SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING
    1.
    发明公开
    SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING 审中-公开
    系统和方法进行软件操控主动检测

    公开(公告)号:EP1573545A4

    公开(公告)日:2008-08-27

    申请号:EP03774922

    申请日:2003-10-22

    Applicant: IBM

    CPC classification number: G06F21/14 G06F21/316 G06F21/552 G06F2221/2101

    Abstract: Software intrusion is proactively detected using a dynamically evolving audit log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on both the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these values. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).

    STREAMING OF SECURE IP BASE
    2.
    发明专利

    公开(公告)号:JP2004007476A

    公开(公告)日:2004-01-08

    申请号:JP2003071645

    申请日:2003-03-17

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide a system, a method and a computer readable medium for securely realizing the streaming of an IP(Internet Protcol) base by a method independent of a format. SOLUTION: Metadata are read out from an encoded medium file 402. Then the encoded medium file 402 including the metadta subsidiary to contents data is ciphered. A steaming server system divides the encoded/ciphered medium file into a plurality of data packets and performs streaming in accordance with at least one parameter in the metadata. Then the streaming server system streams the data packets to a client information processing system (i.e. a client) through a network. COPYRIGHT: (C)2004,JPO

    SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING

    公开(公告)号:CA2505477A1

    公开(公告)日:2004-07-22

    申请号:CA2505477

    申请日:2003-10-22

    Applicant: IBM

    Abstract: Software intrusion is proactively detected using a dynamically evolving audi t log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on bo th the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these value s. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).

    6.
    发明专利
    未知

    公开(公告)号:DE60315726T2

    公开(公告)日:2008-06-05

    申请号:DE60315726

    申请日:2003-12-19

    Applicant: IBM

    Abstract: A system, method, business method, and computer program product for conducting electronic transactions with a potentially untrusted server while maintaining user anonymity and transaction privacy, yet allowing the server to verify the user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage-based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.

    7.
    发明专利
    未知

    公开(公告)号:AT340379T

    公开(公告)日:2006-10-15

    申请号:AT00305655

    申请日:2000-07-05

    Applicant: IBM

    Abstract: A method to delivery encrypted digital content to a end user system for playing the content comprising the steps of: reading from a computer readable medium metadata which has previously associated with the content. A user selects from the metadata associated content to decrypt and the end user system establishes a secure connection with an authorisation authority for decrypt ing the content. The end user system receives a secure container containing the decrypting key for decrypting at least part of the previously encrypted content as permitted. The system creates a secure container using the encrypting key from a clearing house, wherein the secure container has an encrypting key therein from the end user system; transferring the secure container to the clearing house for authentication of permission to decrypt the content. The system receives from the clearing house, a secure container encrypted using the encrypting key of the end user system containing the decrypting key for decrypting at least part of the previously encrypted content stored on the computer readable medium as permitted; and playing at least part of the previously encrypted content by decrypting the secure container using the encrypting key of the end user system to access the decrypting key for decrypting at least part of the encrypted content.

    8.
    发明专利
    未知

    公开(公告)号:DE60030814D1

    公开(公告)日:2006-11-02

    申请号:DE60030814

    申请日:2000-07-05

    Applicant: IBM

    Abstract: A method to delivery encrypted digital content to a end user system for playing the content comprising the steps of: reading from a computer readable medium metadata which has previously associated with the content. A user selects from the metadata associated content to decrypt and the end user system establishes a secure connection with an authorisation authority for decrypt ing the content. The end user system receives a secure container containing the decrypting key for decrypting at least part of the previously encrypted content as permitted. The system creates a secure container using the encrypting key from a clearing house, wherein the secure container has an encrypting key therein from the end user system; transferring the secure container to the clearing house for authentication of permission to decrypt the content. The system receives from the clearing house, a secure container encrypted using the encrypting key of the end user system containing the decrypting key for decrypting at least part of the previously encrypted content stored on the computer readable medium as permitted; and playing at least part of the previously encrypted content by decrypting the secure container using the encrypting key of the end user system to access the decrypting key for decrypting at least part of the encrypted content.

    ALGORITHM FOR THE SEGMENTATION OF PRINTED FIXED PITCH DOCUMENTS

    公开(公告)号:CA1165448A

    公开(公告)日:1984-04-10

    申请号:CA378672

    申请日:1981-05-29

    Applicant: IBM

    Abstract: BO979038 An apparatus and method is provided for segmenting characters generated by an optical scanner. The apparatus also identifies underscores. The underscores are then masked and subsequent processing devices are informed of the existence of said underscores. Input video raster scans representative of a portion of a line of textual material are loaded into a video buffer. The video raster scans are broken up into a plurality of sections. The horizontal histogram (number of black pixel counts) associated with each section is determined. The baseline, vertical histogram and word location for each line of data to be segmented is determined. A find character unit finds the boundaries for each character. The character is sequentially transferred from the video buffer to a character output buffer.

    A SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING

    公开(公告)号:CA2505477C

    公开(公告)日:2009-10-13

    申请号:CA2505477

    申请日:2003-10-22

    Applicant: IBM

    Abstract: Software intrusion is proactively detected using a dynamically evolving audi t log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on bo th the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these value s. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).

Patent Agency Ranking