METHOD AND APPARATUS FOR AUTHORIZING EXECUTION FOR APPLICATIONS IN A DATA PROCESSING SYSTEM
    2.
    发明申请
    METHOD AND APPARATUS FOR AUTHORIZING EXECUTION FOR APPLICATIONS IN A DATA PROCESSING SYSTEM 审中-公开
    在数据处理系统中授权执行应用程序的方法和设备

    公开(公告)号:WO2004079483A3

    公开(公告)日:2004-12-09

    申请号:PCT/GB2004000926

    申请日:2004-03-04

    CPC classification number: G06F21/51 G06F21/33

    Abstract: A method, apparatus, and computer instructions for authorizing execution of an application on the data processing system. A request is received to execute the application, wherein the request originates from a remote data processing system and wherein the request includes a digital certificate and the application. The digital certificate is verified in response to receiving the request. Responsive to verifying the digital certificate, a digital digest is calculated for the application to form a calculated digital digest. The calculated digital digest is compared with a set of digital digests from a trusted source. The application is executed if a match between the calculated digital digest and set of digital digests occurs.

    Abstract translation: 一种用于授权在数据处理系统上执行应用程序的方法,装置和计算机指令。 接收到执行应用程序的请求,其中该请求源自远程数据处理系统,并且其中该请求包括数字证书和应用程序。 数字证书在接收到请求后进行验证。 响应于验证数字证书,为应用计算数字摘要以形成计算的数字摘要。 将计算出的数字摘要与来自可信来源的一组数字摘要进行比较。 如果计算出的数字摘要和一组数字摘要发生匹配,则执行该应用程序。

    Method and device for obtaining status information in grid
    4.
    发明专利
    Method and device for obtaining status information in grid 有权
    用于获取网格状态信息的方法和设备

    公开(公告)号:JP2004295887A

    公开(公告)日:2004-10-21

    申请号:JP2004085572

    申请日:2004-03-23

    CPC classification number: G06Q10/06

    Abstract: PROBLEM TO BE SOLVED: To provide a method and device for obtaining status information about an active process in a grid and to provide a computer instruction. SOLUTION: A job identifier is received from a remote node in response to the submission of a job to the remote node on the grid from a data processing system. The job identifier is stored in a set of job identifiers. The set of job identifiers is used to form a set of job status request in response to a request of obtaining the status of the job submitted from the data processing system, and a job status request is submitted for each job identifier in one job identifier about the active process. A response to one set of job status requests is received, and the response is then presented. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:提供一种用于获得关于网格中的活动过程的状态信息并提供计算机指令的方法和装置。 解决方案:响应于从数据处理系统向网格上的远程节点提交作业,从远程节点接收作业标识符。 作业标识符存储在一组作业标识符中。 该组作业标识符用于响应于获得从数据处理系统提交的作业的状态的请求而形成一组作业状态请求,并且为每个作业标识符提交作业状态请求,其中一个作业标识符关于 活跃的过程。 接收对一组作业状态请求的响应,然后呈现响应。 版权所有(C)2005,JPO&NCIPI

    extensão de segurança de rede de sistemas de arquivos distribuídos

    公开(公告)号:BRPI0410569B1

    公开(公告)日:2016-08-23

    申请号:BRPI0410569

    申请日:2004-04-15

    Applicant: IBM

    Abstract: "extensão de segurança de rede de sistemas de arquivos distribuídos". um protocolo de segurança que dinamicamente implementa segurança de montagem aumentada de um sistema de arquivos, quando o acesso a arquivos sensíveis em uma rede de sistema de arquivos é solicitado. quando o usuário de um sistema cliente tenta acessar um arquivo sensível especificamente etiquetado, o servidor que hospeda o sistema de arquivos executa um código de software que termina a montagem corrente e reconfigura as portas do servidor para aceitar uma remontagem a partir do cliente através de uma porta mais segura. a porta do servidor reconfigurada é fornecido o endereço de ip do cliente e a correspondência do endereço de ip durante a operação de remontagem. a comutação para uma montagem segura é completada de uma maneira perfeitamente consistente de modo que os usuários autorizados são permitidos acessar arquivos sensíveis sem derrubar o servidor com as a criptografação custosa e outras características de segurança de intensivo recurso. nenhum retardo significante é experimentado pelo usuário, enquanto o arquivo sensível é protegido de captura não autorizada durante a transmissão do sistema cliente.

    6.
    发明专利
    未知

    公开(公告)号:AT339733T

    公开(公告)日:2006-10-15

    申请号:AT04727590

    申请日:2004-04-15

    Applicant: IBM

    Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.

    DISTRIBUTED FILESYSTEM NETWORK SECURITY EXTENSION

    公开(公告)号:CA2525249C

    公开(公告)日:2011-03-29

    申请号:CA2525249

    申请日:2004-04-15

    Applicant: IBM

    Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and reconfigures the server ports to accept a re-mount from the client via a more secure port. The server reconfigured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from unauthorized capture during transmission to the client system.

    9.
    发明专利
    未知

    公开(公告)号:BRPI0410569A

    公开(公告)日:2006-06-20

    申请号:BRPI0410569

    申请日:2004-04-15

    Applicant: IBM

    Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.

    DISTRIBUTED FILESYSTEM NETWORK SECURITY EXTENSION

    公开(公告)号:CA2525249A1

    公开(公告)日:2004-12-02

    申请号:CA2525249

    申请日:2004-04-15

    Applicant: IBM

    Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially- tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and reconfigures the server ports to accept a re-mount from the client via a more secure port. The server reconfigured server port is provided the IP address of the client and matche s the IP address during the re-mount operation. The switch to a secure mount i s completed in a seamless manner so that authorized users are allowed to acces s sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from unauthorized capture during transmission to the client system.

Patent Agency Ranking