METHOD AND DEVICE FOR GENERATING OBJECT IN NONSUSTAINING MEMORY AND METHOD FOR MAINTAINING POSSIBILITY OF ACCESS TO OBJECT

    公开(公告)号:JP2000056982A

    公开(公告)日:2000-02-25

    申请号:JP12081299

    申请日:1999-04-28

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To improve the flexibility of selecting an object type by obtaining a simple programming model for allocation to both a temporary object and a sustaining object and supporting the holding of the temporary object without using a sustaining memory. SOLUTION: In order to generate an object in the nonsustaining memory, a 1st instruction code 31 which executes a 1st function 41 is read out of an instruction code sequence 18 and a 2nd instruction code 32 which generates objects 56, 57, and 58 in the memory is read out. The 1st function 41 selects the discontinuous memory 51 as a memory. The 1st function 41 includes a bracket open type function. At least some of the objects 56, 57, and 58 in the nonsustaining memory are linked in the form of a chain starting at the 1st object 56 in the object 56, 57 and 58.

    SECURE ONLINE BANKING TRANSACTIONS
    3.
    发明申请
    SECURE ONLINE BANKING TRANSACTIONS 审中-公开
    安全的在线银行交易

    公开(公告)号:WO2009122360A2

    公开(公告)日:2009-10-08

    申请号:PCT/IB2009051357

    申请日:2009-03-31

    Abstract: A secure online banking transaction apparatus to communicate with a server over a non-secure connection is provided and includes a selector configured to allow for a selection of a mode of the apparatus, a processing unit coupled to the selector and including a secure communication unit, which is configured to set up a secure connection, along which a secure transaction occurs, with the server via the non-secure connection in accordance with the mode, an input unit coupled to the processing unit and configured to allow for a input of data into the apparatus, which is at least partly related to the secure transaction, and an interface coupled to the processing unit and configured to convey at least a status of the secure transaction and the contents of the inputted data.

    Abstract translation: 提供了一种用于通过非安全连接与服务器进行通信的安全的网上银行交易装置,并且包括被配置为允许选择所述装置的模式的选择器,耦合到所述选择器并包括安全通信单元的处理单元, 其被配置为根据该模式经由非安全连接与服务器建立安全事务发生的安全连接,输入单元耦合到处理单元并被配置为允许数据输入 所述装置至少部分地与所述安全交易相关,以及耦合到所述处理单元并被配置为至少传送所述安全交易的状态和输入的数据的内容的接口。

    DEVICE AND METHOD WITH REDUCED INFORMATION LEAKAGE
    4.
    发明申请
    DEVICE AND METHOD WITH REDUCED INFORMATION LEAKAGE 审中-公开
    具有减少信息泄漏的装置和方法

    公开(公告)号:WO03042799A2

    公开(公告)日:2003-05-22

    申请号:PCT/IB0204620

    申请日:2002-11-05

    CPC classification number: H04L63/04 G06F21/76 H04L9/003 H04L9/0625 H04L2209/12

    Abstract: The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information.

    Abstract translation: 本发明涉及一种数据处理系统,包括处理器和第一持久存储器中的第一加密信息,其信息泄漏级别高于第二持久存储器。 在第二持久存储器中存储用于解密第一加密信息的第一密码密钥,由此产生处理器可用于执行操作的第一未加密信息。 相同的加密密钥也可以用于加密第一未加密信息,从而生成第一加密信息。 还涉及一种使用操作系统处理这种数据处理系统的方法,包括用于将第一未加密信息写入第一持久存储器的写入步骤,用于在使用第一密码的情况下加密第一未加密信息的加密步骤 密钥,从第一永久存储器中创建第一加密信息,以及访问限制步骤,用于将数据处理系统设置为由操作系统控制对第一永久存储器的写入的状态。 它还涉及对这种数据处理系统执行操作的方法,包括解密步骤,用于在使用第一加密密钥的情况下对第一加密信息进行解密,由此产生第一未加密信息,以及执行步骤,用于执行操作, 处理器,使用第一个未加密的信息。

