-
公开(公告)号:DE10052312B4
公开(公告)日:2006-10-26
申请号:DE10052312
申请日:2000-10-21
Applicant: IBM
Inventor: GENTY DENISE MARIE , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN , UNNIKRISHNAN RAMACHANDRAN
Abstract: Disclosed is a system and method for enhancing the security of virtual private network (VPN) connections by automatic pre-negotiation of a secondary configuration. If snooping or other security breaches are detected, the VPN tunnel is modified automatically to the secondary pre-arranged configuration, stymieing attempted security violations.
-
公开(公告)号:CA2332084C
公开(公告)日:2006-08-01
申请号:CA2332084
申请日:2001-01-23
Applicant: IBM
Inventor: CRONK MATTHEW SLADE , SHIEH JOHNNY MENG-HAN , MULLEN SHAWN PATRICK , MCBREARTY GERALD FRANCIS
Abstract: A method and system for running, on different computers at the same time, multiple operating systems from the same shared system resource is provided. This is accomplished, for example, by using persistent elemental disk reservations. Each machine reads the master boot record without reservation to determine the partition of the operating syste m to be booted. Each machine then makes an elemental exclusive write persistent reservation for accessing the operating system boot partition. This is followed by each machine making another elemental exclusive write persistent reservation for accessing the operating system partition itself. Each machine is assigned a different operating system partition even if they are running the same operating system. The unique reservation key for these reservations is creat ed from at least on of a Processor ID, a Cluster ID, a Multiple Processor partition ID, a Non-Unifo rm Memory Access complex ID, and/or a Non-Uniform Memory Access node ID.
-
公开(公告)号:DE10132461B4
公开(公告)日:2006-07-06
申请号:DE10132461
申请日:2001-07-04
Applicant: IBM
Inventor: CAROLL SCOTT ALLEN , FIVEASH WILLIAM ALTON , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN
Abstract: The present invention is embodied in a system and method for monitoring and alerting remote client users of digital intrusions of their computers by host servers. In general, the present invention monitors actions taken by host servers relating to information about the remote client and displays graphical alerts when a digital intrusion or a breach of security occurs during a network connection, such as a connection to the Internet, with the host server. Specifically, the present invention monitors certain aspects of the remote client user s interaction with host servers. Based on certain interaction, such as an attempt by the host server to retrieve non-related information about the remote client, the remote client user can be provided with a graphical alert. This allows the remote client user to make an informed decision whether or not to allow certain host server sites to retrieve the client user s personal information.
-
公开(公告)号:BRPI0410569A
公开(公告)日:2006-06-20
申请号:BRPI0410569
申请日:2004-04-15
Applicant: IBM
Inventor: KEOHANE SUSANN MARIE , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , MURILLO JESSICA KELLEY , SHIEH JOHNNY MENG-HAN
Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.
-
公开(公告)号:CA2525249A1
公开(公告)日:2004-12-02
申请号:CA2525249
申请日:2004-04-15
Applicant: IBM
Inventor: SHIEH JOHNNY MENG-HAN , MULLEN SHAWN PATRICK , MCBREARTY GERALD FRANCIS , KEOHANE SUSANN MARIE , MURILLO JESSICA KELLEY
Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially- tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and reconfigures the server ports to accept a re-mount from the client via a more secure port. The server reconfigured server port is provided the IP address of the client and matche s the IP address during the re-mount operation. The switch to a secure mount i s completed in a seamless manner so that authorized users are allowed to acces s sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from unauthorized capture during transmission to the client system.
-
公开(公告)号:AU2002337326A1
公开(公告)日:2003-11-10
申请号:AU2002337326
申请日:2002-10-28
Applicant: IBM
Inventor: MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN , TESAURO JAMES STANLEY
Abstract: Apparatus for eavesdropping within an area layer adjacent to and surrounding a LAN area periphery for potential wireless transmissions of an intruder having a lower frequency within a level below the LAN frequency; and an implementation responsive to said eavesdropping apparatus for changing the encryption code of said encrypted wireless transmission upon the eavesdropping detection of a wireless transmission of said lower frequency addressed to a network location of one of the terminals in said LAN.
-
公开(公告)号:CA2481682A1
公开(公告)日:2003-11-06
申请号:CA2481682
申请日:2002-10-28
Applicant: IBM
Inventor: SHIEH JOHNNY MENG-HAN , TESAURO JAMES STANLEY , MULLEN SHAWN PATRICK , MCBREARTY GERALD FRANCIS
Abstract: The present invention involves the recognition that since an eavesdropper listening adjacent to a wireless LAN is likely to be mobile and operating on a short time cycle, he himself is likely to be wirelessly transmitting his tes t message. Consequently, the present invention provides the combination of apparatus for eavesdropping within an area layer adjacent to and surrounding the LAN area periphery for potential wireless transmissions of an intruder having a lower frequency within a level below the LAN frequency and addresse d to the network location of any one of the computer terminals in the LAN; and an implementation responsive to said eavesdropping means for changing the encryption code of said encrypted wireless transmission upon the eavesdroppi ng detection of a wireless transmission of said lower frequency addressed to a network location of one of the terminals in said LAN. There is the recogniti on that there are several factors contributing to the success of the process of the invention. It is likely that the intruder must send his message at a low er frequency than the 2.4 GHz frequency of the LAN area transmissions because t he intruder will probably have to reach a base station tower over a longer distance or range than the adjacent target wireless LAN facility. This insur es thatthe eavesdropping of the present invention will be at a lower frequency and, thus, not interfered with by the transmissions within the LAN.
-
公开(公告)号:DE10132461A1
公开(公告)日:2002-01-24
申请号:DE10132461
申请日:2001-07-04
Applicant: IBM
Inventor: CAROLL SCOTT ALLEN , FIVEASH WILLIAM ALTON , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN
Abstract: A client computer (210) connects to a Web server (212) platform via a transmission channel (214) like the Internet, an intranet or another known network connection. The platform can be one of a number of servers accessed by clients. A client computer has an operating system (211), a graphics user interface (213) and a browser (216). Actions are monitored that are undertaken by host servers in relation to data from remote client users.
-
公开(公告)号:DE10052312A1
公开(公告)日:2001-11-08
申请号:DE10052312
申请日:2000-10-21
Applicant: IBM
Inventor: GENTY DENISE MARIE , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN , UNNIKRISHNAN RAMACHANDRAN
Abstract: Virtual private network system which can be changed as required. Such a requirement would be if unauthorized access or other security violations are detected. The network is then automatically changed to a second configuration to frustrate such attempted security violations. The invention uses tunnel network configurations and has the ability to change configurations. An Independent claim is made for a method for using tunnel network configurations with virtual private networks to increase security.
-
公开(公告)号:DE10052311A1
公开(公告)日:2001-05-23
申请号:DE10052311
申请日:2000-10-21
Applicant: IBM
Inventor: GENTY DENISE MARIE , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , SHIEH JOHNNY MENG-HAN , UNNIKRISHNAN RAMACHANDRAN
Abstract: Two batches of tunnel configuration data and back-up configuration data are assigned to respective tunnel nodes with administrators. The administrators output commands to respective nodes, for communicating through a tunnel network connected between the tunnel nodes. Independent claims are also included for the following: (a) Communication method in virtual private network system; (b) Recording medium with computer program for implementing private network.
-
-
-
-
-
-
-
-
-