External storage device, method for processing data stored in external storage device, program, and information processing device
    32.
    发明专利
    External storage device, method for processing data stored in external storage device, program, and information processing device 有权
    外部存储装置,用于处理存储在外部存储装置中的数据的方法,程序和信息处理装置

    公开(公告)号:JP2010238031A

    公开(公告)日:2010-10-21

    申请号:JP2009086276

    申请日:2009-03-31

    CPC classification number: G06F21/10

    Abstract: PROBLEM TO BE SOLVED: To provide a method which is useful for improving security, concerning to data stored in an external storage device of an information-processing device. SOLUTION: An external storage device includes an inputting/outputting interface for exchanging data with an information-processing device; a first storage area for storing data which are correlated with a first expiration date and a second expiration date; and a second storage area for storing a control program. The first expiration date is used under the conditions that one information-processing device be connected to the external storage device, and the second expiration date is used under the conditions that the other information-processing device be connected to the external storage device. The control program makes a processor execute the steps of establishing connections made through the inputting/outputting interface; a step of identifying either the first expiration date or the second expiration date, as an expiration date to be used to data, according to the information-processing devices connected, and a step of executings prescribed security protecting processings on the data, according to the expiration date identified. COPYRIGHT: (C)2011,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种有助于提高与信息处理设备的外部存储设备中存储的数据有关的安全性的方法。 解决方案:外部存储装置包括用于与信息处理装置交换数据的输入/输出接口; 用于存储与第一有效期和第二有效期相关的数据的第一存储区域; 以及用于存储控制程序的第二存储区域。 在一个信息处理装置连接到外部存储装置的条件下使用第一到期日,并且在其他信息处理装置连接到外部存储装置的条件下使用第二到期日。 控制程序使处理器执行通过输入/输出接口建立连接的步骤; 根据所连接的信息处理设备,根据所述信息处理设备识别作为数据的有效期限的步骤,根据所述数据来执行规定的对所述数据的安全保护处理的步骤 到期日确定。 版权所有(C)2011,JPO&INPIT

    Computer program, shared object control device and shared object control method
    33.
    发明专利
    Computer program, shared object control device and shared object control method 有权
    计算机程序,共享对象控制设备和共享对象控制方法

    公开(公告)号:JP2010009490A

    公开(公告)日:2010-01-14

    申请号:JP2008170858

    申请日:2008-06-30

    Abstract: PROBLEM TO BE SOLVED: To provide a computer program for securely using a shared object in an arbitrary application while maintaining a predetermined confidentiality level, a shared object control device and a control method. SOLUTION: A plurality of divided areas are allocated to a temporary storage area in accordance with confidentiality level information. A storage area management table for storing pointer information and encryption key information of the divided areas in association with user identification information and the confidentiality level information. When receiving a read or write instruction through the temporary storage area, the pointer information is extracted on the basis of the user identification information of a user who instructs the read or write processing , and address information showing an object to be read or written is converted into the extracted pointer information. The confidentiality level information is specified on the basis of the extracted pointer information, information to be written is encrypted by using encryption key information corresponding to the confidentiality level information, or information to be read is decrypted. COPYRIGHT: (C)2010,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种用于在保持预定机密性级别的同时在任意应用中安全地使用共享对象的计算机程序,共享对象控制装置和控制方法。 解决方案:根据机密级别信息将多个分割区域分配给临时存储区域。 存储区域管理表,用于与用户识别信息和机密级别信息相关联地存储分割区域的指针信息和加密密钥信息。 当通过临时存储区域接收到读取或写入指令时,基于指示读取或写入处理的用户的用户识别信息来提取指针信息,并且转换表示要读取或写入的对象的地址信息 进入提取的指针信息。 基于所提取的指针信息指定机密性级别信息,通过使用与机密性级别信息相对应的加密密钥信息对要写入的信息进行加密,或将要读取的信息解密。 版权所有(C)2010,JPO&INPIT

    Technique for managing limitation of access to file
    34.
    发明专利
    Technique for managing limitation of access to file 审中-公开
    管理文件访问限制的技术

    公开(公告)号:JP2008210300A

    公开(公告)日:2008-09-11

    申请号:JP2007048285

    申请日:2007-02-28

    Abstract: PROBLEM TO BE SOLVED: To properly maintain the limitation of access to a file even after the file is transferred. SOLUTION: A system for setting the limitation of access to a file comprises a storage part for storing the hash value of second file and the limitation information indicating the limitation of access set before combined to the second file among at least one of the second files combined as a single first file in association with each other, a retrieval part for calculating the hash value of at least one of fourth files generated and retrieving the hash value corresponding to the calculated hash value from the storage part under the condition that the fourth files are generated by dividing a single third file, and a limitation set part for setting the limitation of access to the fourth file according to the limit information stored in the storage part in association with the retrieved hash value under the condition that the hash value corresponding to the hash value of the fourth file is retrieved. COPYRIGHT: (C)2008,JPO&INPIT

