Systems and methods for management and auto-generation of encryption keys
    1.
    发明授权
    Systems and methods for management and auto-generation of encryption keys 有权
    用于管理和自动生成加密密钥的系统和方法

    公开(公告)号:US07822206B2

    公开(公告)日:2010-10-26

    申请号:US11553276

    申请日:2006-10-26

    IPC分类号: H04L9/08

    摘要: Systems, methods and media for managing and generating encryption keys are disclosed. In one embodiment, a processor executes encryption key processing computer code to receive requests for keys from an application program. The processor determines whether the requesting application program executes on a node or server that is within the scope of machines authorized to receive the requested keys. If authorized, the processor produces a key map and sends the key map to the application program, enabling the application program to access one or more keys in the key map. The keys are updated automatically according to a specifiable schedule.

    摘要翻译: 公开了用于管理和生成加密密钥的系统,方法和媒体。 在一个实施例中,处理器执行加密密钥处理计算机代码以从应用程序接收对密钥的请求。 处理器确定请求应用程序是否在被授权接收所请求的密钥的机器范围内的节点或服务器上执行。 如果授权,处理器产生一个关键图,并将该关键图发送到该应用程序,使该应用程序能够访问该关键图中的一个或多个键。 按照可指定的时间表自动更新密钥。

    SYSTEMS AND METHODS FOR MANAGEMENT AND AUTO-GENERATION OF ENCRYPTION KEYS
    2.
    发明申请
    SYSTEMS AND METHODS FOR MANAGEMENT AND AUTO-GENERATION OF ENCRYPTION KEYS 有权
    加密密钥管理和自动生成的系统和方法

    公开(公告)号:US20080101610A1

    公开(公告)日:2008-05-01

    申请号:US11553276

    申请日:2006-10-26

    IPC分类号: H04L9/00

    摘要: Systems, methods and media for managing and generating encryption keys are disclosed. In one embodiment, a processor executes encryption key processing computer code to receive requests for keys from an application program. The processor determines whether the requesting application program executes on a node or server that is within the scope of machines authorized to receive the requested keys. If authorized, the processor produces a key map and sends the key map to the application program, enabling the application program to access one or more keys in the key map. The keys are updated automatically according to a specifiable schedule.

    摘要翻译: 公开了用于管理和生成加密密钥的系统,方法和媒体。 在一个实施例中,处理器执行加密密钥处理计算机代码以从应用程序接收对密钥的请求。 处理器确定请求应用程序是否在被授权接收所请求的密钥的机器范围内的节点或服务器上执行。 如果授权,处理器产生一个关键图,并将该关键图发送到该应用程序,使该应用程序能够访问该关键图中的一个或多个键。 按照可指定的时间表自动更新密钥。

    Workstation application server programming protection via classloader policy based visibility control
    3.
    发明授权
    Workstation application server programming protection via classloader policy based visibility control 失效
    工作站应用服务器编程保护通过基于类加载器策略的可见性控制

    公开(公告)号:US08447975B2

    公开(公告)日:2013-05-21

    申请号:US11176813

    申请日:2005-07-07

    IPC分类号: G06F21/00

    CPC分类号: G06F21/52 G06F9/445

    摘要: Provided is a method for providing Java modularity class loader protection by controlling the visibility of WebSphere, service provider, library and utility code interfaces. Interface access authorization is checked once, during module and class loading to effectively protect vulnerable programming interfaces, eliminating permission checking during execution. Code in a WebSphere Application server (WAS) computing environment is categorized into a finite number of sets in which one permission type is assigned to each set and the code in each set runs at the same privilege zone. Each set exposes programming interfaces to provide functional service and code in a particular set can only access code in the same or a lower security zone set. Also provided is a technique for explicitly providing to specific modules in lower security zones access to modules or designated interfaces of modules in higher security zones.

    摘要翻译: 提供了一种通过控制WebSphere,服务提供商,库和实用程序代码接口的可见性来提供Java模块化类加载器保护的方法。 接口访问授权在模块和类加载期间被检查一次,以有效保护易受攻击的编程接口,从而消除执行期间的权限检查。 WebSphere Application Server(WAS)计算环境中的代码分为有限数量的集合,其中一个权限类型分配给每个集合,并且每个集合中的代码在相同的权限区域中运行。 每个集合暴露编程接口以提供功能服务,并且特定集合中的代码只能访问相同或较低安全区域集中的代码。 还提供了一种技术,用于向较低安全区域中的特定模块提供访问更高安全区域中的模块或模块的指定接口的技术。

    Highly scalable and highly available cluster system management scheme

    公开(公告)号:US07870235B2

    公开(公告)日:2011-01-11

    申请号:US12139116

    申请日:2008-06-13

    IPC分类号: G06F15/16 G06F12/00

    CPC分类号: G06F9/5061 G06F11/1425

    摘要: A cluster system is treated as a set of resource groups, each resource group including a highly available application and the resources upon which it depends. A resource group may have between 2 and M data processing systems, where M is small relative to the cluster size N of the total cluster. Configuration and status information for the resource group is fully replicated only on those data processing systems which are members of the resource group. A configuration object/database record for the resource group has an associated owner list identifying the data processing systems which are members of the resource group and which may therefore manage the application. A data processing system may belong to more than one resource group, however, and configuration and status information for the data processing system is replicated to each data processing system which could be affected by failure of the subject data processing system—that is, any data processing system which belongs to at least one resource group also containing the subject data processing system. The partial replication scheme of the present invention allows resource groups to run in parallel, reduces the cost of data replication and access, is highly scalable and applicable to very large clusters, and provides better performance after a catastrophe such as a network partition.

