Method of transmitting data in networks

    公开(公告)号:DE19712470A1

    公开(公告)日:1998-10-01

    申请号:DE19712470

    申请日:1997-03-25

    Applicant: IBM

    Abstract: The process is used to transmit data between the program of a transmitting system, e.g. platform A, and the program of a receiving system, platform B, where the program is either installed on a common system or on various systems. The data is structured by a container that defines programming objects and the definition of the structure is given by an application programming interface connecting with the user. The container has stored attributes in various data types, e.g. binary, characteristics, integer and floating point numbers.

    Secure private key distribution between endpoint instances

    公开(公告)号:AU2021235526A1

    公开(公告)日:2022-08-25

    申请号:AU2021235526

    申请日:2021-02-10

    Applicant: IBM

    Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.

    METHOD AND SYSTEM FOR AUTOMATICALLY TRANSFORMING A PROVIDER OFFERING INTO A CUSTOMER SPECIFIC SERVICE ENVIRONMENT DEFINITON EXECUTABLE BY RESOURCE MANAGEMENT SYSTEMS

    公开(公告)号:CA2527675A1

    公开(公告)日:2005-01-06

    申请号:CA2527675

    申请日:2004-05-13

    Applicant: IBM

    Abstract: Method and System for automatically transforming a provider offering into a customer specific service environment definition executable by Resource management systems. The idea of the present invention is to provide a method for automatically transforming a provider offering describing a customer specific service environment in business terms into a machine readable form which can be automatically processed by resource management systems. The inp ut for the transformation is the provider's offering in business terms as well information from the resource catalog. The result of the transformation is a customer specific service environment topology that states all the necessary resource types, their configurations and their dependencies. Based on that customer specific service environment topology and information from the resource management catalog, a customer specific service environment definition (SED) is automatically generated which contains all the configuration information and definitions of the resource management actions in order to instantiate and drive the operation of the service environment. The SED can be deployed into a resource management system that automatically executes the resource management actions without the error prone configurati on steps otherwise needed.

    SECURE PRIVATE KEY DISTRIBUTION BETWEEN ENDPOINT INSTANCES

    公开(公告)号:CA3166663A1

    公开(公告)日:2021-09-16

    申请号:CA3166663

    申请日:2021-02-10

    Applicant: IBM

    Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.

    Automated network deployment of cloud services into a network by matching security requirements

    公开(公告)号:GB2504487A

    公开(公告)日:2014-02-05

    申请号:GB201213507

    申请日:2012-07-30

    Applicant: IBM

    Abstract: Disclosed is a method of automated network deployment of cloud services CS into a network 10. The method starts by receiving a cloud service with a specific resource protection template RPT, specifying an isolation policy for isolating zones in the network. Next the customer protection parameters CPP specifying customer needs regarding protection in the network or received. The next step, is providing security requirements SR matching the received resource protection templates and the received customer protection parameters. Then the cloud service is automatically deployed into the network by using the provided security requirements. The isolation policy may specify a set of zones using IP addresses allocated to resources. The automatically deploying the cloud service may include instancing a virtualised routing application configured using the provided security requirements.

    Secure private key distribution between endpoint instances

    公开(公告)号:AU2021235526B2

    公开(公告)日:2023-07-13

    申请号:AU2021235526

    申请日:2021-02-10

    Applicant: IBM

    Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.

    SICHERE PRIVATE SCHLÜSSELVERTEILUNG ZWISCHEN ENDPUNKTINSTANZEN

    公开(公告)号:DE112021000340T5

    公开(公告)日:2022-10-20

    申请号:DE112021000340

    申请日:2021-02-10

    Applicant: IBM

    Abstract: Ein Verfahren, ein Computerprogrammprodukt und ein System zum Verteilen eines privaten Signaturschlüssels zwischen Autorisierungsinstanzen. Das Verfahren umfasst ein Registrieren einer Mehrzahl von Autorisierungsinstanzen in einer Konfigurationsdatei und ein Generieren von Host-Instanz-Schlüsselpaaren durch jede der Autorisierungsinstanzen. Das Verfahren umfasst auch ein Speichern der öffentlichen Host-Schlüssel in der gemeinsam genutzten Datenbank und ein Wählen von einer der Autorisierungsinstanzen als führende Signaturschlüssel-Instanz. Das Verfahren umfasst ein Generieren, durch die führende Signaturschlüssel-Instanz, eines Signaturschlüsselpaars. Das Signaturschlüsselpaar umfasst einen öffentlichen Signaturschlüssel und einen privaten Signaturschlüssel. Das Verfahren umfasst auch ein Speichern des öffentlichen Signaturschlüssels in der gemeinsam genutzten Datenbank und ein Übertragen eines verschlüsselten privaten Signaturschlüssels zu einer anfordernden Autorisierungsinstanz von den Autorisierungsinstanzen. Das Verfahren umfasst ferner ein Entschlüsseln des verschlüsselten privaten Signaturschlüssels durch Verwenden des privaten Host-Schlüssels, der durch die anfordernde Autorisierungsinstanz generiert wurde.

Patent Agency Ranking