-
公开(公告)号:DE19712470A1
公开(公告)日:1998-10-01
申请号:DE19712470
申请日:1997-03-25
Applicant: IBM
Inventor: OCHS GEORG , GROETZNER MICHAEL , LAND JUTTA , KOLATA HOLGER , ROST STEFFEN
Abstract: The process is used to transmit data between the program of a transmitting system, e.g. platform A, and the program of a receiving system, platform B, where the program is either installed on a common system or on various systems. The data is structured by a container that defines programming objects and the definition of the structure is given by an application programming interface connecting with the user. The container has stored attributes in various data types, e.g. binary, characteristics, integer and floating point numbers.
-
公开(公告)号:AU2021235526A1
公开(公告)日:2022-08-25
申请号:AU2021235526
申请日:2021-02-10
Applicant: IBM
Inventor: BECK MICHAEL , SMOLNY MARTIN , DUERR THOMAS , OCHS GEORG , MCBREARTY GERALD , SOOHOO STEPHEN
IPC: H04L9/32
Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.
-
公开(公告)号:CA2527675A1
公开(公告)日:2005-01-06
申请号:CA2527675
申请日:2004-05-13
Applicant: IBM
Inventor: DAUR HARALD , SCHMIDT ANDREA , OCHS GEORG , BREITER GERD , BILDHAUER GEORG
IPC: G06Q10/00
Abstract: Method and System for automatically transforming a provider offering into a customer specific service environment definition executable by Resource management systems. The idea of the present invention is to provide a method for automatically transforming a provider offering describing a customer specific service environment in business terms into a machine readable form which can be automatically processed by resource management systems. The inp ut for the transformation is the provider's offering in business terms as well information from the resource catalog. The result of the transformation is a customer specific service environment topology that states all the necessary resource types, their configurations and their dependencies. Based on that customer specific service environment topology and information from the resource management catalog, a customer specific service environment definition (SED) is automatically generated which contains all the configuration information and definitions of the resource management actions in order to instantiate and drive the operation of the service environment. The SED can be deployed into a resource management system that automatically executes the resource management actions without the error prone configurati on steps otherwise needed.
-
公开(公告)号:CA3166663A1
公开(公告)日:2021-09-16
申请号:CA3166663
申请日:2021-02-10
Applicant: IBM
Inventor: BECK MICHAEL , SMOLNY MARTIN , DUERR THOMAS , OCHS GEORG , MCBREARTY GERALD , SOOHOO STEPHEN
IPC: H04L9/32
Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.
-
5.
公开(公告)号:GB2504487A
公开(公告)日:2014-02-05
申请号:GB201213507
申请日:2012-07-30
Applicant: IBM
Inventor: JULISCH KLAUS , OCHS GEORG , SCHUNTER MATTHIAS
IPC: G06F9/445
Abstract: Disclosed is a method of automated network deployment of cloud services CS into a network 10. The method starts by receiving a cloud service with a specific resource protection template RPT, specifying an isolation policy for isolating zones in the network. Next the customer protection parameters CPP specifying customer needs regarding protection in the network or received. The next step, is providing security requirements SR matching the received resource protection templates and the received customer protection parameters. Then the cloud service is automatically deployed into the network by using the provided security requirements. The isolation policy may specify a set of zones using IP addresses allocated to resources. The automatically deploying the cloud service may include instancing a virtualised routing application configured using the provided security requirements.
-
公开(公告)号:AU2004251292A1
公开(公告)日:2005-01-06
申请号:AU2004251292
申请日:2004-05-13
Applicant: IBM
Inventor: BREITER GERD , SCHMIDT ANDREA , BILDHAUER GEORG , OCHS GEORG , DAUR HARALD
-
公开(公告)号:AU2021235526B2
公开(公告)日:2023-07-13
申请号:AU2021235526
申请日:2021-02-10
Applicant: IBM
Inventor: BECK MICHAEL , SMOLNY MARTIN , DUERR THOMAS , OCHS GEORG , MCBREARTY GERALD , SOOHOO STEPHEN
IPC: H04L9/32
Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.
-
公开(公告)号:DE112021000340T5
公开(公告)日:2022-10-20
申请号:DE112021000340
申请日:2021-02-10
Applicant: IBM
Inventor: BECK MICHAEL , SMOLNY MARTIN , DUERR THOMAS , OCHS GEORG , MCBREARTY GERALD , SOOHOO STEPHEN
IPC: H04L9/30
Abstract: Ein Verfahren, ein Computerprogrammprodukt und ein System zum Verteilen eines privaten Signaturschlüssels zwischen Autorisierungsinstanzen. Das Verfahren umfasst ein Registrieren einer Mehrzahl von Autorisierungsinstanzen in einer Konfigurationsdatei und ein Generieren von Host-Instanz-Schlüsselpaaren durch jede der Autorisierungsinstanzen. Das Verfahren umfasst auch ein Speichern der öffentlichen Host-Schlüssel in der gemeinsam genutzten Datenbank und ein Wählen von einer der Autorisierungsinstanzen als führende Signaturschlüssel-Instanz. Das Verfahren umfasst ein Generieren, durch die führende Signaturschlüssel-Instanz, eines Signaturschlüsselpaars. Das Signaturschlüsselpaar umfasst einen öffentlichen Signaturschlüssel und einen privaten Signaturschlüssel. Das Verfahren umfasst auch ein Speichern des öffentlichen Signaturschlüssels in der gemeinsam genutzten Datenbank und ein Übertragen eines verschlüsselten privaten Signaturschlüssels zu einer anfordernden Autorisierungsinstanz von den Autorisierungsinstanzen. Das Verfahren umfasst ferner ein Entschlüsseln des verschlüsselten privaten Signaturschlüssels durch Verwenden des privaten Host-Schlüssels, der durch die anfordernde Autorisierungsinstanz generiert wurde.
-
-
-
-
-
-
-