    Highly Scalable and Highly Available Cluster System Management Scheme
    5.
    发明申请
    Highly Scalable and Highly Available Cluster System Management Scheme 有权
    高可扩展性和高可用性集群系统管理方案

    公开(公告)号:US20080320113A1

    公开(公告)日:2008-12-25

    申请号:US12139116

    申请日:2008-06-13

    IPC分类号: G06F15/16

    CPC分类号: G06F9/5061 G06F11/1425

    摘要: A cluster system is treated as a set of resource groups, each resource group including a highly available application and the resources upon which it depends. A resource group may have between 2 and M data processing systems, where M is small relative to the cluster size N of the total cluster. Configuration and status information for the resource group is fully replicated only on those data processing systems which are members of the resource group. A configuration object/database record for the resource group has an associated owner list identifying the data processing systems which are members of the resource group and which may therefore manage the application. A data processing system may belong to more than one resource group, however, and configuration and status information for the data processing system is replicated to each data processing system which could be affected by failure of the subject data processing system—that is, any data processing system which belongs to at least one resource group also containing the subject data processing system. The partial replication scheme of the present invention allows resource groups to run in parallel, reduces the cost of data replication and access, is highly scalable and applicable to very large clusters, and provides better performance after a catastrophe such as a network partition.

    摘要翻译: 集群系统被视为一组资源组,每个资源组包括高度可用的应用程序及其所依赖的资源。 资源组可以具有2和M个数据处理系统,其中M相对于总集群的集群大小N是小的。 资源组的配置和状态信息仅在作为资源组成员的那些数据处理系统上完全复制。 用于资源组的配置对象/数据库记录具有标识作为资源组的成员并且因此可以管理该应用的数据处理系统的关联所有者列表。 然而,数据处理系统可以属于多个资源组,并且数据处理系统的配置和状态信息被复制到可能受主题数据处理系统的故障影响的每个数据处理系统 - 即任何数据 处理系统,其属于还包含对象数据处理系统的至少一个资源组。 本发明的部分复制方案允许资源组并行运行,降低数据复制和访问的成本,是高度可扩展的并且适用于非常大的集群,并且在诸如网络分区的灾难之后提供更好的性能。

    Integrated Security Roles
    6.
    发明申请
    Integrated Security Roles 有权
    综合安全角色

    公开(公告)号:US20080295147A1

    公开(公告)日:2008-11-27

    申请号:US12049139

    申请日:2008-03-14

    IPC分类号: G06F21/00

    CPC分类号: H04L63/102 G06F21/6236

    摘要: An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.

    摘要翻译: 介绍了一种处理集成安全角色的方法。 上游应用程序包括一个或多个对应于上游安全角色和下游安全角色的角色映射要求。 通过在下游应用程序的角色映射表中添加上游安全角色标识符,或通过向下游应用程序的角色映射表添加上游用户到角色映射来扩展上游安全角色。 当扩展上游安全角色时,分配给上游安全角色的用户可以自动访问角色映射的下游应用程序。

    Application Server Object-level Security for Distributed Computing Domains
    7.
    发明申请
    Application Server Object-level Security for Distributed Computing Domains 有权
    分布式计算域的应用服务器对象级安全性

    公开(公告)号:US20080222697A1

    公开(公告)日:2008-09-11

    申请号:US12123693

    申请日:2008-05-20

    IPC分类号: G06F21/00

    CPC分类号: G06F21/31

    摘要: Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components.

    摘要翻译: 应用服务器上的对象可以被定义为接收不同级别的安全保护的类,例如用户对象和管理对象的定义。 可以在管理对象上实施全域安全性,可以为域中的每个应用程序服务器单独配置哪些用户对象安全性。 在CORBA体系结构中,IOR对于在域范围内进行安全保护的共享对象(如管理对象)在IOR创建和导出到名称服务器期间提供了已标记组件。 之后,当客户端使用IOR时,客户机根据标记的组件调用必要的安全措施,如认证,授权和传输保护。

    Role-based access control management for multiple heterogeneous application components
    8.
    发明申请
    Role-based access control management for multiple heterogeneous application components 失效
    基于角色的多个异构应用程序组件的访问控制管理

    公开(公告)号:US20070056026A1

    公开(公告)日:2007-03-08

    申请号:US11221630

    申请日:2005-09-08

    IPC分类号: H04L9/32

    CPC分类号: G06F21/6236

    摘要: Embodiments of the present invention address deficiencies of the art in respect to access control and provide a method, system and computer program product for access control management for a collection of heterogeneous application components. In a first embodiment, a data processing system for role-based access control management for multiple heterogeneous application components can include at least one business role descriptor associating a business role with multiple, different application roles for corresponding, disparate application components. The system also can include at least one access policy associating a user with the business role. Finally, the system can include policy deployment logic include program code enabled to process the access policy to assign the user to the different application roles in the disparate application components.

