METHOD AND APPARATUS FOR SERVING CONTENT FROM A SEMI-TRUSTED SERVER
    3.
    发明公开
    METHOD AND APPARATUS FOR SERVING CONTENT FROM A SEMI-TRUSTED SERVER 审中-公开
    方法和装置用于分发内容从半可信服务器

    公开(公告)号:EP1388060A4

    公开(公告)日:2004-12-15

    申请号:EP01996126

    申请日:2001-12-04

    Applicant: IBM

    Abstract: This invention provides methods and apparatus for enabling access to restricted information contained at a semi-trusted web-server (100) also called a proxy server. The client (101), semi-trusted web-server (104), and origin web-server (103) are connected to a core network (102). Restricted information is information that is only available to a selected group of authorized clients (101). A client (101) desiring access to the restricted information authenticates itself with a trusted web-server (i.e. origin web-server) (103), and obtains a client credential. The client then contacts the semi-trusted web-server (100) with the credential and obtains access to the restricted content. The restricted information may be encrypted at the semi-trusted web-server (100), so that the restricted information is secure even if the semi-trusted web-server (100) is not completely secure. To shorten the length of time that the client (101) must wait for a response to requests and to lighten the load on the origin web-server (103), the semi-trusted web-server (100) may service the requests of the client (101). Generally, a semi-trusted web-server (100) is chosen to service the requests of a client (101) if the semi-trusted web-server (100) is less than the origin web-server (103).

    METHOD AND APPARATUS FOR DELEGATING RESPONSES TO CONDITIONS IN COMPUTING SYSTEMS
    4.
    发明申请
    METHOD AND APPARATUS FOR DELEGATING RESPONSES TO CONDITIONS IN COMPUTING SYSTEMS 审中-公开
    将计算机系统中的条件反应的方法和装置

    公开(公告)号:WO2007015723A3

    公开(公告)日:2007-06-07

    申请号:PCT/US2006022855

    申请日:2006-06-12

    CPC classification number: H04L63/1441

    Abstract: One embodiment of the present method and apparatus for delegating responses to conditions in computing systems includes acknowledging (e.g., at a systems management component in the computing system) a condition, and delegating responsibility for a strategy for a response to the condition to another component. In further embodiments, the present method and apparatus for delegating responses to conditions in computing systems includes receiving (e.g., at a computing system component) an assignment from another computing system component (e.g., a systems management component), where the assignment assigns responsibility for a strategy for a response to a condition, and determining whether and how to respond to the condition.

    Abstract translation: 用于委托对计算系统中的条件的本方法和装置的一个实施例包括确认(例如,在计算系统中的系统管理组件)条件,以及将对该条件的响应的策略的责任委派给另一个组件。 在另外的实施例中,用于委托对计算系统中的条件的响应的本方法和装置包括从另一计算系统组件(例如,系统管理组件)接收(例如,在计算系统组件中)分配,其中所述分配为 对条件作出反应的策略,以及确定是否以及如何对条件作出反应。

    METHOD AND APPARATUS FOR MIGRATING A VIRTUAL TPM INSTANCE AND PRESERVING UNIQUENESS AND COMPLETENESS OF THE INSTANCE
    5.
    发明申请
    METHOD AND APPARATUS FOR MIGRATING A VIRTUAL TPM INSTANCE AND PRESERVING UNIQUENESS AND COMPLETENESS OF THE INSTANCE 审中-公开
    用于移植虚拟TPM实例的方法和装置,并保持独特性和完整性

    公开(公告)号:WO2007109212A3

    公开(公告)日:2008-09-25

    申请号:PCT/US2007006773

    申请日:2007-03-19

    Applicant: IBM

    CPC classification number: G06F21/57 H04L9/0825 H04L9/3242 H04L2209/127

    Abstract: A migration scheme for virtualized Trusted Platform Modules (430, 432, 434) is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform (402) to another (404). A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module (432) and all its state information is encrypted using a hybrid of public and symmetric key cryptography (612). The encrypted state is transferred to the target physical platform (616), decrypted and the state of the virtual Trusted Platform Module instance is rebuilt (620).

