PROGRAM CODE DISTRIBUTING METHOD AND ITS SYSTEM

    公开(公告)号:JPH1083310A

    公开(公告)日:1998-03-31

    申请号:JP15176897

    申请日:1997-06-10

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide an authentification system for allowing a relied third party to confirm the author of a program and to sign a certification for guaranteeing the perfection of the program. SOLUTION: A program code 140 is capsuled together with a guarantee and access control list(ACL) 150. ACL 150 describes an allowable condition and a resource required by the code 140. A forcing mechanism assigns the allowanble condition of a system and a resource according to ACL 150. For example, a code preparing system 10 communicates with a certifying organization 15 being the relied third party. The organization 15 issues the cerificate of the code 140 and the certificate of ACL 150 of the code 140. Once the certificate is issued, nobody can change the code 140 and ACL 150 without invalidating the certificate. The code 140, its ACL 150 and their certificates are stored in a server.

    2.
    发明专利
    未知

    公开(公告)号:DE69732323T2

    公开(公告)日:2005-12-22

    申请号:DE69732323

    申请日:1997-05-20

    Applicant: IBM

    Abstract: A form of authentication is provided wherein a trusted third party signs a certificate to identify the author of a program and to secure its integrity. The program code is encapsulated or otherwise associated with the certificate and an access control list (ACL). The access control list describes the permissions and resources required by the code. An enforcement mechanism which allocates system permissions and resources in accordance with the ACL. In a preferred embodiment, a code production system communicates with a certification agency, which is a trusted third party. The certification agency issues a certificate for the code and a certificate for the access list of that code. Once the certificate is issued it is not possible for any party to modify the code or access list without invalidating the certificate. The code and its ACL, along with their certificates are stored on a server. A client downloading the code or access list can verify the integrity of the code/access list and the system can enforce the access list such that the permissions and resources are not exceeded.

    3.
    发明专利
    未知

    公开(公告)号:DE69637290D1

    公开(公告)日:2007-11-29

    申请号:DE69637290

    申请日:1996-07-03

    Applicant: IBM

    Abstract: An efficient distributed means for setting up, taking down, and updating connections in a communications network, which is robust in the presence of failures. More specifically with this invention a path for a connection is computed and reservation requests are simultaneously sent through separate channels to each of a set of nodes of the path for the connection to reserve and determine if resources are available for the connection. Upon acknowledgement that the links for the connection are available and have been reserved, a setup message is sequentially transmitted between the adjacent nodes along the path until the setup messages reaches the destination node. The switches in each node then configure themselves in response to the setup message so as to establish the connection.

    4.
    发明专利
    未知

    公开(公告)号:DE69637290T2

    公开(公告)日:2008-07-17

    申请号:DE69637290

    申请日:1996-07-03

    Applicant: IBM

    Abstract: An efficient distributed means for setting up, taking down, and updating connections in a communications network, which is robust in the presence of failures. More specifically with this invention a path for a connection is computed and reservation requests are simultaneously sent through separate channels to each of a set of nodes of the path for the connection to reserve and determine if resources are available for the connection. Upon acknowledgement that the links for the connection are available and have been reserved, a setup message is sequentially transmitted between the adjacent nodes along the path until the setup messages reaches the destination node. The switches in each node then configure themselves in response to the setup message so as to establish the connection.

    5.
    发明专利
    未知

    公开(公告)号:DE69732323D1

    公开(公告)日:2005-03-03

    申请号:DE69732323

    申请日:1997-05-20

    Applicant: IBM

    Abstract: A form of authentication is provided wherein a trusted third party signs a certificate to identify the author of a program and to secure its integrity. The program code is encapsulated or otherwise associated with the certificate and an access control list (ACL). The access control list describes the permissions and resources required by the code. An enforcement mechanism which allocates system permissions and resources in accordance with the ACL. In a preferred embodiment, a code production system communicates with a certification agency, which is a trusted third party. The certification agency issues a certificate for the code and a certificate for the access list of that code. Once the certificate is issued it is not possible for any party to modify the code or access list without invalidating the certificate. The code and its ACL, along with their certificates are stored on a server. A client downloading the code or access list can verify the integrity of the code/access list and the system can enforce the access list such that the permissions and resources are not exceeded.

Patent Agency Ranking