METHOD AND DEVICE FOR GENERATING OBJECT IN NONSUSTAINING MEMORY AND METHOD FOR MAINTAINING POSSIBILITY OF ACCESS TO OBJECT

    公开(公告)号:JP2000056982A

    公开(公告)日:2000-02-25

    申请号:JP12081299

    申请日:1999-04-28

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To improve the flexibility of selecting an object type by obtaining a simple programming model for allocation to both a temporary object and a sustaining object and supporting the holding of the temporary object without using a sustaining memory. SOLUTION: In order to generate an object in the nonsustaining memory, a 1st instruction code 31 which executes a 1st function 41 is read out of an instruction code sequence 18 and a 2nd instruction code 32 which generates objects 56, 57, and 58 in the memory is read out. The 1st function 41 selects the discontinuous memory 51 as a memory. The 1st function 41 includes a bracket open type function. At least some of the objects 56, 57, and 58 in the nonsustaining memory are linked in the form of a chain starting at the 1st object 56 in the object 56, 57 and 58.

    DEVICE AND METHOD WITH REDUCED INFORMATION LEAKAGE
    3.
    发明申请
    DEVICE AND METHOD WITH REDUCED INFORMATION LEAKAGE 审中-公开
    具有减少信息泄漏的装置和方法

    公开(公告)号:WO03042799A2

    公开(公告)日:2003-05-22

    申请号:PCT/IB0204620

    申请日:2002-11-05

    CPC classification number: H04L63/04 G06F21/76 H04L9/003 H04L9/0625 H04L2209/12

    Abstract: The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information.

    Abstract translation: 本发明涉及一种数据处理系统,包括处理器和第一持久存储器中的第一加密信息,其信息泄漏级别高于第二持久存储器。 在第二持久存储器中存储用于解密第一加密信息的第一密码密钥,由此产生处理器可用于执行操作的第一未加密信息。 相同的加密密钥也可以用于加密第一未加密信息,从而生成第一加密信息。 还涉及一种使用操作系统处理这种数据处理系统的方法,包括用于将第一未加密信息写入第一持久存储器的写入步骤,用于在使用第一密码的情况下加密第一未加密信息的加密步骤 密钥,从第一永久存储器中创建第一加密信息,以及访问限制步骤,用于将数据处理系统设置为由操作系统控制对第一永久存储器的写入的状态。 它还涉及对这种数据处理系统执行操作的方法,包括解密步骤,用于在使用第一加密密钥的情况下对第一加密信息进行解密,由此产生第一未加密信息,以及执行步骤,用于执行操作, 处理器,使用第一个未加密的信息。

    SECURE ONLINE BANKING TRANSACTIONS
    4.
    发明申请
    SECURE ONLINE BANKING TRANSACTIONS 审中-公开
    安全的在线银行交易

    公开(公告)号:WO2009122360A2

    公开(公告)日:2009-10-08

    申请号:PCT/IB2009051357

    申请日:2009-03-31

    Abstract: A secure online banking transaction apparatus to communicate with a server over a non-secure connection is provided and includes a selector configured to allow for a selection of a mode of the apparatus, a processing unit coupled to the selector and including a secure communication unit, which is configured to set up a secure connection, along which a secure transaction occurs, with the server via the non-secure connection in accordance with the mode, an input unit coupled to the processing unit and configured to allow for a input of data into the apparatus, which is at least partly related to the secure transaction, and an interface coupled to the processing unit and configured to convey at least a status of the secure transaction and the contents of the inputted data.

    Abstract translation: 提供了一种用于通过非安全连接与服务器进行通信的安全的网上银行交易装置,并且包括被配置为允许选择所述装置的模式的选择器,耦合到所述选择器并包括安全通信单元的处理单元, 其被配置为根据该模式经由非安全连接与服务器建立安全事务发生的安全连接,输入单元耦合到处理单元并被配置为允许数据输入 所述装置至少部分地与所述安全交易相关,以及耦合到所述处理单元并被配置为至少传送所述安全交易的状态和输入的数据的内容的接口。

    SYSTEM AND METHOD FOR RECOVERY OF MEMORY TRANSACTIONS
    5.
    发明申请
    SYSTEM AND METHOD FOR RECOVERY OF MEMORY TRANSACTIONS 审中-公开
    用于恢复存储器交易的系统和方法

    公开(公告)号:WO2008078207A3

    公开(公告)日:2008-11-20

    申请号:PCT/IB2007054446

    申请日:2007-11-02

    CPC classification number: G06F11/1441 G06F11/141

    Abstract: The invention relates to a method for transactional writing of data into a persistent memory comprising memory cells, the method comprising a transactional writing step and a transaction recovery step, - the transactional writing step comprising one or more memory cell writing steps, the memory cell writing steps comprising the sub-steps of - writing in a transaction buffer as transaction buffer entry the current data value and the corresponding address of the respective memory cell, - writing a first valid marker for the memory cell in the transaction buffer, - writing a new data value to the memory cell; - the transaction recovery step being performed in case of an abortion of the transactional writing step and being provided for restoring the current data values of the aborted transaction in the persistent memory, the transaction recovery step comprising the sub- step of : - writing a transaction recovery marker to the transaction buffer indicating the start of the transaction recovery.

