Integration of objects including Java bytecodes with legacy 3270 applications
    1.
    发明授权
    Integration of objects including Java bytecodes with legacy 3270 applications 失效
    将包含Java字节码的对象与传统3270应用程序集成在一起

    公开(公告)号:US06480895B1

    公开(公告)日:2002-11-12

    申请号:US09073423

    申请日:1998-05-06

    IPC分类号: G06F1516

    CPC分类号: G06F9/541 G06F8/70

    摘要: Objects including Java bytecodes are embedded in a 3270 datastream structured field. The 3270 datastream structured field, including the objects so embedded, are passed between a primary logical unit and a secondary logical unit that communicate with each other over a network using 3270 datastream architecture. An initialization protocol sends a Read Partition (Query) structured field from the primary logical unit to the secondary logical unit, to query whether the secondary logical unit supports Java. The secondary logical unit sends a Query Reply structured field to the primary logical unit in response to receipt of the Read Partition (Query) from the primary logical unit if the secondary logical unit supports Java. In response to receipt of the Query Reply structured field from the secondary logical unit, the 3270 datastream structured field including embedded objects such as Java bytecodes is passed between the primary logical unit and the secondary logical unit. The objects that are embedded in a 3270 datastream structured field may include Java bytecodes, images and audio. Spanning may be used to send objects that exceed structured field length limits. Accordingly, Java and other objects may be integrated with legacy 3270 applications, without requiring the rewriting of legacy applications, and allowing the use of the highly developed 3270 datastream architecture.

    摘要翻译: 包括Java字节码的对象嵌入在3270数据流结构化字段中。 3270数据流结构化字段(包括如此嵌入的对象)在主逻辑单元和辅助逻辑单元之间传递,通过网络使用3270数据流架构相互通信。 初始化协议将读分区(Query)结构化字段从主逻辑单元发送到辅助逻辑单元,以查询辅助逻辑单元是否支持Java。 如果辅助逻辑单元支持Java,则辅助逻辑单元响应于从主逻辑单元接收到读分区(Query)而将查询回复结构化字段发送到主逻辑单元。 响应于从辅助逻辑单元接收到查询回复结构化字段,包括诸如Java字节码的嵌入对象的3270数据流结构字段在主逻辑单元和辅助逻辑单元之间传递。 3270数据流结构化字段中嵌入的对象可能包括Java字节码,图像和音频。 跨越可以用于发送超过结构化字段长度限制的对象。 因此,Java和其他对象可以与传统3270应用程序集成,而不需要重写旧的应用程序,并允许使用高度发展的3270数据流架构。

    Communication of objects including Java bytecodes between 3270 logical units including Java virtual machines
    2.
    发明授权
    Communication of objects including Java bytecodes between 3270 logical units including Java virtual machines 失效
    包括Java虚拟机在内的3270个逻辑单元之间的Java字节码对象的通信

    公开(公告)号:US06327624B1

    公开(公告)日:2001-12-04

    申请号:US09073424

    申请日:1998-05-06

    IPC分类号: G06F1300

    CPC分类号: G06F9/54 G06F8/76

    摘要: Java and other objects are integrated with legacy 3270 applications by sending 3270 datastream communications between a primary logical unit (LU) and a secondary LU over a network using 3270 datastream architecture and sending 3270 datastream structured fields including embedded objects such as Java bytecodes between the primary LU and the secondary LU over the network using 3270 datastream architecture. The sending of 3270 datastream communications and the sending of 3270 datastream structured fields are repeated in an arbitrary sequence, to thereby asynchronously send 3270 datastreams and objects such as Java bytecodes between the primary LU and the secondary LU over the network using 3270 datastream architecture. Thus, objects such as Java bytecodes are sent using the LU2 protocol in a manner that need not interfere with legacy communications between a 3270 application and an end user.

