Abstract:
A financial transaction system detects an identifier for a user requesting a transaction at an interface of the financial transaction system. The financial transaction system accesses from the electronic message service provider for the user using the identifier, at least one electronic message addressed to the user and sent to the user over a network for delivery to the user by the electronic message service provider at at least one system accessible via the network and logged into using the identifier. The accessed electronic message is delivered to the user at the interface for the financial transaction system.
Abstract:
A method, apparatus, and computer instructions for obtaining a logical unit. A request is sent for the logical unit. In the depicted examples, the request is sent to a multicast IP address. Responses to the request for the logical unit are received from a number of responders. A responder is identified from the set of responders to form a selected responder. The selected responder is identified based on at least one connection metric between the data processing system and the set of responders. The logical unit is retrieved from the selected responder.
Abstract:
A method, apparatus, and computer instructions for authorizing execution of an application on the data processing system. A request is received to execute the application, wherein the request originates from a remote data processing system and wherein the request includes a digital certificate and the application. The digital certificate is verified in response to receiving the request. Responsive to verifying the digital certificate, a digital digest is calculated for the application to form a calculated digital digest. The calculated digital digest is compared with a set of digital digests from a trusted source. The application is executed if a match between the calculated digital digest and set of digital digests occurs.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a system, and a program for dynamically mapping a chat session invitation history. SOLUTION: A chat controller facilitating a chat session allows a chat participant to invite an additional user to join the chat session. The chat controller dynamically generates mapping of chat participants for graphically showing respective correspondences between respective invited additional users and respective chat participants inviting them. The mapping is displayed on a user interface of the current participant of the invited additional user. The displayed mapping is dynamically updated to reflect an additional invitation history when the chat session is continued. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an apparatus, system and method for canceling an already transmitted e-mail message. SOLUTION: After an e-mail message is prepared by a sender, the message can be stored in a computing system at the time of its transmission to recipients. Generally, the e-mail message contains a list of destination recipients. Then, a notification message, instead of an actual e-mail message, is generated and transmitted to the recipients (and to the sender). The notification message allows the recipients to automatically access the stored e-mail message. When the sender desires to cancel the message, the user can access the message and modify the list of recipients to exclude any number of recipients, as well as modify the text of the e-mail message. Any recipient whose e-mail address has been excluded will no longer be allowed to access the e-mail message. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method and device for obtaining status information about an active process in a grid and to provide a computer instruction. SOLUTION: A job identifier is received from a remote node in response to the submission of a job to the remote node on the grid from a data processing system. The job identifier is stored in a set of job identifiers. The set of job identifiers is used to form a set of job status request in response to a request of obtaining the status of the job submitted from the data processing system, and a job status request is submitted for each job identifier in one job identifier about the active process. A response to one set of job status requests is received, and the response is then presented. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
"extensão de segurança de rede de sistemas de arquivos distribuídos". um protocolo de segurança que dinamicamente implementa segurança de montagem aumentada de um sistema de arquivos, quando o acesso a arquivos sensíveis em uma rede de sistema de arquivos é solicitado. quando o usuário de um sistema cliente tenta acessar um arquivo sensível especificamente etiquetado, o servidor que hospeda o sistema de arquivos executa um código de software que termina a montagem corrente e reconfigura as portas do servidor para aceitar uma remontagem a partir do cliente através de uma porta mais segura. a porta do servidor reconfigurada é fornecido o endereço de ip do cliente e a correspondência do endereço de ip durante a operação de remontagem. a comutação para uma montagem segura é completada de uma maneira perfeitamente consistente de modo que os usuários autorizados são permitidos acessar arquivos sensíveis sem derrubar o servidor com as a criptografação custosa e outras características de segurança de intensivo recurso. nenhum retardo significante é experimentado pelo usuário, enquanto o arquivo sensível é protegido de captura não autorizada durante a transmissão do sistema cliente.
Abstract:
A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.
Abstract:
Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or "heartbeat," may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attack is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.