Abstract:
A computer system includes a security subsystem which is able to trustfully track which files or storage areas of a storage device have been altered since a last virus scan. The trusted information can then be used to accelerate scans for undesirable code or data such as viruses and invalid or corrupt registry entries. In the case of viruses, files or storage areas which have been altered are scanned against a super-set of virus definitions. Unaltered files or storage areas are scanned against a subset of virus definitions.
Abstract:
PROBLEM TO BE SOLVED: To reduce a risk that a password or the like may be acquired by a malicious user while making it possible to perform domain logon utilizing a cache within a registry. SOLUTION: Processed password information corresponding to user identification information is read out from a secured storage area in which GINA (Graphical Identification and Authentication) to be a part of Windows (R) is and written in the registry. After completing authentication concerned with domain logon, the password information written in the registry is erased. Consequently, user's password information is not left in the registry and is not stored as a system file. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide technology for realizing sharing of the insufficiently used resources of a workstation of a computer network by using the known grid computation standard while maintaining the integrity parameters and performance parameters of individual workstations regarding their interactive workloads. SOLUTION: In a network of the workstations which realizes a grid for sharing workstation resources while maintaining the workloads of local workstations, grid workloads are allocated to the workstations according to the degrees of use in the local workloads. The CPU use rate is monitored by each workstation and the grid workloads are accepted only when they do not affect the interactive performance of the workstations and they can be processed conforming to the user setting of the workstations. In addition, the grid workloads are classified by the degrees of coupling of workstation resources and this classification is used as further input in a grid workload allocation process. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a computer in which passwords of a magnetic disk device and a BIOS (Basic Input/Output System) for protecting security can be shared among a plurality of users, and a shared password management method. SOLUTION: An internal key is encrypted using an external key that can be input only by the users concerned, and the shared passwords are further encrypted using the internal key. The encrypted internal key and shared passwords are stored in a nonvolatile storage means to which read prohibition can be set. Consequently, if the user knows his/her external key, the user can use the computer without knowing the shared passwords and can change the shared passwords. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a reliable method/system of safety protection of a computer, which a possessor can easily use. SOLUTION: The method contains a step for installing the operation permission zone of a computer, a step for judging whether the possessor of the commuter is permitted to possess it when the computer and the possessor leave the operation permission zone and they pass through a portal and a step for permitting continuous access to the computer without the request of a password if the possessor is permitted. The method and a system are transparent for the possessor and to hide the computer from the portal does not bring any advantage. The method and the system can easily be applied to company environment and are especially suitable for the safety protection of the mobile computer system.
Abstract:
PROBLEM TO BE SOLVED: To provide a super secure migratable key by the TCPA (trusted computing platform alliance). SOLUTION: A method for providing security by using a secure chip, includes steps of: creating a migratable key blobe using a first random number, where the migratable key blobe contains a key; wrapping the migratable key blobe with a public key of the key's parent key; encrypting the first random number with a pass phrase for a user of the key; storing the encrypted first random number; and migrating the migratable key blobe from a computer to itself. If the public key of the secure chip is stolen, the thief can only unwrap keys which are ancestors of the key in the migratable key blobe. To obtain the key in the migratable key blobe, the random number used to create it is required. However, the pass phrase of the user is required to decrypt it. This increases the security of the key stored in the migratable key blobe and its slave keys. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a device for broadcasting an optical signal in an opto- electric computer network so that the optical signal can be broadcast to plural receivers selected by a broadcaster using a single optical path. SOLUTION: The opto-electric computer network comprises plural computers. Each computer comprises a 1st optical fiber cable for transmitting an optical signal beam and a 2nd optical fiber cable for receiving the optical signal beam. The device for broadcasting the optical signal in the opto-electric computer network comprises a lens and an array of mirrors. The lens is able to split the optical signal beam received from the 1st optical fiber cable of one of the computers into plural optical signal beams. The mirror array is formed of mirrors which can be deformed, and transmits each optical signal beam to individual 2nd optical fiber cables of other computers selected in the network.
Abstract:
PROBLEM TO BE SOLVED: To provide a device for switching an optical signal in an optical hub of an opto-electric computer network. SOLUTION: The opto-electric computer network comprises plural computers. Each computer comprises a 1st optical fiber cable for transmitting an optical signal beam and a 2nd optical fiber cable for receiving the optical signal beam. According to a preferred embodiment of this invention, a device for broadcasting the optical signal in the opto-electric computer network comprises a prism and an array of mirrors. The prism is able to split the optical signal beam received from the 1st optical fiber cable of one of the computers into plural optical signal beams. Each optical signal beam is an optical signal beam of a specific frequency in an optical spectrum. Next, the mirror array formed of mirrors which can be deformed transmits each optical signal beam to individual 2nd optical fiber cables of the other computers.
Abstract:
PROBLEM TO BE SOLVED: To enhance protection of an authentication password stored in a database held by a SAM of Windows (R). SOLUTION: A GINA, a part of the OS, receives an authentication password in ASCII codes. The authentication password is converted to first UNICODES, and the first UNICODES are salted with a random number and converted to second UNICODES. The random number used for salting is associated with a user account and a password and stored in a read/write protected non-volatile memory or a non-volatile memory which can be accessed only by a BIOS. An LSA of the Windows (R) can process UNICODES without being changed. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a validation device and its method for authentication in a computer system. SOLUTION: In this computer system 10 and its operation method, a second input device 14 requiring second authentication input for enabling authentication of an authentication input from an ordinary keyboard 12 is selectively arranged between the keyboard 12 and a security element related to a system mother board for avoiding possibility of careless disclosure or attachment of an authentication date row. COPYRIGHT: (C)2004,JPO