Abstract:
The invention is an improvement to a storage virtualization system that enables the system to determine a class of service for potential storage devices and allows a user, administrator, or application to select a minimum class of service for any given type of data. The class of service is based upon factors that reflect a potential storage device's reliability, such as the device type and historical uptime data. In a P2P environment, the class of service also includes additional factors, such as the type of attached processing unit and the type of operating system running the attached processing unit.
Abstract:
The present invention provides a system, method and computer program for implementing a firewall control system responsive to process interrogations are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a process rule exists for the associated program, where the process rule includes a condition to be satisfied for a process of the user computer system. Preferred embodiments may also include, in response to determining that a process rule does exist, determining a method for evaluating a status of the process and determining a current status of the process. Preferred embodiments may also include determining whether the process rule is satisfied based on the current status of the process and using the determined evaluation method. Preferred embodiments may also include, in response to determining whether the condition of the process rule is satisfied, performing one or more firewall actions.
Abstract:
PROBLEM TO BE SOLVED: To protect a detachable digital data storage device from unpermitted computer readable medium. SOLUTION: The digital data storage device has a programmable memory controller, a data storage medium and a data destruction means. A memory controller directly instructs the data destruction means to inquire a hardware code in response to a data operation request from a computer through an interface, to permit access in response to a hardware input, and to make data resident in the data storage medium unreadable in response to a failure in receiving a first hardware input through the interface independently from the operation situation of a request source computer. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other serversare disclosed. Embodiments of amethod for authenticating a user to a servermay include receiving a request to authenticate the user to the server and determining whether authenticating the user requires matching an authentication plan.If a plan is required, the method may also include accessing a stored authentication plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user s current authentication plan from an authentication store where the plan has authorization records each having current information relating to user access. Embodiments ofthe method may also include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response to a match, authenticating the user.
Abstract:
The present invention is a solution for detecting a spoofed command button in a pop-up window. The solution tracks the creation process of a pop-up window, detects the presence of command buttons in the pop-up window, verifies the value labeled on each command button in the pop-up window and determines a follow-up action generated from selecting a command button on the pop-up window.
Abstract:
The present invention is a solution for detecting a spoofed command butto n in a pop-up window. The solution tracks the creation process of a pop-up w indow, detects the presence of command buttons in the pop-up window, verifie s the value labeled on each command button in the pop-up window and determin es a follow-up action generated from selecting a command button on the pop-u p window.
Abstract:
The present invention provides a system and method for provisioning Cloud services by establishing a Cloud services catalog using a Cloud service bus within a Cloud computing environment. In one embodiment, there is a Cloud services catalog manager configured to connect a plurality of Clouds in a Cloud computing environment; maintain a catalog of integrated Cloud services from the plurality of connected Clouds; and display an index of the integrated services on a user interface. Using this system and method will allow for multiple disparate services, offered by different partners, across unrelated, physically distinct Clouds to be presented as an index of integrated services.
Abstract:
Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other serversare disclosed. Embodiments of amethod for authenticating a user to a servermay include rec eiving a request to authenticate the user to the server and determining whet her authenticating the user requires matching an authentication plan.If a pl an is required, the method may also include accessing a stored authenticatio n plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user s current authentication plan from an authenticat ion store where the plan has authorization records each having current infor mation relating to user access. Embodiments ofthe method may also include co mparing the stored authentication plan with the received current authenticat ion plan to determine whether they match and, in response to a match, authen ticating the user.
Abstract:
Embodiments of the present invention provide an approach for an enhanced pub/sub environment whereby a peer group of publishers is defined and can collaborate to determine when to cache data being sent to a common broker or brokers. Specifically, in a typical embodiment, configuration data or the like will be read to define a peer group among the publisher systems in the pub/sub messaging environment. Once such a group has been identified, communication therebetween will be established. Once cacheable data has been identified, a unique identifier/set of cache keys will be generated corresponding thereto and associated with the set of data. A message comprising the set of data and corresponding unique identifier will then be sent to a broker system (e.g., from the publisher system(s)), which will store (or have stored) the set of data in a cache, and pass the underlying message along to applicable subscriber system(s).