CONTROLLED DISTRIBUTION OF APPLICATION CODE AND CONTENT DATA WITHIN A COMPUTER NETWORK
    1.
    发明申请
    CONTROLLED DISTRIBUTION OF APPLICATION CODE AND CONTENT DATA WITHIN A COMPUTER NETWORK 审中-公开
    在计算机网络中控制应用程序代码和内容数据的分配

    公开(公告)号:WO02084938A3

    公开(公告)日:2003-03-20

    申请号:PCT/GB0201738

    申请日:2002-04-12

    Applicant: IBM IBM UK

    CPC classification number: H04L63/0823 H04L63/126 H04L63/145 H04L2463/102

    Abstract: A secure communication methodology is presented. The client device is configured to download application code and/or content data from a server operated by a service provider. Embedded within the client is a client private key, a client serial number, and a copy of a server public key. The client forms a request, which includes the client serial number, encrypts the request with the server public key, and sends the download request to the server. The server decrypts the request with the server's private key and authenticates the client. The received client serial number is used to search for a client public key that corresponds to the embedded client private key. The server encrypts its response, which includes the requested information, with the client public key of the requesting client, and only the private key in the requesting client can be used to decrypt the information downloaded from the server.

    Abstract translation: 提出了一种安全的通信方法。 客户端设备被配置为从由服务提供商操作的服务器下载应用代码和/或内容数据。 嵌入在客户端中的是客户端私钥,客户端序列号和服务器公钥的副本。 客户端形成请求,其中包括客户端序列号,使用服务器公钥加密请求,并将下载请求发送到服务器。 服务器使用服务器的私钥对请求进行解密,并对客户端进行身份验证。 接收到的客户端序列号用于搜索与嵌入式客户端私钥对应的客户端公钥。 服务器将其响应(包括所请求的信息)与请求客户端的客户端公钥加密,并且只有请求客户端中的私钥可以用于解密从服务器下载的信息。

    REMOTE AUTHENTIFICATION OF FINGERPRINTS OVER AN INSECURE NETWORK
    2.
    发明申请
    REMOTE AUTHENTIFICATION OF FINGERPRINTS OVER AN INSECURE NETWORK 审中-公开
    远程认证网络中的指纹

    公开(公告)号:WO02091142A3

    公开(公告)日:2003-09-04

    申请号:PCT/GB0202010

    申请日:2002-05-02

    Applicant: IBM IBM UK

    Abstract: The present invention relates to a method , system and computer program product for enabling the remote authentification of fingerprints over an insecure network using a client-server architecture by generation of a set of random queries relating to fingerprint patterns based on stored fingerprint data at the server, to which the client responds based on the observed fingerprint patterns, followed by the issuing of a randomly generates set of challenges pertaining to geometrical relationships between the fingerprint patterns for which confirm responses are received by their server, the final authentification being determined by the proportion of correct responses by the client to said challenges.

    Abstract translation: 本发明涉及一种方法,系统和计算机程序产品,用于通过使用客户端 - 服务器架构,通过基于服务器上存储的指纹数据生成与指纹模式相关的一组随机查询,来实现对不安全网络的指纹的远程认证 ,客户端根据观察到的指纹图案进行响应,随后随机地生成与其服务器接收到确认响应的指纹图案之间的几何关系有关的一组挑战,最终鉴定由比例确定 客户对所面临的挑战作出正确的回应。

    3.
    发明专利
    未知

    公开(公告)号:DE69635037D1

    公开(公告)日:2005-09-15

    申请号:DE69635037

    申请日:1996-03-15

    Applicant: IBM

    Abstract: The computer processing unit of the present invention includes a new prefetch instruction, referred to as an STOUCH instruction, which provides the capability to encode compile-time speculations associated with the conditional branches between the time the prefetch request is initiated and the time the prefetched data is actually needed. As a result of this explicit communication of compile-time speculations to the run-time hardware, prefetched lines based on invalid speculations can be discarded earlier, whereas, prefetched lines based on valid speculations can be retained longer in the cache, leading to better cache performance.

    Controlled distribution of application code and content data within a computer network

    公开(公告)号:AU2002251285A1

    公开(公告)日:2002-10-28

    申请号:AU2002251285

    申请日:2002-04-12

    Applicant: IBM

    Abstract: A secure communication methodology is presented. The client device is configured to download application code and/or content data from a server operated by a service provider. Embedded within the client is a client private key, a client serial number, and a copy of a server public key. The client forms a request, which includes the client serial number, encrypts the request with the server public key, and sends the download request to the server. The server decrypts the request with the server's private key and authenticates the client. The received client serial number is used to search for a client public key that corresponds to the embedded client private key. The server encrypts its response, which includes the requested information, with the client public key of the requesting client, and only the private key in the requesting client can be used to decrypt the information downloaded from the server.

Patent Agency Ranking