Abstract:
A financial transaction system detects an identifier for a user requesting a transaction at an interface of the financial transaction system. The financial transaction system accesses from the electronic message service provider for the user using the identifier, at least one electronic message addressed to the user and sent to the user over a network for delivery to the user by the electronic message service provider at at least one system accessible via the network and logged into using the identifier. The accessed electronic message is delivered to the user at the interface for the financial transaction system.
Abstract:
A method, apparatus, and computer instructions for authorizing execution of an application on the data processing system. A request is received to execute the application, wherein the request originates from a remote data processing system and wherein the request includes a digital certificate and the application. The digital certificate is verified in response to receiving the request. Responsive to verifying the digital certificate, a digital digest is calculated for the application to form a calculated digital digest. The calculated digital digest is compared with a set of digital digests from a trusted source. The application is executed if a match between the calculated digital digest and set of digital digests occurs.
Abstract:
A method, apparatus, and computer instructions for obtaining a logical unit. A request is sent for the logical unit. In the depicted examples, the request is sent to a multicast IP address. Responses to the request for the logical unit are received from a number of responders. A responder is identified from the set of responders to form a selected responder. The selected responder is identified based on at least one connection metric between the data processing system and the set of responders. The logical unit is retrieved from the selected responder.
Abstract:
Encryption is provided in wireless personal palm type computer devices for Internet transmitted documents despite the limited data processing and memory functions in such devices. The palm type device initially encrypts only a portion of a text document which is then wirelessly transmitted to the server computer which normally functions as the Web server, i.e. the server through which Web computer terminals are wired or connected into the Web. This Web server then further encrypts the received text document and then further transmits this further encrypted document to a terminal in said network. Preferably, the further encryption in the server involves two steps: decrypting the lower level encryption (necessitated by the limited CPU and memory resources in the palm device) to restore the text document at the server before the server may then re-encrypt the whole document using a higher level conventional 128 bit Web encryption protocols such as SSL.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system to simultaneously execute plural operating systems from the same shared system resource on different computers. SOLUTION: Each machine reads a master boot record without reservation and decides partition of an operating system to be booted. Each machine performs the reservation of basic exclusive writing continuation to access operating system boot partition next. Each machine continuously performs another reservation of basic exclusive writing continuation to access the operating system partition itself. Different pieces of operating system partitions are allocated to each of the machines even when they executes the same operating system.
Abstract:
PROBLEM TO BE SOLVED: To provide a computer implemented method, data processing system, and computer program product for monitoring system events and providing real time response to security threats. SOLUTION: System data is collected by monitors in a computer system. The expert system compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an apparatus, system and method for canceling an already transmitted e-mail message. SOLUTION: After an e-mail message is prepared by a sender, the message can be stored in a computing system at the time of its transmission to recipients. Generally, the e-mail message contains a list of destination recipients. Then, a notification message, instead of an actual e-mail message, is generated and transmitted to the recipients (and to the sender). The notification message allows the recipients to automatically access the stored e-mail message. When the sender desires to cancel the message, the user can access the message and modify the list of recipients to exclude any number of recipients, as well as modify the text of the e-mail message. Any recipient whose e-mail address has been excluded will no longer be allowed to access the e-mail message. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method and device for obtaining status information about an active process in a grid and to provide a computer instruction. SOLUTION: A job identifier is received from a remote node in response to the submission of a job to the remote node on the grid from a data processing system. The job identifier is stored in a set of job identifiers. The set of job identifiers is used to form a set of job status request in response to a request of obtaining the status of the job submitted from the data processing system, and a job status request is submitted for each job identifier in one job identifier about the active process. A response to one set of job status requests is received, and the response is then presented. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
"extensão de segurança de rede de sistemas de arquivos distribuídos". um protocolo de segurança que dinamicamente implementa segurança de montagem aumentada de um sistema de arquivos, quando o acesso a arquivos sensíveis em uma rede de sistema de arquivos é solicitado. quando o usuário de um sistema cliente tenta acessar um arquivo sensível especificamente etiquetado, o servidor que hospeda o sistema de arquivos executa um código de software que termina a montagem corrente e reconfigura as portas do servidor para aceitar uma remontagem a partir do cliente através de uma porta mais segura. a porta do servidor reconfigurada é fornecido o endereço de ip do cliente e a correspondência do endereço de ip durante a operação de remontagem. a comutação para uma montagem segura é completada de uma maneira perfeitamente consistente de modo que os usuários autorizados são permitidos acessar arquivos sensíveis sem derrubar o servidor com as a criptografação custosa e outras características de segurança de intensivo recurso. nenhum retardo significante é experimentado pelo usuário, enquanto o arquivo sensível é protegido de captura não autorizada durante a transmissão do sistema cliente.