    PERFORMING SECURE ELECTRONIC TRANSACTIONS
    5.
    发明申请
    PERFORMING SECURE ELECTRONIC TRANSACTIONS 审中-公开
    执行安全电子交易

    公开(公告)号:WO2009066217A2

    公开(公告)日:2009-05-28

    申请号:PCT/IB2008054782

    申请日:2008-11-14

    Abstract: Performing secure electronic transactions The invention relates to a method for performing electronic transactions between a server computer (110) and a client computer (120), the method comprising the steps of: - running a first communication protocol with encrypted data transmission and mutual authentication between the server computer (110) and a hardware device (130) via a communication network (160), - performing a decryption of encrypted server responses received from the server computer (110) in the hardware device (130), - forwarding the decrypted server responses from the hardware device (130) to the client computer (120), - displaying the decrypted server responses on a client computer display (121) of the client computer (120), - receiving client requests to be send from the client computer (120) to the server computer (110) by the hardware device (130), - parsing the client requests for predefined transaction information by the hardware device (130), - encrypting and forwarding client requests that do not contain any predefined transaction information to the server computer (110) by the hardware device (130), - displaying the predefined transaction information upon detection in a client request on a hardware device display (210) of the hardware device (130), - forwarding and encrypting the client request containing the predefined transaction information to the server computer (110) if a user confirmation is received, - canceling the electronic transaction if no user confirmation is received.

    Abstract translation: 执行安全的电子交易技术领域本发明涉及一种用于在服务器计算机(110)和客户端计算机(120)之间执行电子交易的方法,所述方法包括以下步骤: - 运行带有加密数据传输的第一通信协议和 服务器计算机(110)和经由通信网络(160)的硬件设备(130), - 执行从所述硬件设备(130)中从所述服务器计算机(110)接收的加密的服务器响应的解密, - 转发所述解密的服务器 从硬件设备(130)到客户端计算机(120)的响应, - 在客户端计算机(120)的客户端计算机显示器(121)上显示解密的服务器响应, - 接收客户端计算机发送的客户端请求 120)由所述硬件设备(130)发送到所述服务器计算机(110), - 通过所述硬件设备(130)解析所述客户端对于预定义事务信息的请求, - 加密和加密 通过硬件设备(130)向服务器计算机(110)不包含任何预定义的交易信息的订单客户端请求, - 在硬件设备的硬件设备显示器(210)上的客户机请求中检测到显示预定交易信息 (130),如果接收到用户确认,则将包含所述预定交易信息的所述客户端请求转发和加密到所述服务器计算机(110); - 如果没有接收到用户确认,则取消所述电子交易。

    SYSTEM AND METHOD FOR DISTRIBUTION OF CREDENTIALS
    6.
    发明申请
    SYSTEM AND METHOD FOR DISTRIBUTION OF CREDENTIALS 审中-公开
    用于分配凭证的系统和方法

    公开(公告)号:WO2008122923A3

    公开(公告)日:2008-12-18

    申请号:PCT/IB2008051216

    申请日:2008-04-01

    Abstract: The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user, wherein the credential user is provided with a user device, wherein a first channel and a second channel are provided for communication between the user device and the credential issuer, the method comprising the steps of: - distributing a shared key between the user device and the credential issuer by means of the second channel, - generating a binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution, - encrypting the binary representation of the set of credentials by means of the shared key, - distributing the encrypted set of credentials via the first channel from the credential issuer to the user device, - decrypting the encrypted set of credentials by the user device by means of the shared key.