    摘要翻译: Java和其他对象通过使用3270数据流架构通过网络在主逻辑单元(LU)和辅助LU之间发送3270数据流通信来集成传统3270应用程序,并发送3270个数据流结构化字段,包括嵌入式对象(如主节点之间的Java字节码) LU和辅助LU通过网络使用3270数据流架构。 以任意顺序重复发送3270数据流通信和发送3270数据流结构化字段,从而通过网络使用3270数据流架构在主LU和辅助LU之间异步发送3270个数据流和诸如Java字节码的对象。 因此,诸如Java字节码的对象以不需要干扰3270应用程序和最终用户之间的传统通信的方式使用LU2协议来发送。

    Protecting secret data entry from infrared and audio eavesdropping
    3.
    发明授权
    Protecting secret data entry from infrared and audio eavesdropping 失效
    保护秘密数据输入免受红外和音频窃听

    公开(公告)号:US07362973B1

    公开(公告)日:2008-04-22

    申请号:US09396873

    申请日:1999-09-15

    摘要: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping.

    摘要翻译: 一种用于保护数据输入装置免受窃听的方法包括屏蔽由数据输入装置的用户输入数据而导致的条目的签名,以便通过窃听来减少签名的可检测性。 签名可以包括数据输入设备中的温度差异,来自用户的数据输入,并且掩蔽可以包括控制数据输入设备的外部温度以减少用户留在数据输入设备中的温差。 或者,签名可以包括从数据输入装置发射的声波,并且掩蔽可以包括从数据输入装置发射的掩蔽声波,以减少声波的可检测性。 还可以采用系统来保护数据输入到数据录入设备免受窃听。 该系统包括数据输入装置和用于屏蔽由数据输入装置的用户输入数据而导致的条目的签名的装置,以便通过窃听来减少签名的可检测性。

    PROTECTING SECRET DATA ENTRY FROM INFRARED AND AUDIO EAVESDROPPING
    4.
    发明申请
    PROTECTING SECRET DATA ENTRY FROM INFRARED AND AUDIO EAVESDROPPING 失效
    保护秘密数据进入红外和音频EAVESDROPPING

    公开(公告)号:US20110249828A1

    公开(公告)日:2011-10-13

    申请号:US13166491

    申请日:2011-06-22

    IPC分类号: H04R3/02

    摘要: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping.

    摘要翻译: 一种用于保护数据输入装置免受窃听的方法包括屏蔽由数据输入装置的用户输入数据而导致的条目的签名,以便通过窃听来减少签名的可检测性。 签名可以包括数据输入设备中的温度差异,来自用户的数据输入,并且掩蔽可以包括控制数据输入设备的外部温度以减少用户留在数据输入设备中的温差。 或者,签名可以包括从数据输入装置发射的声波,并且掩蔽可以包括从数据输入装置发射的掩蔽声波,以减少声波的可检测性。 还可以采用系统来保护数据输入到数据录入设备免受窃听。 该系统包括数据输入装置和用于屏蔽由数据输入装置的用户输入数据而导致的条目的签名的装置,以便通过窃听来减少签名的可检测性。

    PROTECTING SECRET DATA ENTRY FROM INFRARED AND AUDIO EAVESDROPPING
    5.
    发明申请
    PROTECTING SECRET DATA ENTRY FROM INFRARED AND AUDIO EAVESDROPPING 失效
    保护秘密数据进入红外和音频EAVESDROPPING

    公开(公告)号:US20090326732A1

    公开(公告)日:2009-12-31

    申请号:US12106782

    申请日:2008-04-21

    IPC分类号: G05D23/00 H04R3/02

    摘要: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping.

