-
公开(公告)号:AU2021235526A1
公开(公告)日:2022-08-25
申请号:AU2021235526
申请日:2021-02-10
Applicant: IBM
Inventor: BECK MICHAEL , SMOLNY MARTIN , DUERR THOMAS , OCHS GEORG , MCBREARTY GERALD , SOOHOO STEPHEN
IPC: H04L9/32
Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.
-
公开(公告)号:CA3166663A1
公开(公告)日:2021-09-16
申请号:CA3166663
申请日:2021-02-10
Applicant: IBM
Inventor: BECK MICHAEL , SMOLNY MARTIN , DUERR THOMAS , OCHS GEORG , MCBREARTY GERALD , SOOHOO STEPHEN
IPC: H04L9/32
Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.
-
公开(公告)号:AT302967T
公开(公告)日:2005-09-15
申请号:AT02720125
申请日:2002-03-25
Applicant: IBM
Inventor: LAFFEY PATRICK , MCBREARTY GERALD , MURILLO JESSICA , SHIEH JOHNNY , TRAN KIM , TRAN SCOTT
IPC: G06F3/0484 , G06F3/0481 , G06F3/033
Abstract: In an interactive display interface, an implementation for highlighting all icons in any set of a plurality of the icons, wherein each icon in the set is within a predetermined distance of an approaching pointer or cursor. In other words, the point of the pointer or cursor may be considered to be surrounded by a circular halo with a radius of said predetermined distance. The user moves the cursor in a standard manner. However, if the icons that the moving cursor is approaching are so densely spaced that more than one icon comes within the halo, then all of the icons within this set of the plurality of icons is highlighted to give the user a more distinct choice. The highlighting of each of the highlighted icons is ended when the pointer moves outside of the predetermined distance or halo radius.
-
公开(公告)号:AT488945T
公开(公告)日:2010-12-15
申请号:AT08736291
申请日:2008-04-16
Applicant: IBM
Inventor: KEOHANE SUSANN , MCBREARTY GERALD , MULLEN SHAWN , MURILLO JESSICA , SHIEH JOHNNY
Abstract: A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will elicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan.
-
5.
公开(公告)号:DE112018004415T5
公开(公告)日:2020-05-28
申请号:DE112018004415
申请日:2018-11-08
Applicant: IBM
Inventor: TENNER JEFFREY , MCBREARTY GERALD
IPC: G06F9/50
Abstract: Ein Verfahren zum Zuweisen von Cloud-Ressourcen in einem Cloud-Computing-System auf Grundlage einer Datenverschiebung in mehrstufigem Speicher enthält: ein Übertragen einer Anforderung zu einem mehrstufigen Speichersystem, eine Benachrichtigung über eine Datenverschiebung bereitzustellen, die durch ein mehrstufiges Speichersystem initiiert wurde, wobei die Datenverschiebung ein Verschieben von Daten, die dem Cloud-Computing-System zugehörig sind, aus einer ersten Speicherstufe in eine zweite Speicherstufe aufweist, und die Benachrichtigung eine Angabe einer Bedingung zum Initiieren der Datenverschiebung aufweist; ein Empfangen der Benachrichtigung von dem mehrstufigen Speichersystem; ein Identifizieren, unter Verwendung der empfangenen Benachrichtigung, einer gehosteten Datenverarbeitungsumgebung mit einem Volume, das der Datenverschiebung zugehörig ist; ein Bestimmen, ob eine Zuweisung von Ressourcen zu der gehosteten Datenverarbeitungsumgebung geändert werden soll; und ein Ändern der Zuweisung von Ressourcen zu der gehosteten Datenverarbeitungsumgebung in Reaktion auf das Bestimmen, die Zuweisung von Ressourcen zu der gehosteten Datenverarbeitungsumgebung zu ändern.
