Abstract:
A portable computer device, comprising a circuit board; a connector in communication with the circuit board, the connector adapted for insertion into a computer port; a light source associated with the circuit board; and a housing encasing at least the circuit board and the light source, the housing comprising a substantially opaque body portion and a substantially transparent or translucent lens portion, the lens portion located proximate the light source.
Abstract:
A technique for encrypting a file without changing file size may involve encrypting a first set of a plurality of blocks of a file in a first encryption mode using the first set of encryption keys and/or the first set of configuration rules, and a second set of the plurality of blocks of the file in a second encryption mode using a second set of the encryption keys and/or a second set of the configuration rules without causing the file to increase in size before and after the encryption. Here, the first and the second encryption modes are chosen to be different, so are the first and the second sets of the encryption keys and/or the configuration rules to reduce security risk of the file being encrypted.
Abstract:
A novel approach introduces an extra layer of data security by storing files and the keys required to access the files separately. When the files are being accessed, the host of the files sends a request to an access device that stores the keys to access the files. The key will be provided to the host only if at least one of the following conditions is met: the host is within close proximity of the access device, the identity of the person attempting to access the files is authenticated, or the security status of the host is verified.
Abstract:
A technique for protecting sensitive data (202) involves using encryption in a database ( 108). A system and method according to the technique may include automatically selecting a new encrypting key for re-encrypting data in a target database. New initialization vectors may be specified for re-encrypting each column of data selected for re-encryption. A new initialization vector may be specified For one or more rows of data in a database table in the target database that is selected for re-encryption (712).
Abstract:
A portable computer device, comprising a circuit board; a connector in communication with the circuit board, the connector adapted for insertion into a computer port; a light source associated with the circuit board; and a housing encasing at least the circuit board and the light source, the housing comprising a substantially opaque body portion and a substantially transparent or translucent lens portion, the lens portion located proximate the light source.
Abstract:
A method for generating look-up tables for a high speed multi-bit Real-time Deterministic Finite state Automaton (hereinafter RDFA). First a DFA is generated in accordance with the prior art. For each state in the DFA, and for each of the bytes recognized in parallel: First an n-closure list is generated. Next an alphabet transition list is generated for each state. An 'alphabet transition list' is a list of the transitions out of a particular state for each of the characters in an alphabet. Finally, the transitions are grouped into classes. Each class is used to identify the next state. The result is a state machine that has less states than the original DFA.