    摘要翻译: 一种用于保护数据输入装置免受窃听的方法包括屏蔽由数据输入装置的用户输入数据而导致的条目的签名,以便通过窃听来减少签名的可检测性。 签名可以包括数据输入设备中的温度差异,来自用户的数据输入,并且掩蔽可以包括控制数据输入设备的外部温度以减少用户留在数据输入设备中的温差。 或者,签名可以包括从数据输入装置发射的声波,并且掩蔽可以包括从数据输入装置发射的掩蔽声波,以减少声波的可检测性。 还可以采用系统来保护数据输入到数据录入设备免受窃听。 该系统包括数据输入装置和用于屏蔽由数据输入装置的用户输入数据而导致的条目的签名的装置,以便通过窃听来减少签名的可检测性。

    Methods, systems and computer program products for end-to-end route
selection in compound wide/local area networks
    6.
    发明授权
    Methods, systems and computer program products for end-to-end route selection in compound wide/local area networks 失效
    用于复合宽/局域网端到端路由选择的方法,系统和计算机程序产品

    公开(公告)号:US6097727A

    公开(公告)日:2000-08-01

    申请号:US841212

    申请日:1997-04-29

    IPC分类号: H04L12/56 H04L12/28

    CPC分类号: H04L45/04

    摘要: A route selection system, method and computer program provides a complete end-to-end communications path between an origin node and a destination node in a relatively large communications network having a number of branch networks and at least one backbone network operationally connectable to the branch network. The origin node, the destination node, or both nodes, are located in branch networks and operationally connect to standard network nodes in the backbone network by way of a branch network node. The branch network nodes may be cascaded or in parallel. The branch network node modifies the communications path selected by the standard network node. The branch network node conceals the hop between the node in the branch and itself, identifies the direction of the hop as either an uplink or a downlink, identifies itself as the control point of the resource located in the corresponding node in the branch, and includes the concealed hop information in its own tail vectors which it adds to the route. In serving the origin node, the branch network node completes the route prior to sending the route to the origin node. In serving the destination end node, the branch network node completes the route during connection setup. Connection setup may take the form of either BIND or Route Setup.

    摘要翻译: 路由选择系统,方法和计算机程序在具有多个分支网络的相对较大的通信网络中提供源节点和目的地节点之间的完整的端到端通信路径,以及至少一个可操作地连接到分支的骨干网络 网络。 源节点,目的地节点或两个节点位于分支网络中,并通过分支网络节点操作连接到骨干网中的标准网络节点。 分支网络节点可以级联或并行。 分支网络节点修改由标准网络节点选择的通信路径。 分支网络节点隐藏了分支中的节点与其本身之间的跳跃,将跳跃的方向识别为上行链路或下行链路,将其自身标识为位于分支中的对应节点中的资源的控制点,并且包括 隐藏的跳信息在其自己的尾部向量中,它添加到路由。 在服务原始节点时,分支网络节点在将路由发送到原始节点之前完成路由。 在服务目标端节点时,分支网络节点在连接建立过程中完成路由。 连接设置可能采取BIND或路由设置的形式。

    Methods, systems and computer program products for rule based firmware updates utilizing certificate extensions and certificates for use therein
    8.
    发明授权
    Methods, systems and computer program products for rule based firmware updates utilizing certificate extensions and certificates for use therein 失效
    用于基于规则的固件更新的方法,系统和计算机程序产品,使用证书扩展和证书用于其中

    公开(公告)号:US06976163B1

    公开(公告)日:2005-12-13

    申请号:US09614983

    申请日:2000-07-12

    IPC分类号: G06F17/00 G06F21/00

    CPC分类号: G06F21/572

    摘要: Methods, systems, computer program products and business methods are provided which provide or utilize updates of firmware (i.e. data stored in a programmable memory device of a processing system) based on rules provided as extensions to certificates associated with an update. Such updates may be provided by obtaining an update image corresponding to the update of the programmable memory and obtaining a certificate associated with the update image, the certificate having update application rules in at least one extension of the certificate. The certificate may be provided as part of the update image. The update application rules are extracted from the extension of the certificate and the programmable memory selectively updated based on the update image and the update application rules extracted from the obtained certificate. Certificates for use in such firmware updates are also provided.

