摘要:
A method, article, and system for providing an effective implementation of a data structure comprising instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines specific key management policies that are permitted when an application program employs the trusted block in application programming interface (API) functions to generate or export symmetric cryptographic keys. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways or with unintended keys.
摘要:
A method, article, and system for providing an effective implementation of data structures, and application programming interface (API) functions that allow secure execution of functions behind a secure boundary. The controlling mechanism is a flexible, extendable, and non-forgeable block that details how values and parameters behind the secure boundary can be changed. The invention allows for one entity to execute a security function that will normally require extensive authorizations or dual or multiple control. The method and system comprise instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines security policies that are permitted when an application program employs the trusted block in APIs. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways.
摘要:
A method, article, and system for providing an effective implementation of a data structure comprising instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines specific key management policies that are permitted when an application program employs the trusted block in application programming interface (API) functions to generate or export symmetric cryptographic keys. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways or with unintended keys.
摘要:
A method, article, and system for providing an effective implementation of data structures, and application programming interface (API) functions that allow secure execution of functions behind a secure boundary. The controlling mechanism is a flexible, extendable, and non-forgeable block that details how values and parameters behind the secure boundary can be changed. The invention allows for one entity to execute a security function that will normally require extensive authorizations or dual or multiple control. The method and system comprise instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines security policies that are permitted when an application program employs the trusted block in APIs. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways. This trusted block controls the critical values or parameters behind the secure boundary. Cryptographically secured data structures are provided that allow for breaking up the instructions in the trusted blocks in a number of steps without reducing the level of security. Systems that make use of the trusted block must provide two API functions; one that encapsulates the block under at least dual control, and one that process the instructions or rules in the trusted block. In particular the invention provides a method, article, and system for the effective implementation for securely transferring symmetric encryption keys to remote devices, such as Automated Teller Machines (ATMs), PIN entry devices, and point of sale terminals. It may also be used to exchange symmetric keys with another cryptographic system of any type, such as a Host Security Module (HSM) in a computer server.
摘要:
The present invention is directed to isoindolinone compounds which are useful as therapeutic agents for the treatment of central nervous system disorders associated with phosphodiesterase 10 (PDE10). The present invention also relates to the use of such compounds for treating neurological and psychiatric disorders, such as schizophrenia, psychosis or Huntington's disease, and those associated with striatal hypofunction or basal ganglia dysfunction.
摘要:
Content returned by a search query is specific to a version of a product installed on or associated with the computer system requesting the search. Upon receipt of the search query, a search system accesses a persistent descriptor corresponding to a detected version of the product. The persistent descriptor may be a cookie file stored on the requesting computer system. A product detection module interrogates the computer system to identify the associated products, including the particular versions of those products. The search of a repository of general content related to the product is scoped using the persistent descriptor as a search filter in order to provide version-specific content.
摘要:
Embodiments of the present invention relate to methods and apparatuses for providing, processing, and/or servicing a mortgage loan having one or more exercisable options. For example, in some embodiments, a method is provided that includes storing, in a non-transitory computer-readable medium, one or more terms of an exercisable option, where the option is incorporated into a mortgage loan, where exercising the option results in one or more terms of the mortgage loan being modified, and where one or more terms of the option are based at least partially on a non-mortgage relationship between a borrower associated with the mortgage loan and a lender associated with the mortgage loan.
摘要:
A system for mounting a sign to a vehicle includes a bar connected to the vehicle. A clamp assembly includes first and second jaw members adapted to frictionally engage the bar between the first and second jaw members. At least one structural member supports the first and second jaw members. A sign assembly includes a support frame having the at least one structural member connected to the support frame. A frame member is slidably received by and releasably engaged to the support frame. A sign connected to the frame member is adapted to be positioned in each of a stowed and a deployed position.
摘要:
A method, an apparatus, a system, and a computer program product is presented for virtualizing trusted platform modules within a data processing system. A virtual trusted platform module along with a virtual endorsement key is created within a physical trusted platform module within the data processing system using a platform signing key of the physical trusted platform module, thereby providing a transitive trust relationship between the virtual trusted platform module and the core root of trust for the trusted platform. The virtual trusted platform module can be uniquely associated with a partition in a partitionable runtime environment within the data processing system.
摘要:
A method, an apparatus, a system, and a computer program product is presented for virtualizing trusted platform modules within a data processing system. A virtual trusted platform module along with a virtual endorsement key is created within a physical trusted platform module within the data processing system using a platform signing key of the physical trusted platform module, thereby providing a transitive trust relationship between the virtual trusted platform module and the core root of trust for the trusted platform. The virtual trusted platform module can be uniquely associated with a partition in a partitionable runtime environment within the data processing system.