-27

    申请号:GB9930148

    申请日:1999-12-21

    Applicant: IBM

    Abstract: An electronic location tag 302 comprises stored data which includes an identifier. The data is transmitted to an attached data processing system 101 through an interface. The attached data processing system 101 is adapted to initiate a security action responsive to receiving the identifier. The electronic location tag 302 is adapted to be physically attached to the environment surrounding the tag.

    Data processing network
    15.
    发明专利

    公开(公告)号:GB2354613B

    公开(公告)日:2001-05-30

    申请号:GB0028874

    申请日:1996-10-16

    Applicant: IBM

    Abstract: A data processing network has a client connected to first and second servers in which the first and second servers are operable to communicate with the network according to first and second incompatible data communication protocols. The client is operable to issue, onto the network, a first initial boot request (e.g. RPL) according to the first data communication protocol (IEEE 802.2) and the first server is operable, in response to the client request to send BOOTP bootstrap code to the client system. The BOOTP bootstrap code is loaded into client memory and when executed causes the client to issue a BOOTP request for servicing by the second server system.

    Super passwords
    16.
    发明专利

    公开(公告)号:GB2347248A

    公开(公告)日:2000-08-30

    申请号:GB9904233

    申请日:1999-02-25

    Applicant: IBM

    Abstract: A system for ensuring secure access to a resource 14 comprises a password checker 12 adapted to check a user's password before allowing access to the resource. The password checker further includes means, responsive to user input, for generating a string indicative of the identity of the resource; means, responsive to receipt of a super-password from a super-password generator 10, for decrypting the super-password with a public key 22 associated with the resource; and means, responsive to the string and the decrypted super-password matching, for allowing access to the resource. The super-password generator responds to the string being provided by an accredited user to encode the string with a private key 20 corresponding to the public key 22.

    Cooling-off period for destructive software prevents inadvertent data destruction

    公开(公告)号:GB2343026A

    公开(公告)日:2000-04-26

    申请号:GB9823240

    申请日:1998-10-24

    Applicant: IBM

    Abstract: Enabling recovery when a user instructs a program to perform actions which destroy data stored on the computer or an associated computer, whilst still allowing for the deletion of information for the purposes of security and for freeing up disk space. User actions are managed to reduce the possibility of inadvertently destroying data, by testing, 208, 210, the consequences of the user action: if benign (i.e. where no information will be lost, or where any information that will be lost is backed up), the user action is completed, 212; if not benign, a delay ("cooling-off") period prior to completing the user action is initiated, 206. During this delay period, the user is able to cancel the user action, 216. The delay may be varied according to the relative consequences of the user action, setting a longer delay period for actions which are more destructive and which may take longer to recover from; longer delays may also be set for systems which store information of higher value.

    Cooling-off period for destructive software

    公开(公告)号:GB2343026B

    公开(公告)日:2003-02-26

    申请号:GB9823240

    申请日:1998-10-24

    Applicant: IBM

    Abstract: In a computer system, a user action can cause a computer program to perform actions which may destroy data stored on the computer or on an associated computer. User actions are managed to reduce this possibility by testing the consequences of the user action and if the consequences of the user action are benign, the user action is completed. If the consequences are not benign, a delay period prior to completing the user action is initiated. During this delay period, the user is able to cancel the user action.

    Data processing network
    20.
    发明专利

    公开(公告)号:GB2318434B

    公开(公告)日:2001-08-15

    申请号:GB9621556

    申请日:1996-10-16

    Applicant: IBM

    Abstract: A data processing network has a client connected to first and second servers in which the first and second servers are operable to communicate with the network according to first and second incompatible data communication protocols. The client is operable to issue, onto the network, a first initial boot request (e.g. RPL) according to the first data communication protocol (IEEE 802.2) and the first server is operable, in response to the client request to send BOOTP bootstrap code to the client system. The BOOTP bootstrap code is loaded into client memory and when executed causes the client to issue a BOOTP request for servicing by the second server system.

Patent Agency Ranking