    Abstract translation: 本发明涉及一种用于将数据事务写入包括存储器单元的持久存储器的方法,所述方法包括事务写入步骤和事务恢复步骤,所述事务写入步骤包括一个或多个存储器单元写入步骤,所述存储单元写入 包括以下子步骤的步骤:在事务缓冲器中写入事务缓冲器条目当前数据值和相应存储器单元的对应地址, - 为事务缓冲器中的存储器单元写入第一有效标记, - 写入新的 数据值到存储单元; - 所述交易恢复步骤在所述事务写入步骤的堕胎的情况下被执行并且被提供用于恢复所述持久性存储器中的被中止的事务的当前数据值,所述事务恢复步骤包括以下子步骤: - 写入事务 恢复标记到事务缓冲区,指示事务恢复的开始。

    AUTHORIZATION OF SERVER OPERATIONS

    公开(公告)号:CA2736582C

    公开(公告)日:2018-07-24

    申请号:CA2736582

    申请日:2009-09-17

    Applicant: IBM

    Abstract: An authorization device (5) is provided for authorizing operations of a remote server (2) requested from user computers (3) via a data communications network (4). The device (5) has a computer interface (6) for connecting the device (5) to a local user computer (3) for communication with the remote server (2), and a user interface (7) for presenting information to a user. Control logic (11) of the device (5) is adapted to use security data to establish between the device (5) and server (2), via the local user computer (3), a mutually- authenticated connection for encrypted end-to-end communications between the device and server. The control logic (11) collects from the server (2) via this connection information indicative of any operations requested by user computers via other connections to the server (2) and requiring authorization by a user of the device (5). This information is presented to a user via the user interface (7) to prompt for authorization by the user. Server operations are controlled in accordance with rule data (18) defining operations requiring authorization by one or more authorizing users. Control logic (15) of the server control apparatus responds to an operation request from a user computer (3) by determining from the rule data (18) whether authorization by at least one authorizing user is required for that operation. If so, the operation is deferred. When a mutually-authenticated connection is established with an authorizing device (5), the control apparatus can supply information indicative of any deferred operations requested from user computers (3) and requiring authorization by the device user. A deferred operation is only performed on receipt of authorization from every authorizing user from whom authorization is required for that operation, providing secure multi-party authorization in a mobile computing environment.

    7.
    发明专利
    未知

    公开(公告)号:AT465448T

    公开(公告)日:2010-05-15

    申请号:AT01908057

    申请日:2001-03-09

    Applicant: IBM

    Abstract: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.

    Authorization of server operations

    公开(公告)号:AU2009294201B2

    公开(公告)日:2014-03-27

    申请号:AU2009294201

    申请日:2009-09-17

    Applicant: IBM

    Abstract: An authorization device (5) is provided for authorizing operations of a remote server (2) requested from user computers (3) via a data communications network (4). The device (5) has a computer interface (6) for connecting the device (5) to a local user computer (3) for communication with the remote server (2), and a user interface (7) for presenting information to a user. Control logic (11) of the device (5) is adapted to use security data to establish between the device (5) and server (2), via the local user computer (3), a mutually- authenticated connection for encrypted end-to-end communications between the device and server. The control logic (11) collects from the server (2) via this connection information indicative of any operations requested by user computers via other connections to the server (2) and requiring authorization by a user of the device (5). This information is presented to a user via the user interface (7) to prompt for authorization by the user. Server operations are controlled in accordance with rule data (18) defining operations requiring authorization by one or more authorizing users. Control logic (15) of the server control apparatus responds to an operation request from a user computer (3) by determining from the rule data (18) whether authorization by at least one authorizing user is required for that operation. If so, the operation is deferred. When a mutually-authenticated connection is established with an authorizing device (5), the control apparatus can supply information indicative of any deferred operations requested from user computers (3) and requiring authorization by the device user. A deferred operation is only performed on receipt of authorization from every authorizing user from whom authorization is required for that operation, providing secure multi-party authorization in a mobile computing environment.

    9.
    发明专利
    未知

    公开(公告)号:DE60141892D1

    公开(公告)日:2010-06-02

    申请号:DE60141892

    申请日:2001-03-09

    Applicant: IBM

    Abstract: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.

    10.
    发明专利
    未知

    公开(公告)号:DE60307498D1

    公开(公告)日:2006-09-21

    申请号:DE60307498

    申请日:2003-10-24

    Applicant: IBM

    Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key a an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.

Patent Agency Ranking