    Abstract translation: 介绍了虚拟化可信平台模块(430,432,434)的迁移方案。 该过程能够将虚拟可信平台模块的实例从一个物理平台(402)安全迁移到另一物理平台(404)。 虚拟可信平台模块实例的状态从源虚拟可信平台模块(432)下载,并且所有状态信息都使用公共和对称密钥密码术(612)的混合进行加密。 将加密的状态传送到目标物理平台(616),进行解密,并重建虚拟可信平台模块实例的状态(620)。

    Distributed feature collection and correlation engine

    公开(公告)号:GB2529122A

    公开(公告)日:2016-02-10

    申请号:GB201521731

    申请日:2014-02-24

    Applicant: IBM

    Abstract: A distributed feature collection and correlation engine is provided, Feature extraction comprises obtaining one or more data records; extracting information from the one or more data records based on domain knowledge; transforming the extracted information into a key/value pair comprised of a key K and a value V, wherein the key comprises a feature identifier; and storing the key/value pair in a feature store database if the key/value pair does not already exist in the feature store database using a de-duplication mechanism. Features extracted from data records can be queried by obtaining a feature store database comprised of the extracted features stored as a key/value pair comprised of a key K and a value V, wherein the key comprises a feature identifier; receiving a query comprised of at least one query key; retrieving values from the feature store database that match the query key; and returning one or more retrieved key/value pairs.

    METHOD AND APPARATUS FOR SERVING CONTENT FROM A SEMI-TRUSTEDSERVER

    公开(公告)号:CA2444291A1

    公开(公告)日:2002-11-21

    申请号:CA2444291

    申请日:2001-12-04

    Applicant: IBM

    Abstract: This invention provides methods and apparatus for enabling access to restricted information contained at a semi-trusted web-server (100) also called a proxy server. The client (101), semi-trusted web-server (104), and origin web-server (103) are connected to a core network (102). Restricted information is information that is only available to a selected group of authorized clients (101). A client (101) desiring access to the restricted information authenticates itself with a trusted web-server (i.e. origin web- server) (103), and obtains a client credential. The client then contacts the semi-trusted web-server (100) with the credential and obtains access to the restricted content. The restricted information may be encrypted at the semi- trusted web-server (100), so that the restricted information is secure even if the semi-trusted web-server (100) is not completely secure. To shorten the length of time that the client (101) must wait for a response to requests an d to lighten the load on the origin web-server (103), the semi-trusted web- server (100) may service the requests of the client (101). Generally, a semi - trusted web-server (100) is chosen to service the requests of a client (101) if the semi-trusted web-server (100) is less than the origin web-server (103 ).

    METHOD AND APPARATUS FOR DETECTING UNAUTHORIZED BULK FORWARDING OF SENSITIVE DATA OVER A NETWORK

    公开(公告)号:CA2874097C

    公开(公告)日:2020-09-22

    申请号:CA2874097

    申请日:2013-03-21

    Applicant: IBM

    Abstract: Methods and apparatus are provided for detecting unauthorized bulk forwarding of sensitive data over a network. A bulk forwarding of email from a first network environment is automatically detected by determining an arrival rate for internal emails received from within the first network environment into one or more user accounts; determining a sending rate for external emails sent from the one or more user accounts to a second network environment; and detecting the bulk forwarding of email from a given user account by comparing the arrival rate for internal emails and the sending rate for external emails. The bulk forwarding of email from a given user account can be detected by determining whether statistical models of the arrival rate for internal emails and of the sending rate for external emails are correlated in time.

    Method and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network

    公开(公告)号:GB2515974A

    公开(公告)日:2015-01-07

    申请号:GB201420108

    申请日:2013-03-21

    Applicant: IBM

    Abstract: Methods and apparatus are provided for detecting unauthorized bulk forwarding of sensitive data over a network. A bulk forwarding of email from a first network environment is automatically detected by determining an arrival rate for internal emails received from within the first network environment into one or more user accounts; determining a sending rate for external emails sent from the one or more user accounts to a second network environment; and detecting the bulk forwarding of email from a given user account by comparing the arrival rate for internal emails and the sending rate for external emails. The bulk forwarding of email from a given user account can be detected by determining whether statistical models of the arrival rate for internal emails and of the sending rate for external emails are correlated in time.

    METHOD AND APPARATUS FOR DETECTING UNAUTHORIZED BULK FORWARDING OF SENSITIVE DATA OVER A NETWORK

    公开(公告)号:CA2874097A1

    公开(公告)日:2013-12-19

    申请号:CA2874097

    申请日:2013-03-21

    Applicant: IBM

    Abstract: Methods and apparatus are provided for detecting unauthorized bulk forwarding of sensitive data over a network. A bulk forwarding of email from a first network environment is automatically detected by determining an arrival rate for internal emails received from within the first network environment into one or more user accounts; determining a sending rate for external emails sent from the one or more user accounts to a second network environment; and detecting the bulk forwarding of email from a given user account by comparing the arrival rate for internal emails and the sending rate for external emails. The bulk forwarding of email from a given user account can be detected by determining whether statistical models of the arrival rate for internal emails and of the sending rate for external emails are correlated in time.

Patent Agency Ranking