-
公开(公告)号:DE60205750T2
公开(公告)日:2006-06-08
申请号:DE60205750
申请日:2002-03-25
Applicant: IBM
Inventor: LAFFEY PATRICK , MCBREARTY GERALD , MURILLO JESSICA , SHIEH JOHNNY , TRAN KIM , TRAN SCOTT
IPC: G06F3/0484 , G06F3/0481
Abstract: In an interactive display interface, an implementation for highlighting all icons in any set of a plurality of the icons, wherein each icon in the set is within a predetermined distance of an approaching pointer or cursor. In other words, the point of the pointer or cursor may be considered to be surrounded by a circular halo with a radius of said predetermined distance. The user moves the cursor in a standard manner. However, if the icons that the moving cursor is approaching are so densely spaced that more than one icon comes within the halo, then all of the icons within this set of the plurality of icons is highlighted to give the user a more distinct choice. The highlighting of each of the highlighted icons is ended when the pointer moves outside of the predetermined distance or halo radius.
-
公开(公告)号:AU2021235526B2
公开(公告)日:2023-07-13
申请号:AU2021235526
申请日:2021-02-10
Applicant: IBM
Inventor: BECK MICHAEL , SMOLNY MARTIN , DUERR THOMAS , OCHS GEORG , MCBREARTY GERALD , SOOHOO STEPHEN
IPC: H04L9/32
Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.
-
公开(公告)号:DE112021000340T5
公开(公告)日:2022-10-20
申请号:DE112021000340
申请日:2021-02-10
Applicant: IBM
Inventor: BECK MICHAEL , SMOLNY MARTIN , DUERR THOMAS , OCHS GEORG , MCBREARTY GERALD , SOOHOO STEPHEN
IPC: H04L9/30
Abstract: Ein Verfahren, ein Computerprogrammprodukt und ein System zum Verteilen eines privaten Signaturschlüssels zwischen Autorisierungsinstanzen. Das Verfahren umfasst ein Registrieren einer Mehrzahl von Autorisierungsinstanzen in einer Konfigurationsdatei und ein Generieren von Host-Instanz-Schlüsselpaaren durch jede der Autorisierungsinstanzen. Das Verfahren umfasst auch ein Speichern der öffentlichen Host-Schlüssel in der gemeinsam genutzten Datenbank und ein Wählen von einer der Autorisierungsinstanzen als führende Signaturschlüssel-Instanz. Das Verfahren umfasst ein Generieren, durch die führende Signaturschlüssel-Instanz, eines Signaturschlüsselpaars. Das Signaturschlüsselpaar umfasst einen öffentlichen Signaturschlüssel und einen privaten Signaturschlüssel. Das Verfahren umfasst auch ein Speichern des öffentlichen Signaturschlüssels in der gemeinsam genutzten Datenbank und ein Übertragen eines verschlüsselten privaten Signaturschlüssels zu einer anfordernden Autorisierungsinstanz von den Autorisierungsinstanzen. Das Verfahren umfasst ferner ein Entschlüsseln des verschlüsselten privaten Signaturschlüssels durch Verwenden des privaten Host-Schlüssels, der durch die anfordernde Autorisierungsinstanz generiert wurde.
-
公开(公告)号:DE60205750D1
公开(公告)日:2005-09-29
申请号:DE60205750
申请日:2002-03-25
Applicant: IBM
Inventor: LAFFEY PATRICK , MCBREARTY GERALD , MURILLO JESSICA , SHIEH JOHNNY , TRAN KIM , TRAN SCOTT
IPC: G06F3/0484 , G06F3/0481 , G06F3/033
Abstract: In an interactive display interface, an implementation for highlighting all icons in any set of a plurality of the icons, wherein each icon in the set is within a predetermined distance of an approaching pointer or cursor. In other words, the point of the pointer or cursor may be considered to be surrounded by a circular halo with a radius of said predetermined distance. The user moves the cursor in a standard manner. However, if the icons that the moving cursor is approaching are so densely spaced that more than one icon comes within the halo, then all of the icons within this set of the plurality of icons is highlighted to give the user a more distinct choice. The highlighting of each of the highlighted icons is ended when the pointer moves outside of the predetermined distance or halo radius.
-
-
-
-
-
-
-
-