METHOD AND APPARATUS FOR AUTHORIZING EXECUTION FOR APPLICATIONS IN A DATA PROCESSING SYSTEM
    4.
    发明申请
    METHOD AND APPARATUS FOR AUTHORIZING EXECUTION FOR APPLICATIONS IN A DATA PROCESSING SYSTEM 审中-公开
    在数据处理系统中授权执行应用程序的方法和设备

    公开(公告)号:WO2004079483A3

    公开(公告)日:2004-12-09

    申请号:PCT/GB2004000926

    申请日:2004-03-04

    CPC classification number: G06F21/51 G06F21/33

    Abstract: A method, apparatus, and computer instructions for authorizing execution of an application on the data processing system. A request is received to execute the application, wherein the request originates from a remote data processing system and wherein the request includes a digital certificate and the application. The digital certificate is verified in response to receiving the request. Responsive to verifying the digital certificate, a digital digest is calculated for the application to form a calculated digital digest. The calculated digital digest is compared with a set of digital digests from a trusted source. The application is executed if a match between the calculated digital digest and set of digital digests occurs.

    Abstract translation: 一种用于授权在数据处理系统上执行应用程序的方法,装置和计算机指令。 接收到执行应用程序的请求,其中该请求源自远程数据处理系统,并且其中该请求包括数字证书和应用程序。 数字证书在接收到请求后进行验证。 响应于验证数字证书,为应用计算数字摘要以形成计算的数字摘要。 将计算出的数字摘要与来自可信来源的一组数字摘要进行比较。 如果计算出的数字摘要和一组数字摘要发生匹配,则执行该应用程序。

    System, apparatus and method for canceling e-mail message already transmitted
    5.
    发明专利
    System, apparatus and method for canceling e-mail message already transmitted 有权
    系统,装置和取消已发送电子邮件消息的方法

    公开(公告)号:JP2005092887A

    公开(公告)日:2005-04-07

    申请号:JP2004270758

    申请日:2004-09-17

    CPC classification number: H04L51/24 H04L63/0442

    Abstract: PROBLEM TO BE SOLVED: To provide an apparatus, system and method for canceling an already transmitted e-mail message.
    SOLUTION: After an e-mail message is prepared by a sender, the message can be stored in a computing system at the time of its transmission to recipients. Generally, the e-mail message contains a list of destination recipients. Then, a notification message, instead of an actual e-mail message, is generated and transmitted to the recipients (and to the sender). The notification message allows the recipients to automatically access the stored e-mail message. When the sender desires to cancel the message, the user can access the message and modify the list of recipients to exclude any number of recipients, as well as modify the text of the e-mail message. Any recipient whose e-mail address has been excluded will no longer be allowed to access the e-mail message.
    COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:提供用于取消已经发送的电子邮件消息的装置,系统和方法。

    解决方案:发件人准备电子邮件后,消息可以在发送给收件人时存储在计算系统中。 通常,电子邮件包含目标收件人列表。 然后,生成通知消息,而不是实际的电子邮件消息,并发送给收件人(和发送方)。 通知消息允许收件人自动访问存储的电子邮件。 当发送者希望取消消息时,用户可以访问该消息并修改收件人列表以排除任何数量的收件人,以及修改电子邮件的文本。 电子邮件地址被排除的任何收件人将不再被允许访问电子邮件。 版权所有(C)2005,JPO&NCIPI

    extensão de segurança de rede de sistemas de arquivos distribuídos

    公开(公告)号:BRPI0410569B1

    公开(公告)日:2016-08-23

    申请号:BRPI0410569

    申请日:2004-04-15

    Applicant: IBM

    Abstract: "extensão de segurança de rede de sistemas de arquivos distribuídos". um protocolo de segurança que dinamicamente implementa segurança de montagem aumentada de um sistema de arquivos, quando o acesso a arquivos sensíveis em uma rede de sistema de arquivos é solicitado. quando o usuário de um sistema cliente tenta acessar um arquivo sensível especificamente etiquetado, o servidor que hospeda o sistema de arquivos executa um código de software que termina a montagem corrente e reconfigura as portas do servidor para aceitar uma remontagem a partir do cliente através de uma porta mais segura. a porta do servidor reconfigurada é fornecido o endereço de ip do cliente e a correspondência do endereço de ip durante a operação de remontagem. a comutação para uma montagem segura é completada de uma maneira perfeitamente consistente de modo que os usuários autorizados são permitidos acessar arquivos sensíveis sem derrubar o servidor com as a criptografação custosa e outras características de segurança de intensivo recurso. nenhum retardo significante é experimentado pelo usuário, enquanto o arquivo sensível é protegido de captura não autorizada durante a transmissão do sistema cliente.

    ROUTER DETECTION
    7.
    发明专利

    公开(公告)号:CA2698317A1

    公开(公告)日:2009-04-09

    申请号:CA2698317

    申请日:2008-09-22

    Applicant: IBM

    Abstract: A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.

    LOGICAL PARTITION MEDIA ACCESS CONTROL IMPOSTOR DETECTOR

    公开(公告)号:CA2783394A1

    公开(公告)日:2011-06-30

    申请号:CA2783394

    申请日:2010-12-08

    Applicant: IBM

    Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or "heartbeat," may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attack is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.

    10.
    发明专利
    未知

    公开(公告)号:DE60208810D1

    公开(公告)日:2006-04-06

    申请号:DE60208810

    申请日:2002-10-28

    Applicant: IBM

    Abstract: Apparatus for eavesdropping within an area layer adjacent to and surrounding a LAN area periphery for potential wireless transmissions of an intruder having a lower frequency within a level below the LAN frequency; and an implementation responsive to said eavesdropping apparatus for changing the encryption code of said encrypted wireless transmission upon the eavesdropping detection of a wireless transmission of said lower frequency addressed to a network location of one of the terminals in said LAN.

Patent Agency Ranking