1.
    发明专利
    未知

    公开(公告)号:DE3855378D1

    公开(公告)日:1996-07-25

    申请号:DE3855378

    申请日:1988-12-20

    Applicant: IBM

    Abstract: In the remote trusted path, secure systems may provide a mechanism for the user to establish a trusted path for direct communication with the system's trusted computing base for security-critical operations. This invention allows users to request such a trusted path from remote systems using a new TELNET option and command, in a system-independent, confirmed, backward-compatible manner. It also describes how to implement remote support for such a trusted path in systems which use a Secure Attention Key mechanism such as Secure AIX.

    2.
    发明专利
    未知

    公开(公告)号:DE3855378T2

    公开(公告)日:1997-01-23

    申请号:DE3855378

    申请日:1988-12-20

    Applicant: IBM

    Abstract: In the remote trusted path, secure systems may provide a mechanism for the user to establish a trusted path for direct communication with the system's trusted computing base for security-critical operations. This invention allows users to request such a trusted path from remote systems using a new TELNET option and command, in a system-independent, confirmed, backward-compatible manner. It also describes how to implement remote support for such a trusted path in systems which use a Secure Attention Key mechanism such as Secure AIX.

    3.
    发明专利
    未知

    公开(公告)号:DE3852292T2

    公开(公告)日:1995-05-24

    申请号:DE3852292

    申请日:1988-12-20

    Applicant: IBM

    Abstract: When the user is logged on to a processor running multiple virtual terminals and he presses a Secure Attention Key, the existing virtual terminal processes are not destroyed. Instead, the invention creates a new virtual terminal, establishes a trusted path for the new virtual terminal, makes the new virtual terminal the current virtual terminal, and then runs the trusted process in the new virtual terminal.

    4.
    发明专利
    未知

    公开(公告)号:DE3852292D1

    公开(公告)日:1995-01-12

    申请号:DE3852292

    申请日:1988-12-20

    Applicant: IBM

    Abstract: When the user is logged on to a processor running multiple virtual terminals and he presses a Secure Attention Key, the existing virtual terminal processes are not destroyed. Instead, the invention creates a new virtual terminal, establishes a trusted path for the new virtual terminal, makes the new virtual terminal the current virtual terminal, and then runs the trusted process in the new virtual terminal.

Patent Agency Ranking