    Abstract translation: 本发明涉及一种用于从凭证发行者向凭证用户分发一组凭证的方法,其中凭证用户被提供有用户装置,其中提供第一信道和第二信道用于用户装置与 所述方法包括以下步骤:通过所述第二信道在所述用户设备和所述凭证发行者之间分配共享密钥;以预定义的最大偏差水平生成所述凭证组的二进制表示, - 通过所述共享密钥对所述一组证书的二进制表示进行加密, - 经由所述第一信道将所述加密的凭证集合从所述凭证发行者分发到所述用户装置, - 由所述用户对所述加密的凭证集合进行解密 设备通过共享密钥。

    AUTHORIZATION OF SERVER OPERATIONS

    公开(公告)号:CA2736582C

    公开(公告)日:2018-07-24

    申请号:CA2736582

    申请日:2009-09-17

    Applicant: IBM

    Abstract: An authorization device (5) is provided for authorizing operations of a remote server (2) requested from user computers (3) via a data communications network (4). The device (5) has a computer interface (6) for connecting the device (5) to a local user computer (3) for communication with the remote server (2), and a user interface (7) for presenting information to a user. Control logic (11) of the device (5) is adapted to use security data to establish between the device (5) and server (2), via the local user computer (3), a mutually- authenticated connection for encrypted end-to-end communications between the device and server. The control logic (11) collects from the server (2) via this connection information indicative of any operations requested by user computers via other connections to the server (2) and requiring authorization by a user of the device (5). This information is presented to a user via the user interface (7) to prompt for authorization by the user. Server operations are controlled in accordance with rule data (18) defining operations requiring authorization by one or more authorizing users. Control logic (15) of the server control apparatus responds to an operation request from a user computer (3) by determining from the rule data (18) whether authorization by at least one authorizing user is required for that operation. If so, the operation is deferred. When a mutually-authenticated connection is established with an authorizing device (5), the control apparatus can supply information indicative of any deferred operations requested from user computers (3) and requiring authorization by the device user. A deferred operation is only performed on receipt of authorization from every authorizing user from whom authorization is required for that operation, providing secure multi-party authorization in a mobile computing environment.

    8.
    发明专利
    未知

    公开(公告)号:AT465448T

    公开(公告)日:2010-05-15

    申请号:AT01908057

    申请日:2001-03-09

    Applicant: IBM

    Abstract: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.

    Authorization of server operations

    公开(公告)号:AU2009294201B2

    公开(公告)日:2014-03-27

    申请号:AU2009294201

    申请日:2009-09-17

    Applicant: IBM

    Abstract: An authorization device (5) is provided for authorizing operations of a remote server (2) requested from user computers (3) via a data communications network (4). The device (5) has a computer interface (6) for connecting the device (5) to a local user computer (3) for communication with the remote server (2), and a user interface (7) for presenting information to a user. Control logic (11) of the device (5) is adapted to use security data to establish between the device (5) and server (2), via the local user computer (3), a mutually- authenticated connection for encrypted end-to-end communications between the device and server. The control logic (11) collects from the server (2) via this connection information indicative of any operations requested by user computers via other connections to the server (2) and requiring authorization by a user of the device (5). This information is presented to a user via the user interface (7) to prompt for authorization by the user. Server operations are controlled in accordance with rule data (18) defining operations requiring authorization by one or more authorizing users. Control logic (15) of the server control apparatus responds to an operation request from a user computer (3) by determining from the rule data (18) whether authorization by at least one authorizing user is required for that operation. If so, the operation is deferred. When a mutually-authenticated connection is established with an authorizing device (5), the control apparatus can supply information indicative of any deferred operations requested from user computers (3) and requiring authorization by the device user. A deferred operation is only performed on receipt of authorization from every authorizing user from whom authorization is required for that operation, providing secure multi-party authorization in a mobile computing environment.

    10.
    发明专利
    未知

    公开(公告)号:DE60141892D1

    公开(公告)日:2010-06-02

    申请号:DE60141892

    申请日:2001-03-09

    Applicant: IBM

    Abstract: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.

Patent Agency Ranking