-
公开(公告)号:CA2322686A1
公开(公告)日:1999-09-30
申请号:CA2322686
申请日:1998-11-12
Applicant: IBM
Inventor: BAENTSCH MICHAEL , BUHLER PETER , OESTREICHER MARCUS
Abstract: A Java runtime system is proposed which comprises a stack-based interpreter executing a program that comprises bytecodes and class structures. The system further comprises a modified constant pool with internal information of use only during linking and with external information to be preserved for late code binding. The internal information is removed from the modified constant pool after linking.
-
公开(公告)号:CA2504843C
公开(公告)日:2011-02-22
申请号:CA2504843
申请日:2003-10-24
Applicant: IBM
Inventor: BAENTSCH MICHAEL , BUHLER PETER , EIRICH THOMAS , HORING FRANK , KRAMP THORSTEN , OESTREICHER MARCUS , OSBORNE MICHAEL , WEIGOLD THOMAS D
IPC: H04L29/06
Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.
-
公开(公告)号:AT336135T
公开(公告)日:2006-09-15
申请号:AT03751197
申请日:2003-10-24
Applicant: IBM
Inventor: BAENTSCH MICHAEL , BUHLER PETER , EIRICH THOMAS , HOERING FRANK , KRAMP THORSTEN , OESTREICHER MARCUS , OSBORNE MICHAEL , WEIGOLD THOMAS D
IPC: H04L29/06
Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key a an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.
-
公开(公告)号:CA2504843A1
公开(公告)日:2004-05-21
申请号:CA2504843
申请日:2003-10-24
Applicant: IBM
Inventor: KRAMP THORSTEN , WEIGOLD THOMAS D , BAENTSCH MICHAEL , EIRICH THOMAS , OESTREICHER MARCUS , HORING FRANK , OSBORNE MICHAEL , BUHLER PETER
IPC: H04L29/06
Abstract: A method for providing a user device with a set of access codes comprises, i n the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in t he message to retrieve the key from storage. The set of access codes is encrypt ed using the retrieved key to produce an encrypted set. A message containing th e encrypted set is sent to the user device via the network. In the user device , the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.
-
公开(公告)号:CA2465333A1
公开(公告)日:2003-05-22
申请号:CA2465333
申请日:2002-11-05
Applicant: IBM
Inventor: BAENTSCH MICHAEL , BUHLER PETER , EIRICH THOMAS , HOERING FRANK , OESTREICHER MARCUS , WEIGOLD THOMAS D
IPC: G06F21/76 , G06F1/00 , G06F21/60 , G06K19/073 , H04L9/10 , H04L9/28 , H04L9/32 , H04L29/06 , G06F12/14
Abstract: The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information.
-
公开(公告)号:AT465448T
公开(公告)日:2010-05-15
申请号:AT01908057
申请日:2001-03-09
Applicant: IBM
Inventor: BAENTSCH MICHAEL , BUHLER PETER , EIRICH THOMAS , HOERING FRANK , OESTREICHER MARCUS
IPC: G06F12/02
Abstract: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.
-
公开(公告)号:MY124662A
公开(公告)日:2006-06-30
申请号:MYPI9900623
申请日:1999-02-23
Applicant: IBM
Inventor: BAENTSCH MICHAEL , BUHLER PETER , OESTREICHER MARCUS
Abstract: A JAVA RUNTIRNE SYSTEM IS PROPOSED WHICH COMPRISES A STACK-BASED INTERPRETER EXECUTING A PROGRAM THAT COMPRISES BYTECODES AND CLASS STRUCTURES. THE SYSTEM FURTHER COMPRISES A MODIFIED CONSTANT POOL WITH IHTERNAL INFORMATION OF USE ONLY DURING LINKING AND WITH EXTERNAL INFORMATION TO BE PRESERVED TO LATE CODE BINDING, THE INTERNAL INFORMATION IS REMOVED FROM THE MODIFIED CONSTANT POOL AFTER LINKING.(FIG.3)
-
公开(公告)号:CZ20003437A3
公开(公告)日:2001-11-14
申请号:CZ20003437
申请日:1998-11-12
Applicant: IBM
Inventor: BAENTSCH MICHAEL , BUHLER PETER , OESTREICHER MARCUS
Abstract: A Java runtime system is proposed which comprises a stack-based interpreter executing a program that comprises bytecodes and class structures. The system further comprises a modified constant pool with internal information of use only during linking and with external information to be preserved for late code binding. The internal information is removed from the modified constant pool after linking.
-
公开(公告)号:HU0101368A2
公开(公告)日:2001-08-28
申请号:HU0101368
申请日:1998-11-12
Applicant: IBM
Inventor: BAENTSCH MICHAEL , BUHLER PETER , OESTREICHER MARCUS
Abstract: A Java runtime system is proposed which comprises a stack-based interpreter executing a program that comprises bytecodes and class structures. The system further comprises a modified constant pool with internal information of use only during linking and with external information to be preserved for late code binding. The internal information is removed from the modified constant pool after linking.
-
公开(公告)号:DE69941670D1
公开(公告)日:2010-01-07
申请号:DE69941670
申请日:1999-07-29
Applicant: IBM
Inventor: BISCHOF JOERG , HILD STEFAN G , OESTREICHER MARCUS
Abstract: A computerized method and a system for implementing in a network distributed applications, comprising instructions for a computer process which are executable on different locations in the network, is proposed. The instructions include an assert-command and/or a release-command.
-
-
-
-
-
-
-
-
-