Method and apparatus for managing server process, and computer program (method or apparatus for managing server process in computer system)
    2.
    发明专利
    Method and apparatus for managing server process, and computer program (method or apparatus for managing server process in computer system) 审中-公开
    用于管理服务器过程的方法和装置和计算机程序(用于管理计算机系统中的服务器进程的方法或装置)

    公开(公告)号:JP2007058862A

    公开(公告)日:2007-03-08

    申请号:JP2006226045

    申请日:2006-08-23

    Abstract: PROBLEM TO BE SOLVED: To provide a computer system having a security means for reducing vulnerability against attacks to a computer system and preventing itself from becoming a risky computer attractive to a hacker. SOLUTION: The controller 211 of a server computer 113 manages access to VM to ensure that at any given time, only one VM is active and a new client request is received. The active VM is referred to as a primary machine 203 and is only active for the switch-over period. Once this period has elapsed, the controller designates the current primary machine as a secondary machine and starts a new primary machine from the copy of software inside a master file system 213. Then, the controller routes a subsequent client request to the new primary machine. COPYRIGHT: (C)2007,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种具有用于降低对计算机系统的攻击的脆弱性的安全手段的计算机系统,并防止其成为对黑客有吸引力的危险的计算机。 解决方案:服务器计算机113的控制器211管理对VM的访问,以确保在任何给定时间只有一个VM是活动的并且接收到新的客户端请求。 活动虚拟机被称为主机203,并且仅对于切换时段有效。 一旦该时间过去,控制器将当前的主机器指定为辅助机器,并从主文件系统213内的软件的副本启动新的主机。然后,控制器将后续的客户机请求路由到新的主机。 版权所有(C)2007,JPO&INPIT

    INTEGRITY VERIFICATION USING A PERIPHERAL DEVICE
    3.
    发明申请
    INTEGRITY VERIFICATION USING A PERIPHERAL DEVICE 审中-公开
    使用外设进行完整性验证

    公开(公告)号:WO2010103466A3

    公开(公告)日:2010-11-04

    申请号:PCT/IB2010051027

    申请日:2010-03-10

    CPC classification number: G06F21/57

    Abstract: A peripheral device includes an interface configured to communicate with a computer, the peripheral device; logic configured to perform an integrity verification of an operating system of the computer; and a display configured to display a result of the integrity verification. A method for integrity verification of a computer using a peripheral device includes connecting the peripheral device to the computer; sending a challenge from the device to the computer; computing attestation data using the challenge and information stored in the computer, retrieving the attestation data from the computer by a client program running on the computer; sending the attestation data to the peripheral device; and verifying the attestation data by the peripheral device.

    Abstract translation: 外围设备包括被配置为与计算机通信的接口,外围设备; 经配置以执行所述计算机的操作系统的完整性验证的逻辑; 以及被配置为显示完整性验证的结果的显示器。 一种使用外围设备对计算机进行完整性验证的方法,包括:将外围设备连接到计算机; 从设备向计算机发送挑战; 使用存储在计算机中的询问和信息来计算证明数据,通过在计算机上运行的客户端程序从计算机检索证明数据; 将证明数据发送到外围设备; 并通过外围设备验证证明数据。

    METHOD AND SYSTEM FOR DISTINGUISHING NETWORK THREATS FROM FALSE POSITIVES
    4.
    发明申请
    METHOD AND SYSTEM FOR DISTINGUISHING NETWORK THREATS FROM FALSE POSITIVES 审中-公开
    从虚假的角度来评估网络威胁的方法和系统

    公开(公告)号:WO2005101720A3

    公开(公告)日:2006-12-21

    申请号:PCT/US2005010358

    申请日:2005-03-29

    Applicant: IBM

    CPC classification number: H04L63/1425 G06F21/552

    Abstract: An apparatus, a method, and a computer program are provided for distinguishing relevant security threats. With conventional computer systems, distinguishing security threats from actual security threats is a complex and difficult task because of the general inability to quantify a "threat". By the use of an intelligent conceptual clustering technique, threats can be accurately distinguished from benign behaviors. Thus, electronic commerce, and Information Technology systems generally, can be made safer without sacrificing efficiency.

    Abstract translation: 提供了一种用于区分相关安全威胁的装置,方法和计算机程序。 使用传统的计算机系统,将安全威胁与实际的安全威胁区分开来,是一个复杂而艰巨的任务,因为一般无法量化“威胁”。 通过使用智能概念聚类技术,可以将威胁与良性行为准确区分开来。 因此,通常电子商务和信息技术系统可以更安全,而不牺牲效率。

    NETWORK ATTACK SIGNATURE GENERATION

    公开(公告)号:AU2003280190A1

    公开(公告)日:2005-01-21

    申请号:AU2003280190

    申请日:2003-11-24

    Applicant: IBM

    Abstract: Described is a technique for detecting attacks on a data communications network having a plurality of addresses for assignment to data processing systems in the network. The technique involves identifying data traffic on the network originating at any assigned address and addressed to any unassigned address. Any data traffic so identified is inspected for data indicative of an attack. On detection of data indicative of an attack, an alert signal is generated.

    6.
    发明专利
    未知

    公开(公告)号:AT470301T

    公开(公告)日:2010-06-15

    申请号:AT05730339

    申请日:2005-03-29

    Applicant: IBM

    Abstract: An apparatus, a method, and a computer program are provided for distinguishing relevant security threats. With conventional computer systems, distinguishing security threats from actual security threats is a complex and difficult task because of the general inability to quantify a "threat." By the use of an intelligent conceptual clustering technique, threats can be accurately distinguished from benign behaviors. Thus, electronic commerce, and Information Technology systems generally, can be made safer without sacrificing efficiency.

    Automated network deployment of cloud services into a network by matching security requirements

    公开(公告)号:GB2504487A

    公开(公告)日:2014-02-05

    申请号:GB201213507

    申请日:2012-07-30

    Applicant: IBM

    Abstract: Disclosed is a method of automated network deployment of cloud services CS into a network 10. The method starts by receiving a cloud service with a specific resource protection template RPT, specifying an isolation policy for isolating zones in the network. Next the customer protection parameters CPP specifying customer needs regarding protection in the network or received. The next step, is providing security requirements SR matching the received resource protection templates and the received customer protection parameters. Then the cloud service is automatically deployed into the network by using the provided security requirements. The isolation policy may specify a set of zones using IP addresses allocated to resources. The automatically deploying the cloud service may include instancing a virtualised routing application configured using the provided security requirements.

Patent Agency Ranking