摘要:
Meta-information, such as a digital watermark, that is associated with a document is encoded by using characters, or sequences of characters, that are “invisible” when rendered. Characters such as spaces, tabs, carriage returns, backspaces, line feeds, and so on are used to encode the watermark. The encoded “invisible” meta-information item is preferably appended to the document. A receiving device that is compatible with this encoding is able to decode and process the meta-information, for example, to verify the contents and/or the originator of the document. A receiving device that is not compatible with this encoding will merely display or print additional “white space” corresponding to the “invisible” meta-information. By appending this invisible encoding to the document, this additional white space will occur after the display or printing of the document, in a visually unobtrusive form.
摘要:
A system is provided that contains multiple control register and descriptor table register sets so that an execution context switch between X86 protected mode operating systems can be performed with minimal processing overhead. Upon receipt of a protected instruction determined to be a meta-protected instruction, the system calls a meta virtual machine (MVM) that performs the functions necessary to shift execution contexts.
摘要:
A method is described a NIC to ascertain the presence of spoofing activity and thus detect unauthorized network access. The NIC monitors for packets purporting to be from itself. In one embodiment, a NIC views packets trafficking on its network and monitors for packets having its own MAC Address, but which it did not send. In another embodiment, the NIC monitors for packets having its own IP address, but which it did not send. These falsely purportive packets originate not from the observant NIC, but suspiciously from elsewhere. Such suspect origins entities may be rogue entities attempting to gain unauthorized network access. These embodiments detect unauthorized access to a network by ascertaining the presence of spoofing activity in a manner that does not require gross revamping of network architecture or the burdening of network accessibility by legitimate authorized entities.
摘要:
Methods, systems and computer program products are provided which communicate between client applications and a transaction server by establishing a persistent secure connection between the transaction server and a Secure Socket Layer (SSL) proxy server. A first session specific SSL connection, different from the persistent secure connection, is also established between a first client application and the SSL proxy server. Communications between the first client application and the SSL proxy server transmitted over the first session specific SSL connection are then forwarded with the client's identity preserved to the transaction server over the persistent secure connection. Furthermore, a second session specific SSL connection between a second client application and the SSL proxy server may also be established and the communications between the second client application and the SSL proxy server transmitted over the second session specific SSL connection are forwarded to the transaction server over the persistent secure connection. Preferably, the persistent secure connection is an SSL connection.
摘要:
A method and system for booting a computer system is provided in which the boot order of the computer system is displayed to the user in a manner such that the name of each bootable device and the location of each bootable device in the architecture of the computer system are displayed to the user upon entering a setup routine. The boot order displayed may also identify other information about the bootable devices of the computer system, including the operating and maximum speed of the devices and whether the devices are embedded devices. The boot order may be changed by the user by entering setup and manipulating the displayed list of bootable devices.
摘要:
A mechanism for establishing a plurality of sessions between a client and a first server based on a single input of user authenticating information is disclosed. A request to establish a connection between the client and the first server is received. The request includes identification information for authenticating a requesting user. Based on the identification information, a determination is made as to whether the connection between the client and the first server should be established. If it is determined that the connection between the client and the first server should be established, the identification information is cached in memory and the connection between the client and the first server is allowed to be established. Subsequent connection requests from the same client are authenticated, and further connections can be established, based on the cached identification information, without further input from the client or user.
摘要:
A digital signature scheme for a “smart” card utilizes a set of prestored signing elements and combines pairs of the elements to produce a new session pair. The combination of the elements is performed partly on the card and partly on the associated transaction device so that the exchange of information between card and device does not disclose the identity of the signing elements. The signing elements are selected in a deterministic but unpredictable manner so that each pair of elements is used once. Further signing pairs are generated by implementing the signing over an anomalous elliptic curve encryption scheme and applying a Frobenius Operator to the normal basis representation of one of the elements.
摘要:
An expansion unit control method for use with an expansion control unit containing at least one device, includes allocating a predetermined input/output (I/O) resource, ensured not to be used in processing, to the at least one device as an I/O resource used for sending and receiving information, performing a predetermined process for the at least one device by sending and receiving information to and from the at least one device through the predetermined I/O resource, and deallocating the predetermined I/O resource allocated to the at least one device.
摘要:
A CPU is provided with an ability to modify its operation in accordance with an encryption key. When a program is compiled, the program is modified in order that execution may be performed by the CPU with modified op codes. As a result, it is unnecessary to decrypt the program into standard op codes prior to execution. The modified op codes are provided with surplus bits, causing an increase in op code length, and the output of data results is provided in blocks of several words. The internal allocations of signals and logic gates is made key dependent to further foil the efforts of adversaries who may attempt to understand the program instructions.
摘要:
Data communication means (82) performs data communication and power transmission by utilizing electromagnetic waves. Conversion method designating means (88) is provided with output value measuring means (52) which measures the magnitude of the fluctuating output of a resonance circuit (40), and conversion method select means (100) which selects a conversion method to be executed in accordance with the obtained magnitude of the output of the resonance circuit (40). Data converting means (84) is provided with three conversion methods and performs conversion between original data and processed data by executing conversion in accordance with one of the conversion methods designated by the select means (100). The safety on security can thus be improved with a simple constitution.