    摘要翻译: 本发明的实施例解决了本领域在访问控制方面的缺陷,并提供了用于异构应用组件的集合的访问控制管理的方法,系统和计算机程序产品。 在第一实施例中,用于多个异构应用组件的用于基于角色的访问控制管理的数据处理系统可以包括将业务角色与用于相应的不同应用组件的多个不同应用角色相关联的至少一个业务角色描述符。 系统还可以包括将用户与业务角色相关联的至少一个访问策略。 最后,系统可以包括策略部署逻辑,包括能够处理访问策略的程序代码,以将用户分配给不同应用程序组件中的不同应用程序角色。

    System and method for using security levels to improve permission checking performance and manageability
    9.
    发明申请
    System and method for using security levels to improve permission checking performance and manageability 失效
    使用安全级别提高权限检查性能和可管理性的系统和方法

    公开(公告)号:US20060005019A1

    公开(公告)日:2006-01-05

    申请号:US10865348

    申请日:2004-06-10

    申请人: Ching-Yun Chao

    发明人: Ching-Yun Chao

    IPC分类号: H04L9/00

    CPC分类号: G06F21/52 G06F2221/2113

    摘要: A system and method is provided for reducing the complexity and improving the performance of enforcing security restrictions on the execution of program code in a runtime environment. In a preferred embodiment, units of executable code, such as methods or functions, are classified by “security level.” Code units belonging to a “trusted” security level may call any other code unit in the runtime environment, but other security levels are restricted in the code units they can call. Code units may also have “instance permissions” to allow them to have permission to call other individually-specified code units that they would normally be precluded from calling, due to their security level. The security level scheme described herein reduces the complexity of establishing permissions with respect to different code units in the runtime environment. This security level scheme also improves runtime performance by making it unnecessary to check individually-defined permissions in many cases.

    摘要翻译: 提供了一种系统和方法,用于降低复杂性并提高在运行时环境中执行程序代码的安全限制的性能。 在优选实施例中,诸如方法或功能的可执行代码单元被“安全级别”分类。 属于“受信任”安全级别的代码单元可以调用运行时环境中的任何其他代码单元,但是其他安全级别在他们可以调用的代码单元中受到限制。 由于代码单元的安全级别,代码单元也可能具有“实例许可”,允许他们有权调用他们通常被排除在外的其他单独指定的代码单元。 本文描述的安全级别方案降低了在运行时环境中相对于不同代码单元建立许可的复杂性。 这种安全级别方案还可以通过在许多情况下不需要检查单独定义的权限来提高运行时性能。

    System and method for using security levels to simplify security policy management
    10.
    发明申请
    System and method for using security levels to simplify security policy management 审中-公开
    使用安全级别简化安全策略管理的系统和方法

    公开(公告)号:US20050278790A1

    公开(公告)日:2005-12-15

    申请号:US10865345

    申请日:2004-06-10

    CPC分类号: G06F21/54 G06F2221/2113

    摘要: A system and method is provided for reducing the complexity and improving the performance of enforcing security restrictions on the execution of program code in a runtime environment. In a preferred embodiment, units of executable code, such as methods or functions, are classified by “security level.” Code units belonging to a “trusted” security level may call any other code unit in the runtime environment, but other security levels are restricted in the code units they can call. In a preferred embodiment, the security levels are represented by corresponding permission objects. Each permission object that is associated with a particular security level includes a numerical value that denotes that security level. Security policies can be enforced with respect to caller and callee code units by comparing numerical values of corresponding permission objects. This security level scheme also improves runtime performance by making it unnecessary to check individually-defined permissions in many cases.

    摘要翻译: 提供了一种系统和方法,用于降低复杂性并提高在运行时环境中执行程序代码的安全限制的性能。 在优选实施例中,诸如方法或功能的可执行代码单元被“安全级别”分类。 属于“受信任”安全级别的代码单元可以调用运行时环境中的任何其他代码单元,但是其他安全级别在他们可以调用的代码单元中受到限制。 在优选实施例中,安全级别由相应的许可对象表示。 与特定安全级别相关联的每个权限对象包括表示该安全级别的数值。 通过比较相应权限对象的数值,可以对呼叫者和被叫方代码单元执行安全策略。 这种安全级别方案还可以通过在许多情况下不需要检查单独定义的权限来提高运行时性能。