Abstract:
A financial transaction system detects an identifier for a user requesting a transaction at an interface of the financial transaction system. The financial transaction system accesses from the electronic message service provider for the user using the identifier, at least one electronic message addressed to the user and sent to the user over a network for delivery to the user by the electronic message service provider at at least one system accessible via the network and logged into using the identifier. The accessed electronic message is delivered to the user at the interface for the financial transaction system.
Abstract:
A method, apparatus, and computer instructions for obtaining a logical unit. A request is sent for the logical unit. In the depicted examples, the request is sent to a multicast IP address. Responses to the request for the logical unit are received from a number of responders. A responder is identified from the set of responders to form a selected responder. The selected responder is identified based on at least one connection metric between the data processing system and the set of responders. The logical unit is retrieved from the selected responder.
Abstract:
A method, apparatus, and computer instructions for authorizing execution of an application on the data processing system. A request is received to execute the application, wherein the request originates from a remote data processing system and wherein the request includes a digital certificate and the application. The digital certificate is verified in response to receiving the request. Responsive to verifying the digital certificate, a digital digest is calculated for the application to form a calculated digital digest. The calculated digital digest is compared with a set of digital digests from a trusted source. The application is executed if a match between the calculated digital digest and set of digital digests occurs.
Abstract:
PROBLEM TO BE SOLVED: To provide an apparatus, system and method for canceling an already transmitted e-mail message. SOLUTION: After an e-mail message is prepared by a sender, the message can be stored in a computing system at the time of its transmission to recipients. Generally, the e-mail message contains a list of destination recipients. Then, a notification message, instead of an actual e-mail message, is generated and transmitted to the recipients (and to the sender). The notification message allows the recipients to automatically access the stored e-mail message. When the sender desires to cancel the message, the user can access the message and modify the list of recipients to exclude any number of recipients, as well as modify the text of the e-mail message. Any recipient whose e-mail address has been excluded will no longer be allowed to access the e-mail message. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
"extensão de segurança de rede de sistemas de arquivos distribuídos". um protocolo de segurança que dinamicamente implementa segurança de montagem aumentada de um sistema de arquivos, quando o acesso a arquivos sensíveis em uma rede de sistema de arquivos é solicitado. quando o usuário de um sistema cliente tenta acessar um arquivo sensível especificamente etiquetado, o servidor que hospeda o sistema de arquivos executa um código de software que termina a montagem corrente e reconfigura as portas do servidor para aceitar uma remontagem a partir do cliente através de uma porta mais segura. a porta do servidor reconfigurada é fornecido o endereço de ip do cliente e a correspondência do endereço de ip durante a operação de remontagem. a comutação para uma montagem segura é completada de uma maneira perfeitamente consistente de modo que os usuários autorizados são permitidos acessar arquivos sensíveis sem derrubar o servidor com as a criptografação custosa e outras características de segurança de intensivo recurso. nenhum retardo significante é experimentado pelo usuário, enquanto o arquivo sensível é protegido de captura não autorizada durante a transmissão do sistema cliente.
Abstract:
A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.
Abstract:
Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or "heartbeat," may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attack is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
Abstract:
Apparatus for eavesdropping within an area layer adjacent to and surrounding a LAN area periphery for potential wireless transmissions of an intruder having a lower frequency within a level below the LAN frequency; and an implementation responsive to said eavesdropping apparatus for changing the encryption code of said encrypted wireless transmission upon the eavesdropping detection of a wireless transmission of said lower frequency addressed to a network location of one of the terminals in said LAN.