摘要:
Objects including Java bytecodes are embedded in a 3270 datastream structured field. The 3270 datastream structured field, including the objects so embedded, are passed between a primary logical unit and a secondary logical unit that communicate with each other over a network using 3270 datastream architecture. An initialization protocol sends a Read Partition (Query) structured field from the primary logical unit to the secondary logical unit, to query whether the secondary logical unit supports Java. The secondary logical unit sends a Query Reply structured field to the primary logical unit in response to receipt of the Read Partition (Query) from the primary logical unit if the secondary logical unit supports Java. In response to receipt of the Query Reply structured field from the secondary logical unit, the 3270 datastream structured field including embedded objects such as Java bytecodes is passed between the primary logical unit and the secondary logical unit. The objects that are embedded in a 3270 datastream structured field may include Java bytecodes, images and audio. Spanning may be used to send objects that exceed structured field length limits. Accordingly, Java and other objects may be integrated with legacy 3270 applications, without requiring the rewriting of legacy applications, and allowing the use of the highly developed 3270 datastream architecture.
摘要:
Java and other objects are integrated with legacy 3270 applications by sending 3270 datastream communications between a primary logical unit (LU) and a secondary LU over a network using 3270 datastream architecture and sending 3270 datastream structured fields including embedded objects such as Java bytecodes between the primary LU and the secondary LU over the network using 3270 datastream architecture. The sending of 3270 datastream communications and the sending of 3270 datastream structured fields are repeated in an arbitrary sequence, to thereby asynchronously send 3270 datastreams and objects such as Java bytecodes between the primary LU and the secondary LU over the network using 3270 datastream architecture. Thus, objects such as Java bytecodes are sent using the LU2 protocol in a manner that need not interfere with legacy communications between a 3270 application and an end user.
摘要:
A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping.
摘要:
A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping.
摘要:
A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping.
摘要:
A route selection system, method and computer program provides a complete end-to-end communications path between an origin node and a destination node in a relatively large communications network having a number of branch networks and at least one backbone network operationally connectable to the branch network. The origin node, the destination node, or both nodes, are located in branch networks and operationally connect to standard network nodes in the backbone network by way of a branch network node. The branch network nodes may be cascaded or in parallel. The branch network node modifies the communications path selected by the standard network node. The branch network node conceals the hop between the node in the branch and itself, identifies the direction of the hop as either an uplink or a downlink, identifies itself as the control point of the resource located in the corresponding node in the branch, and includes the concealed hop information in its own tail vectors which it adds to the route. In serving the origin node, the branch network node completes the route prior to sending the route to the origin node. In serving the destination end node, the branch network node completes the route during connection setup. Connection setup may take the form of either BIND or Route Setup.
摘要:
A method and system for enabling wireless devices distributed throughout an enterprise to be efficiently initialized for secure communications. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and initialize the wireless devices.
摘要:
Methods, systems, computer program products and business methods are provided which provide or utilize updates of firmware (i.e. data stored in a programmable memory device of a processing system) based on rules provided as extensions to certificates associated with an update. Such updates may be provided by obtaining an update image corresponding to the update of the programmable memory and obtaining a certificate associated with the update image, the certificate having update application rules in at least one extension of the certificate. The certificate may be provided as part of the update image. The update application rules are extracted from the extension of the certificate and the programmable memory selectively updated based on the update image and the update application rules extracted from the obtained certificate. Certificates for use in such firmware updates are also provided.
摘要:
Enhanced directory services for large and complex compound WAN/LAN networks includes the use of resource triplet identifications including the resource identification, the identification of the domain in which the resource resides, and the identification of the access node connecting the resource to the compound network. The creation and storage of these identification triplets are automatically initiated as new resources are added to the compound network. Features include the deliberate corruption or modification of triplet identifications to allow prior art directory services to access resources in foreign networks, and the use of these corrupted vectors (as well as the contents of the WAN network topology data base) to allow route selection regardless of the size or complexity of the WAN/LAN network.
摘要翻译:用于大型复杂广域网/ LAN网络的增强型目录服务包括资源三重标识的使用,包括资源标识,资源所在的域的标识以及将资源连接到复合网络的接入节点的标识。 随着新的资源被添加到复合网络,这些标识三元组的创建和存储将自动启动。 特征包括故意损坏或修改三元组标识,以允许现有技术目录服务访问外部网络中的资源,以及使用这些损坏的向量(以及WAN网络拓扑数据库的内容),以允许路由选择,而不管 WAN / LAN网络的大小或复杂性。
摘要:
Methods, systems and computer program products which provide secure updates of firmware (i.e. data stored in a programmable memory device of a processing system) are disclosed. Updates of a programmable memory of a device may be controlled by providing an update window of finite duration during which the programmable memory may be updated. Access to the programmable memory may be based on the state of an access latch. The access latch may be set to allow access after a hardware reset of the device. An update control program may be executed to control access to the programmable memory and the latch reset to prevent access upon completion of the update control program. Verification of the update may be provided through encryption techniques and rules incorporated in certificates for application of updates to provide for selectively updating devices. Also disclosed are methods of securely providing differing functionality to generic devices.