1.
    发明专利
    未知

    公开(公告)号:AT337667T

    公开(公告)日:2006-09-15

    申请号:AT00100477

    申请日:2000-01-11

    Applicant: IBM

    Abstract: A system and method for processing information contained in a smart card (130) uses a local computer (100) on which a proxy server (120) is installed. The local computer is connected to a data communication network (110), such as the Internet, and comprises a network browser which is used to generate access requests to data stored on a smart card and in a local storage (122). The requests are received by an HTTP server (210) and passed to request brokers (214, 215, 216). In response to a request parsing operation access functions (226, 228, 340, 440, 350, 460) are activated for accessing the local storage and a smart card (130). Data read from a smart card may be inserted into a HTML document accessed in the local storage, and data from the local storage or from remote sources may be uploaded to a smart card. Data modifier means (232, 234, 236) are provided to translate data read from the smart card into a data format corresponding to a user interface, and for translating data to be uploaded to said smart card into a predetermined smart card data format. The proxy server may be readily adapted to any smart card data format, and it may provide data security functions and data compression/decompression facilities.

    2.
    发明专利
    未知

    公开(公告)号:DE60100680D1

    公开(公告)日:2003-10-09

    申请号:DE60100680

    申请日:2001-04-24

    Applicant: IBM

    Abstract: The present invention relates to a client-server system having a security system for controlling access to application functions. The security system separated from the clients and the application functions routes all incoming requests created by various PVC-devices to a centralized security system providing an authentication component and a security component. The authentication component provides several authentication mechanisms which may be selected by information contained in the client's request. The authentication mechanism may be changed or extended without changing conditions on the client as well on the server or application side. The security component provides a security policy describing security requirements for accessing application functions which may be invoked by the security component. If the selected authentication mechanism succeeds and fulfills the security policy associated to that application function then the application function will be invoked by the security component.

    SCHÜTZEN VON ARBEITSLASTEN IN KUBERNETES

    公开(公告)号:DE112020004699T5

    公开(公告)日:2022-06-23

    申请号:DE112020004699

    申请日:2020-09-04

    Applicant: IBM

    Abstract: Aspekte der Erfindung weisen ein Erhalten eines originalen Docker-Abbildes von einem Kunden, Verschlüsseln eines Speicherplattenabbildes unter Verwendung von Inhalten aus dem originalen Docker-Abbild und sicheres Verschlüsseln eines Startladeprogramms durch einen Prozessor auf. Aus dem verschlüsselten Festplattenabbild und dem sicheren verschlüsselten Startladeprogramm wird ein neu gepacktes Abbild erstellt. Das neu gepackte Abbild wird bereitgestellt, indem das neu gepackte Abbild in einen Pod-Container eingefügt wird und ein gesicherter Kubernetes-Pod zum Schutz von Arbeitslasten erzeugt wird, wobei der gesicherte Kubernetes-Pod mindestens eine virtuelle Maschine besitzt, die den Pod-Container enthält.

    6.
    发明专利
    未知

    公开(公告)号:DE60030181T2

    公开(公告)日:2007-10-18

    申请号:DE60030181

    申请日:2000-01-11

    Applicant: IBM

    Abstract: A system and method for processing information contained in a smart card (130) uses a local computer (100) on which a proxy server (120) is installed. The local computer is connected to a data communication network (110), such as the Internet, and comprises a network browser which is used to generate access requests to data stored on a smart card and in a local storage (122). The requests are received by an HTTP server (210) and passed to request brokers (214, 215, 216). In response to a request parsing operation access functions (226, 228, 340, 440, 350, 460) are activated for accessing the local storage and a smart card (130). Data read from a smart card may be inserted into a HTML document accessed in the local storage, and data from the local storage or from remote sources may be uploaded to a smart card. Data modifier means (232, 234, 236) are provided to translate data read from the smart card into a data format corresponding to a user interface, and for translating data to be uploaded to said smart card into a predetermined smart card data format. The proxy server may be readily adapted to any smart card data format, and it may provide data security functions and data compression/decompression facilities.

    7.
    发明专利
    未知

    公开(公告)号:DE60030181D1

    公开(公告)日:2006-10-05

    申请号:DE60030181

    申请日:2000-01-11

    Applicant: IBM

    Abstract: A system and method for processing information contained in a smart card (130) uses a local computer (100) on which a proxy server (120) is installed. The local computer is connected to a data communication network (110), such as the Internet, and comprises a network browser which is used to generate access requests to data stored on a smart card and in a local storage (122). The requests are received by an HTTP server (210) and passed to request brokers (214, 215, 216). In response to a request parsing operation access functions (226, 228, 340, 440, 350, 460) are activated for accessing the local storage and a smart card (130). Data read from a smart card may be inserted into a HTML document accessed in the local storage, and data from the local storage or from remote sources may be uploaded to a smart card. Data modifier means (232, 234, 236) are provided to translate data read from the smart card into a data format corresponding to a user interface, and for translating data to be uploaded to said smart card into a predetermined smart card data format. The proxy server may be readily adapted to any smart card data format, and it may provide data security functions and data compression/decompression facilities.

    8.
    发明专利
    未知

    公开(公告)号:DE60100680T2

    公开(公告)日:2004-07-22

    申请号:DE60100680

    申请日:2001-04-24

    Applicant: IBM

    Abstract: The present invention relates to a client-server system having a security system for controlling access to application functions. The security system separated from the clients and the application functions routes all incoming requests created by various PVC-devices to a centralized security system providing an authentication component and a security component. The authentication component provides several authentication mechanisms which may be selected by information contained in the client's request. The authentication mechanism may be changed or extended without changing conditions on the client as well on the server or application side. The security component provides a security policy describing security requirements for accessing application functions which may be invoked by the security component. If the selected authentication mechanism succeeds and fulfills the security policy associated to that application function then the application function will be invoked by the security component.

    9.
    发明专利
    未知

    公开(公告)号:AT249122T

    公开(公告)日:2003-09-15

    申请号:AT01109912

    申请日:2001-04-24

    Applicant: IBM

    Abstract: The present invention relates to a client-server system having a security system for controlling access to application functions. The security system separated from the clients and the application functions routes all incoming requests created by various PVC-devices to a centralized security system providing an authentication component and a security component. The authentication component provides several authentication mechanisms which may be selected by information contained in the client's request. The authentication mechanism may be changed or extended without changing conditions on the client as well on the server or application side. The security component provides a security policy describing security requirements for accessing application functions which may be invoked by the security component. If the selected authentication mechanism succeeds and fulfills the security policy associated to that application function then the application function will be invoked by the security component.

Patent Agency Ranking