DIAGNOSEVERBESSERUNGEN FÜR MEHRERE INSTANZEN IDENTISCHER STRUKTUREN

    公开(公告)号:DE102021128930A1

    公开(公告)日:2022-06-09

    申请号:DE102021128930

    申请日:2021-11-08

    Applicant: IBM

    Abstract: Ein Verfahren umfasst ein Ausführen eines Tests an einer ersten Struktur und einer zweiten Struktur einer eingebauten Selbsttestschaltung. Sowohl die erste wie die zweite Struktur enthalten eine Mehrzahl von Flipflops, die als eine Mehrzahl von Blockketten angeordnet sind. Das Verfahren umfasst auch ein Entladen eines ersten Ergebnisses des Tests von der Mehrzahl von Blockketten der ersten Struktur und eines zweiten Ergebnisses des Tests von der Mehrzahl von Blockketten der zweiten Struktur. Das Verfahren umfasst ferner auf Grundlage einer fehlenden Übereinstimmung des ersten Ergebnisses mit dem zweiten Ergebnis ein Ermitteln, dass die Mehrzahl von Blockketten der ersten Struktur ein fehlerhaftes Flipflop enthält.

    METHOD AND SYSTEM FOR DEFEATING THE MAN IN THE MIDDLE COMPUTER HACKING TECHNIQUE

    公开(公告)号:CA2706582C

    公开(公告)日:2017-04-11

    申请号:CA2706582

    申请日:2009-05-28

    Applicant: IBM

    Abstract: A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with a client device linear feedback shift register (LFSR) with a defined cycle count; building a transaction consisting of the IPPW, defined cycle count, and userid; transmitting the transaction and form via a network towards the secure web site; wherein in re-sponse the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address.

    METHOD FOR PREVENTING MALICIOUS SOFTWARE INSTALLATION ON AN INTERNET-CONNECTED COMPUTER

    公开(公告)号:CA2640422C

    公开(公告)日:2015-12-01

    申请号:CA2640422

    申请日:2007-01-17

    Applicant: IBM

    Abstract: A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.

    28.
    发明专利
    未知

    公开(公告)号:AT506655T

    公开(公告)日:2011-05-15

    申请号:AT07703940

    申请日:2007-01-17

    Applicant: IBM

    Abstract: A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.

    METHOD AND SYSTEM FOR DEFEATING THE MAN IN THE MIDDLE COMPUTER HACKING TECHNIQUE

    公开(公告)号:CA2706582A1

    公开(公告)日:2009-12-10

    申请号:CA2706582

    申请日:2009-05-28

    Applicant: IBM

    Abstract: A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with a client device linear feedback shift register (LFSR) with a defined cycle count; building a transaction consisting of the IPPW, defined cycle count, and userid; transmitting the transaction and form via a network towards the secure web site; wherein in re-sponse the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address.

Patent Agency Ranking