-
公开(公告)号:JP2000311024A
公开(公告)日:2000-11-07
申请号:JP2000076012
申请日:2000-03-17
Applicant: IBM
Inventor: CHALLENER DAVID CARROLL , TIMMONS KENNETH D
Abstract: PROBLEM TO BE SOLVED: To provide a reliable method/system of safety protection of a computer, which a possessor can easily use. SOLUTION: The method contains a step for installing the operation permission zone of a computer, a step for judging whether the possessor of the commuter is permitted to possess it when the computer and the possessor leave the operation permission zone and they pass through a portal and a step for permitting continuous access to the computer without the request of a password if the possessor is permitted. The method and a system are transparent for the possessor and to hide the computer from the portal does not bring any advantage. The method and the system can easily be applied to company environment and are especially suitable for the safety protection of the mobile computer system.
-
公开(公告)号:DE60109537D1
公开(公告)日:2005-04-28
申请号:DE60109537
申请日:2001-08-24
Applicant: IBM
Inventor: ATKINS BARRY , CHALLENER DAVID C , NOVAK FRANK , RUSNAK JOSEPH G , TIMMONS KENNETH D , VETTER WILLIAM W
-
公开(公告)号:DE60109537T2
公开(公告)日:2006-04-13
申请号:DE60109537
申请日:2001-08-24
Applicant: IBM
Inventor: ATKINS BARRY , CHALLENER DAVID C , NOVAK FRANK , RUSNAK JOSEPH G , TIMMONS KENNETH D , VETTER WILLIAM W
-
公开(公告)号:GB2348027A
公开(公告)日:2000-09-20
申请号:GB0006237
申请日:2000-03-16
Applicant: IBM
Inventor: CHALLENER DAVID CARROLL , TIMMONS KENNETH D
Abstract: The present invention provides a method and system for securing a computer and a computer for use in such method and system. The method includes providing a zone 302 of authorized operation for the computer 306; determining if a possessor of the computer is authorized to have possession when the computer and the possessor leaves the zone of authorized operation and pass through a portal 316; and allowing continued access to the computer without requiring a password if the possessor is authorized. The method and system are transparent to the possessor and provide no advantage in hiding the computer from the portal. This method and system may be easily applied in a corporate environment and are particularly apt for securing mobile computer systems.
-
公开(公告)号:ES2236145T3
公开(公告)日:2005-07-16
申请号:ES01307284
申请日:2001-08-24
Applicant: IBM
Inventor: ATKINS BARRY , CHALLENER DAVID C , NOVAK FRANK , RUSNAK JOSEPH G , TIMMONS KENNETH D , VETTER WILLIAM W
Abstract: Un método para gestionar una clave de usuario (clave 1) usada para firmar un mensaje para un sistema de procesamiento de datos (100), comprendiendo dicho método: asignar una clave de usuario a un usuario (304) para cifrar mensajes; almacenar una clave asociada (clave A) en el sistema de procesamiento de datos y cifrar la clave de usuario con la clave asociada para obtener una clave de usuario cifrada (310), caracterizándose el método porque dicha clave de usuario cifrada se usa para validar una asociación del usuario con mensajes cifrados por dicha clave de usuario; y porque el método comprende además: impedir, después, la validación de la asociación del usuario con mensajes revocando la clave asociada (320).
-
公开(公告)号:AT291798T
公开(公告)日:2005-04-15
申请号:AT01307284
申请日:2001-08-24
Applicant: IBM
Inventor: ATKINS BARRY , CHALLENER DAVID C , NOVAK FRANK , RUSNAK JOSEPH G , TIMMONS KENNETH D , VETTER WILLIAM W
-
公开(公告)号:GB2348027B
公开(公告)日:2004-03-24
申请号:GB0006237
申请日:2000-03-16
Applicant: IBM
Inventor: CHALLENER DAVID CARROLL , TIMMONS KENNETH D
-
-
-
-
-
-