    摘要翻译: 提供方法,系统,计算机程序产品和商业方法,其基于作为与更新相关联的证书的扩展提供的规则提供或利用固件的更新(即,存储在处理系统的可编程存储器设备中的数据)。 可以通过获得与可编程存储器的更新相对应的更新图像并获得与更新图像相关联的证书来提供这种更新,该证书在证书的至少一个扩展中具有更新应用规则。 证书可以作为更新映像的一部分提供。 根据从所获得的证书提取的更新图像和更新应用规则,从证书的扩展和可编程存储器中提取更新应用规则。 还提供了用于此类固件更新的证书。

    Enhanced directory services in compound wide/local area networks
    9.
    发明授权
    Enhanced directory services in compound wide/local area networks 失效
    在复合宽/局域网中增强目录服务

    公开(公告)号:US06032175A

    公开(公告)日:2000-02-29

    申请号:US731718

    申请日:1996-10-17

    IPC分类号: H04L29/12 G06F11/00

    CPC分类号: H04L61/00 H04L29/12009

    摘要: Enhanced directory services for large and complex compound WAN/LAN networks includes the use of resource triplet identifications including the resource identification, the identification of the domain in which the resource resides, and the identification of the access node connecting the resource to the compound network. The creation and storage of these identification triplets are automatically initiated as new resources are added to the compound network. Features include the deliberate corruption or modification of triplet identifications to allow prior art directory services to access resources in foreign networks, and the use of these corrupted vectors (as well as the contents of the WAN network topology data base) to allow route selection regardless of the size or complexity of the WAN/LAN network.

    摘要翻译: 用于大型复杂广域网/ LAN网络的增强型目录服务包括资源三重标识的使用,包括资源标识,资源所在的域的标识以及将资源连接到复合网络的接入节点的标识。 随着新的资源被添加到复合网络,这些标识三元组的创建和存储将自动启动。 特征包括故意损坏或修改三元组标识,以允许现有技术目录服务访问外部网络中的资源,以及使用这些损坏的向量(以及WAN网络拓扑数据库的内容),以允许路由选择,而不管 WAN / LAN网络的大小或复杂性。

    Methods, systems and computer program products for secure firmware updates
    10.
    发明授权
    Methods, systems and computer program products for secure firmware updates 有权
    用于安全固件更新的方法,系统和计算机程序产品

    公开(公告)号:US07069452B1

    公开(公告)日:2006-06-27

    申请号:US09614982

    申请日:2000-07-12

    IPC分类号: G06F17/00

    CPC分类号: G06F21/572

    摘要: Methods, systems and computer program products which provide secure updates of firmware (i.e. data stored in a programmable memory device of a processing system) are disclosed. Updates of a programmable memory of a device may be controlled by providing an update window of finite duration during which the programmable memory may be updated. Access to the programmable memory may be based on the state of an access latch. The access latch may be set to allow access after a hardware reset of the device. An update control program may be executed to control access to the programmable memory and the latch reset to prevent access upon completion of the update control program. Verification of the update may be provided through encryption techniques and rules incorporated in certificates for application of updates to provide for selectively updating devices. Also disclosed are methods of securely providing differing functionality to generic devices.

    摘要翻译: 公开了提供固件的安全更新(即存储在处理系统的可编程存储器件中的数据)的方法,系统和计算机程序产品。 可以通过提供可更新可编程存储器的有限持续时间的更新窗口来控制设备的可编程存储器的更新。 对可编程存储器的访问可以基于访问锁存器的状态。 访问锁存器可以被设置为允许在设备的硬件复位之后访问。 可以执行更新控制程序以控制对可编程存储器的访问和锁存器复位,以在完成更新控制程序时防止访问。 更新的验证可以通过结合在证书中的加密技术和规则来提供,以应用更新以提供选择性地更新设备。 还公开了可靠地向通用设备提供不同功能的方法。