-
公开(公告)号:JPH10214264A
公开(公告)日:1998-08-11
申请号:JP31526597
申请日:1997-11-17
Applicant: IBM
Inventor: SHIEH JOHNNY MENG-HAN
Abstract: PROBLEM TO BE SOLVED: To prevent the occurrence of error during cut-and-paste work by cutting an object from a document by a user and next displaying the cut object in a buffer display picture on a monitor. SOLUTION: A system unit 12 of personal computer system(PC) responds to an input device such as PC keyboard 16, mouse 18 or local area network(LAN) interface. An input/output device such as disket drive 22, display device 14, printer 20 and LAN communication network is connected to the system unit 12. When displaying the cut object selected from the document generated on a computer, the object is cut from the document, and the cut object is displayed in the buffer display picture on the monitor. Further, the cut object is displayed in a display picture in any suitable size.
-
公开(公告)号:BRPI0410569B1
公开(公告)日:2016-08-23
申请号:BRPI0410569
申请日:2004-04-15
Applicant: IBM
Inventor: MCBREARTY GERALD FRANCIS , MURILLO JESSICA KELLEY , SHIEH JOHNNY MENG-HAN , MULLEN SHAWN PATRICK , KEOHANE SUSANN MARIE
Abstract: "extensão de segurança de rede de sistemas de arquivos distribuídos". um protocolo de segurança que dinamicamente implementa segurança de montagem aumentada de um sistema de arquivos, quando o acesso a arquivos sensíveis em uma rede de sistema de arquivos é solicitado. quando o usuário de um sistema cliente tenta acessar um arquivo sensível especificamente etiquetado, o servidor que hospeda o sistema de arquivos executa um código de software que termina a montagem corrente e reconfigura as portas do servidor para aceitar uma remontagem a partir do cliente através de uma porta mais segura. a porta do servidor reconfigurada é fornecido o endereço de ip do cliente e a correspondência do endereço de ip durante a operação de remontagem. a comutação para uma montagem segura é completada de uma maneira perfeitamente consistente de modo que os usuários autorizados são permitidos acessar arquivos sensíveis sem derrubar o servidor com as a criptografação custosa e outras características de segurança de intensivo recurso. nenhum retardo significante é experimentado pelo usuário, enquanto o arquivo sensível é protegido de captura não autorizada durante a transmissão do sistema cliente.
-
公开(公告)号:CA2698317A1
公开(公告)日:2009-04-09
申请号:CA2698317
申请日:2008-09-22
Applicant: IBM
Inventor: KEOHANE SUSANN MARIE , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , MURILLO JESSICA CAROL , SHIEH JOHNNY MENG-HAN
IPC: H04L12/56 , H04L45/122
Abstract: A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.
-
公开(公告)号:AU8552801A
公开(公告)日:2002-05-23
申请号:AU8552801
申请日:2001-10-30
Applicant: IBM
IPC: G06F17/30 , G06F17/21 , G06F15/163 , G06F17/60
-
公开(公告)号:DE69709986D1
公开(公告)日:2002-03-14
申请号:DE69709986
申请日:1997-05-23
Applicant: IBM
Inventor: SHIEH JOHNNY MENG-HAN
Abstract: A method, apparatus, and article of manufacture direct a computer system, having at least a processor, memory, and touchscreen, to create a virtual pointing device on the touchscreen. The method includes the steps of measuring at least a first portion of a hand placed on the touchscreen, determining if at least one measurement of the first portion substantially matches any existing measurements stored in the memory, if a substantial match exists, reading the memory for pre-defined characteristics, and building a virtual pointing device on the touchscreen in accordance with the pre-defined characteristics.
-
公开(公告)号:CA2783394A1
公开(公告)日:2011-06-30
申请号:CA2783394
申请日:2010-12-08
Applicant: IBM
Inventor: MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN , MURILLO JESSICA CAROL , MCBREARTY GERALD FRANCIS , KEOHANE SUSANN MARIE
Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or "heartbeat," may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attack is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
-
公开(公告)号:DE60208810D1
公开(公告)日:2006-04-06
申请号:DE60208810
申请日:2002-10-28
Applicant: IBM
Inventor: MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN , TESAURO JAMES STANLEY
Abstract: Apparatus for eavesdropping within an area layer adjacent to and surrounding a LAN area periphery for potential wireless transmissions of an intruder having a lower frequency within a level below the LAN frequency; and an implementation responsive to said eavesdropping apparatus for changing the encryption code of said encrypted wireless transmission upon the eavesdropping detection of a wireless transmission of said lower frequency addressed to a network location of one of the terminals in said LAN.
-
公开(公告)号:DE69718259T2
公开(公告)日:2003-09-25
申请号:DE69718259
申请日:1997-08-19
Applicant: IBM
Inventor: SHIEH JOHNNY MENG-HAN
Abstract: An apparatus, method, and memory direct a computer system, having at least a processor, memory, and touchscreen device (e.g., a touchscreen or a touchpad and display device) to execute at least one action on an object and/or text. The method includes detecting at least one item (e.g., fingers, stylus) placed on the touchscreen device, counting the number of items placed on the touchscreen device, determining if an associated action corresponds to the numbers of items and, if an associated action corresponds to the number of items, executing the associated action.
-
公开(公告)号:GB2356765B
公开(公告)日:2003-09-24
申请号:GB0019673
申请日:2000-08-11
Applicant: IBM
Inventor: GENTY DENISE MARIE , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN , UNNKRISHNAN RAMACHANDRAN
Abstract: A method and system for an algorithm-based network snoop avoider is provided. A first data processing system and a second data processing system communicate on a physical network by transmitting data packets on the network using a virtual private network (VPN). Data packets are transmitted through a first VPN tunnel between the first data processing system with a first network address terminating a first end of the VPN tunnel and the second data processing system with a second network address terminating a second end of the first VPN tunnel. The VPN is automatically reconfigured to use alternate addresses on the network for the tunnel endpoints by automatically determining, in accordance with a predetermined algorithm, a third network address and a fourth network address and by automatically assigning the third network address to the first data processing system and the fourth network address to the second data processing system. Data packets may then be transmitted through a second VPN tunnel in which a first end of the second VPN tunnel is terminated by the first data processing system using the third network address and a second end of the second VPN tunnel is terminated by the second data processing system using the fourth network address. The data packets may be transmitted using Internet Protocol (IP), and a portion of the network may include the Internet.
-
公开(公告)号:DE69715314D1
公开(公告)日:2002-10-17
申请号:DE69715314
申请日:1997-05-23
Applicant: IBM
Inventor: SHIEH JOHNNY MENG-HAN
Abstract: A method, memory, and apparatus, having at least a processor, memory, and touchscreen, for creating a virtual pointing device. The method includes the steps of displaying a non-activated virtual pointing device on the touchscreen, in response to detecting at least one finger placed on the virtual pointing device, activating the virtual pointing device, and moving the virtual pointing device in accordance with movement of the at least one finger.
-
-
-
-
-
-
-
-
-