    Abstract translation: 要解决的问题:即使在文件传输之后,也可以正确地保持访问文件的限制。 解决方案:用于设置对文件的访问限制的系统包括用于存储第二文件的哈希值的存储部分和指示在组合到第二文件之前的访问集合的限制的限制信息,其中至少一个 第二文件被组合为相互关联的单个第一文件,检索部分,用于计算所生成的第四文件中的至少一个的哈希值,并且在所述第二文件的所述条件下从所述存储部分检索与所计算的散列值相对应的哈希值 第四文件是通过划分单个第三文件和限制集合部分来生成的,该限制设置部分用于根据与所检索的散列值相关联地存储在存储部分中的限制信息来设置对第四文件的访问限制, 对应于第四个文件的哈希值被检索。 版权所有(C)2008,JPO&INPIT

    Information processing apparatus, method, and program for controlling resource access by application program
    35.
    发明专利
    Information processing apparatus, method, and program for controlling resource access by application program 有权
    信息处理设备,方法和程序,用于通过应用程序控制资源访问

    公开(公告)号:JP2008165325A

    公开(公告)日:2008-07-17

    申请号:JP2006351606

    申请日:2006-12-27

    CPC classification number: G06F21/6218 G06F21/554

    Abstract: PROBLEM TO BE SOLVED: To provide a technology for rejecting or permitting access from an application program to a resource on the basis of the use environment or situation of an information processing apparatus. SOLUTION: This information processing apparatus is provided with: a detecting part for detecting the change of connecting state or use state of a device connected to the information processing apparatus; a selecting part for selecting resource access conditions to be applied to the information processing apparatus on the basis of the detected connecting state in response to the detection of the change of the connecting state; and a condition storage part for storing the selected resource access conditions. Furthermore, this information processing apparatus is provided with a capturing part for capturing a plurality of function call for resource access issued to an operating system by an application program; a deciding part for deciding the permission of the captured function call; and a control part for rejecting the function call. When the function call is captured, the permission is decided on the basis of the resource access conditions read from the condition storage part, and the function call is rejected in response to the decision of non-permission. COPYRIGHT: (C)2008,JPO&INPIT

    Abstract translation: 要解决的问题:提供根据信息处理设备的使用环境或情况拒绝或允许从应用程序访问资源的技术。 该信息处理装置具备:检测部,其检测与信息处理装置连接的装置的连接状态的变化或使用状态; 选择部件,用于响应于检测到连接状态的改变,基于检测到的连接状态来选择要应用于信息处理设备的资源访问条件; 以及条件存储部分,用于存储所选择的资源访问条件。 此外,该信息处理装置设置有捕获部件,用于捕获通过应用程序发布到操作系统的资源访问的多个功能调用; 用于决定所捕获的功能呼叫的许可的决定部分; 以及用于拒绝功能调用的控制部分。 当捕获功能调用时,基于从条件存储部分读取的资源访问条件来决定权限,并且响应于不允许的决定而拒绝该功能调用。 版权所有(C)2008,JPO&INPIT

    METHOD AND DEVICE FOR CONTROLLING CPU SPEED ACCORDING TO MESSAGE

    公开(公告)号:JP2000194436A

    公开(公告)日:2000-07-14

    申请号:JP36440698

    申请日:1998-12-22

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To obtain a method and a device which change the operation speed for a CPU in accordance with the residual quantity of unprocessed messages in a computer system including an operating system (OS), especially in a multitask operating system capable of simultaneously and parallelly processing plural jobs (tasks). SOLUTION: In this configuration, a computer including a processor capable of dynamically changing operation speeds includes (a) a program performing processing in a prescribed processing unit, (b) a means which calculates the time difference between preparation time in the prescribed processing unit and the present time (432) and (c) means (436, 450, etc)., which change the operation speed of the processor to be faster than the current one when the time difference is larger than a 1st value and change the operation speed of the processor to be slower than the current one when the time difference is smaller than a 2nd value.

