MUTUAL AUTHORIZATION IN A GRID THROUGH PROXY CERTIFICATE GENERATION
    1.
    发明申请
    MUTUAL AUTHORIZATION IN A GRID THROUGH PROXY CERTIFICATE GENERATION 审中-公开
    通过代理证书产生的互联网授权

    公开(公告)号:WO2005094034A1

    公开(公告)日:2005-10-06

    申请号:PCT/EP2005/051321

    申请日:2005-03-22

    Abstract: A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual au­thentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.

    Abstract translation: 提供了一种用于资源计算机网格中的辅助资源的相互授权的机制。 当主资源尝试将网格计算作业卸载到辅助资源时,主资源会向用户计算机发送代理证书请求。 响应于代理证书请求,用户机器使用辅助资源执行授权。 如果辅助资源的授权成功,用户计算机将生成并返回有效的代理证书。 然后,主资源与辅助资源执行相互验证。 如果辅助资源的授权失败,则用户计算机生成并返回无效的代理证书。 由于无效的代理证书,主资源和辅助资源之间的相互验证将失败。 然后,主资源选择另一个辅助资源,并重复该过程,直到找到通过用户机器的相互授权的资源。

    METHOD AND APPARATUS FOR AUTHORIZING EXECUTION FOR APPLICATIONS IN A DATA PROCESSING SYSTEM
    5.
    发明申请
    METHOD AND APPARATUS FOR AUTHORIZING EXECUTION FOR APPLICATIONS IN A DATA PROCESSING SYSTEM 审中-公开
    在数据处理系统中授权执行应用程序的方法和设备

    公开(公告)号:WO2004079483A3

    公开(公告)日:2004-12-09

    申请号:PCT/GB2004000926

    申请日:2004-03-04

    CPC classification number: G06F21/51 G06F21/33

    Abstract: A method, apparatus, and computer instructions for authorizing execution of an application on the data processing system. A request is received to execute the application, wherein the request originates from a remote data processing system and wherein the request includes a digital certificate and the application. The digital certificate is verified in response to receiving the request. Responsive to verifying the digital certificate, a digital digest is calculated for the application to form a calculated digital digest. The calculated digital digest is compared with a set of digital digests from a trusted source. The application is executed if a match between the calculated digital digest and set of digital digests occurs.

    Abstract translation: 一种用于授权在数据处理系统上执行应用程序的方法,装置和计算机指令。 接收到执行应用程序的请求,其中该请求源自远程数据处理系统,并且其中该请求包括数字证书和应用程序。 数字证书在接收到请求后进行验证。 响应于验证数字证书,为应用计算数字摘要以形成计算的数字摘要。 将计算出的数字摘要与来自可信来源的一组数字摘要进行比较。 如果计算出的数字摘要和一组数字摘要发生匹配,则执行该应用程序。

    DISTRIBUTED FILESYSTEM NETWORK SECURITY EXTENSION
    6.
    发明申请
    DISTRIBUTED FILESYSTEM NETWORK SECURITY EXTENSION 审中-公开
    分布式文件系统网络安全扩展

    公开(公告)号:WO2004104902A1

    公开(公告)日:2004-12-02

    申请号:PCT/GB2004/001629

    申请日:2004-04-15

    Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and reconfigures the server ports to accept a re-mount from the client via a more secure port. The server reconfigured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from unauthorized capture during transmission to the client system.

    Abstract translation: 请求访问联网文件系统上的敏感文件时,动态实现文件系统增强的安装安全性的安全协议。 当客户端系统的用户尝试访问特别标记的敏感文件时,托管文件系统的服务器将执行终止当前安装的软件代码,并重新配置服务器端口,以通过更安全的端口从客户端接受重新安装 。 服务器重新配置的服务器端口提供了客户端的IP地址,并在重新安装操作期间匹配IP地址。 以无缝的方式完成对安全安装的切换,从而允许授权用户访问敏感文件,而不会使用昂贵的加密和其他资源密集型安全功能来阻止服务器。 用户不会发生显着的延迟,而敏感文件在传输到客户端系统时被屏蔽,防止未经授权的捕获。

    ROUTER DETECTION
    10.
    发明申请
    ROUTER DETECTION 审中-公开
    路由器检测

    公开(公告)号:WO2009043745A1

    公开(公告)日:2009-04-09

    申请号:PCT/EP2008/062593

    申请日:2008-09-22

    CPC classification number: H04L41/12 H04L45/00 H04L45/20 H04L63/1441

    Abstract: A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.

    Abstract translation: 一种计算机实现的方法,数据处理系统和用于发现网络中的未经授权的路由器的计算机程序产品。 说明性实施例中的过程首先获得可疑路由器或目的地设备的物理地址。 创建包括至少目的地媒体访问控制字段,目的地互联网协议字段和生存时间字段的数据分组,其中目的地媒体访问控制字段包括目的地设备的物理地址,其中目的地 互联网协议字段包括虚假的因特网协议地址,并且其中所述生存时间字段包括指示所述数据分组已超过时间限制的值。 使用目标介质访问控制字段中的物理地址将数据包发送到目标设备。 如果从目的地设备接收到超时消息,则确定目的地设备被启用以进行路由。

Patent Agency Ranking