    OPERATION SPEED CONTROL METHOD FOR PROCESSOR INSIDE COMPUTER AND COMPUTER

    公开(公告)号:JPH11353052A

    公开(公告)日:1999-12-24

    申请号:JP13846598

    申请日:1998-05-20

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To refer to a performance index, to control the operation speed of a processor and to reduce power consumption by referring to a user mode instruction number executed in prescribed time and changing the operation speed of the processor. SOLUTION: Clock signals inputted to a CPU 3 are controlled by a controller 11. The control of the clock signals is executed by changing the frequency of the clock signals and stopping the supply of the clock signals if the CPU 3 can comply with it. The controller 11 observes the operation of the CPU 3 and monitors input from a sensor 13. For the observation of the CPU 3, for instance, a cache error rate, the number of access to a non-cacheable memory, an I/O instruction ratio or the like, a total execution instruction number per unit time and the execution instruction number of a user mode are considered. An I/O instruction or the like is executed in a system mode and discriminated from the user mode. By using the information, the controller 11 controls the operation of a clock oscillator 9 and the CPU 3.

    COMPUTER AND PARAMETER SETTING METHOD

    公开(公告)号:JPH1173255A

    公开(公告)日:1999-03-16

    申请号:JP23004697

    申请日:1997-08-26

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To reduce the power of a computer. SOLUTION: This computer is provided with main execution applications 42-46, resource manager 10 for examining the using situations of inspected devices, and policy manager 20 for receiving job type decision information related with the main execution applications and the using situations of the inspected devices from the resource manager 10, and deciding a job type corresponding to the job type decision information among job types preliminarily decided for the main execution applications. Then, the resource manager 10 receives the job type corresponding to the job type decision information from the policy manager 20, and sets the parameters of controlled devices 32-40 preliminarily decided for the job type in the controlled devices. Also, the job type communicated from the policy manager can be a job type name or the group of the operation modes of the controlled devices.

    Verfahren zum Einrichten einer sicher verwalteten Ausführungsumgebung für eine virtuelle Maschine und eine Computervorrichtung

    公开(公告)号:DE102012210887B4

    公开(公告)日:2022-12-15

    申请号:DE102012210887

    申请日:2012-06-26

    Applicant: IBM

    Abstract: Computervorrichtung, die mit einer virtualisierten Umgebung ausgestattet ist,in der eine virtuelle Maschine in einem Host-Betriebssystem eingerichtet wird, wobei sich ein erster Sicherheitsagent im Host-Betriebssystem befindet und wobei sich ein zweiter Sicherheitsagent in einem Gast-Betriebssystem der virtuellen Maschine befindet, wobeider erste Sicherheitsagent Folgendes aufweist:einen Zugangskontrollabschnitt zum Steuern des Zugriffs durch eine Anwendung im Host-Betriebssystem;einen ersten Darstellungsbefehl-Hook-Abschnitt zum selektiven Hooken eines von einer Anwendung einer virtuellen Maschine ausgegebenen Bildschirmdarstellungsbefehls; undeinen Verschlüsselungsverarbeitungs-Abschnitt zum Ausführen einer Verschlüsselungsverarbeitung des vom ersten Darstellungsbefehl-Hook-Abschnitt gehookten Bildschirmdarstellungsbefehls mit Hilfe eines Verschlüsselungssystems mit allgemeinem Schlüssel; undwobei der zweite Sicherheitsagent Folgendes aufweist:einen Zugangskontrollabschnitt zum Steuern eines Zugriffs durch eine Anwendung im Gast-Betriebssystem;einen zweiten Darstellungsbefehl-Hook-Abschnitt zum selektiven Hooken eines von einer Anwendung im Gast-Betriebssystem ausgegebenen Bildschirmdarstellungsbefehls; undeinen Verschlüsselungsverarbeitungs-Abschnitt zum Ausführen einer Verschlüsselungsverarbeitung des vom zweiten Darstellungsbefehl-Hook-Abschnitt gehookten Bildschirmdarstellungsbefehls mit Hilfe eines Verschlüsselungssystems mit allgemeinem Schlüssel.

    Sharing geographically concentrated workload among neighboring mec hosts of multiple carriers

    公开(公告)号:AU2021259515A1

    公开(公告)日:2022-08-04

    申请号:AU2021259515

    申请日:2021-04-20

    Applicant: IBM

    Abstract: In aggregating application functions on multi-access edge computing (MEC) hosts across multiple carriers, a system associated with a particular application receives performance data from a first and second MEC hosts.The first MEC host is deployed on a first network carrier and coupled to first user terminals.The second MEC host is deployed on a second network carrier and coupled to second user terminals. The particular application is installed on the first and second MEC hosts. The system determines whether the performance data from the second MEC host exceeds a threshold value. If so, the system sends instructions to the second MEC host to aggregate function(s) of the particular application to the first MEC host. As a result, each of the first and second user terminals connect to the first MEC host to receive content for the particular application.

Patent Agency Ranking