Java runtime system with modified constant pool
    41.
    发明授权
    Java runtime system with modified constant pool 有权
    具有修改常量池的Java运行时系统

    公开(公告)号:US06792612B1

    公开(公告)日:2004-09-14

    申请号:US09646720

    申请日:2000-09-21

    IPC分类号: G06F300

    摘要: A Java runtime system is proposed which comprises a stack-based interpreter executing a program that comprises bytecodes and class structures. The system further comprises a modified constant pool with internal information of use only during linking and with external information to be preserved for late code binding. The internal information is removed from the modified constant pool after linking.

    摘要翻译: 提出了一种Java运行时系统,其包括执行包括字节码和类结构的程序的基于栈的解释器。 该系统还包括一个经修改的常量池,其内部信息仅在连接期间使用,并具有外部信息以供后期代码绑定。 内部信息在链接后从修改后的常量池中删除。

    Method and device for loading instruction codes to a memory and linking said instruction codes
    42.
    发明授权
    Method and device for loading instruction codes to a memory and linking said instruction codes 有权
    用于将指令代码加载到存储器并链接所述指令代码的方法和装置

    公开(公告)号:US06496910B1

    公开(公告)日:2002-12-17

    申请号:US09326175

    申请日:1999-06-04

    IPC分类号: G06F1200

    摘要: A method for loading instruction codes to a first memory and linking said instruction codes is proposed, whereby at least one instruction code has as parameter an address which during a loading step is not determined. This address-parametered instruction code has assigned thereto an address place. A relocation information is loaded which during a linking step effects that the address becomes determined using a starting address and a relative address offset. The then determined address is put at the address place. During the loading step, directly after loading each address-parametered instruction code with its address place, the relocation information is loaded and the address is determined in the linking step.

    摘要翻译: 提出了一种用于将指令代码加载到第一存储器并链接所述指令代码的方法,由此至少一个指令代码具有在加载步骤期间未被确定的地址的参数。 该地址参数指令码已经分配给地址位置。 加载重定位信息,在链接步骤期间,使用起始地址和相对地址偏移确定地址变为确定。 然后将确定的地址放在地址位置。 在加载步骤期间,在将每个地址参数指令代码加载到其地址之后,直接加载重定位信息,并在链接步骤中确定地址。

    METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SECURELY MANAGING FILES
    43.
    发明申请
    METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SECURELY MANAGING FILES 有权
    方法,安全设备,用于安全管理文件的系统和计算机程序产品

    公开(公告)号:US20130232584A1

    公开(公告)日:2013-09-05

    申请号:US13822137

    申请日:2011-08-08

    IPC分类号: G06F21/12

    摘要: A method, a secure device and a computer program product for securely managing files. The method includes providing a secure device, where the secure device is protected by design against malicious software or malware and adapted to establish a connection to a server via a host, the host connected to the server through a telecommunication network, upon receiving a request for using a file stored on the secure device, processing the request at the secure device according to an updated use permission associated to the file, where the updated use permission is obtained by instructing at the secure device to establish a connection between the secure device and the server via the host and updating at the device the use permission associated to the file, according to permission data sent from the server through the established connection.

    摘要翻译: 一种安全管理文件的方法,安全装置和计算机程序产品。 该方法包括提供安全设备,其中安全设备受到设计的保护,防止恶意软件或恶意软件,并且适于经由主机建立到服务器的连接,主机通过电信网络连接到服务器,在接收到请求 使用存储在所述安全设备上的文件,根据与所述文件相关联的更新的使用许可,在所述安全设备处理所述请求,其中通过指示所述安全设备建立所述安全设备与所述安全设备之间的连接来获得所述更新的使用许可, 服务器通过主机,并根据从服务器通过建立的连接发送的许可数据在设备上更新与文件相关联的使用权限。

    METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DIGITALLY SIGNING A DOCUMENT
    44.
    发明申请
    METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DIGITALLY SIGNING A DOCUMENT 有权
    方法,安全设备,用于数字签名文件的系统和计算机程序产品

    公开(公告)号:US20110247057A1

    公开(公告)日:2011-10-06

    申请号:US13074280

    申请日:2011-03-29

    IPC分类号: H04L9/32 G06F21/00

    CPC分类号: G06F21/84

    摘要: A method for digitally signing a document, a secure device, and a computer program product for implementing the method. The method employs a secure device which is protected against malicious software or malware and is adapted to establish a secure connection to a recipient via a host. The method includes: connecting to a terminal; accessing the contents of a document received by the secure device; instructing at the secure device to communicate the accessed contents to an output device other than the terminal such that the contents can be verified by a user; ascertaining at the secure device a command received to digitally sign the document; executing at the secure device the ascertained command; and instructing to send a digitally signed document to a recipient over a connection established via the host connected to a telecommunication network.

    摘要翻译: 用于对文档进行数字签名的方法,安全装置和用于实现该方法的计算机程序产品。 该方法采用安全装置,其被防范恶意软件或恶意软件,并且适于通过主机建立到接收者的安全连接。 该方法包括:连接到终端; 访问由安全设备接收的文档的内容; 指示安全设备将所访问的内容传送到终端之外的输出设备,使得内容可以由用户验证; 在安全设备处确定接收到用于对文档进行数字签名的命令; 在安全装置处执行确定的命令; 并且指示通过经由连接到电信网络的主机建立的连接将数字签名的文档发送给接收者。

    DEVICE AND METHOD FOR UPDATING CODE
    45.
    发明申请
    DEVICE AND METHOD FOR UPDATING CODE 失效
    更新代码的设备和方法

    公开(公告)号:US20100017459A1

    公开(公告)日:2010-01-21

    申请号:US12145966

    申请日:2008-06-25

    IPC分类号: G06F15/16

    摘要: The invention is directed to a method for a software provider to enable a software-acquiring entity to arrive from an existent first signed piece of code at a second signed piece of code. Both pieces of code were generated at the software provider by use of a first software archive generator under use of generation instructions. The software provider provides to the software-acquiring entity a difference code that comprises the steps necessary to arrive from the first signed piece of code at the second signed piece of code. The difference code is combinable at the software-acquiring entity with the first signed piece of code by a second software archive generator to generate the second signed piece of code. The second software archive generator is therefor to be fed with those generation instructions that were used by the first software archive generator for the generation of both pieces of code.

    摘要翻译: 本发明涉及一种用于软件提供者使得软件获取实体能够以第二签名的代码片段从现有的第一签名代码片段到达的方法。 这两个代码是通过使用生成指令使用的第一个软件归档生成器在软件提供商生成的。 软件提供商向软件获取实体提供差分代码,该差分代码包括在第二签名代码片段从第一签名代码段到达的步骤。 差分代码在软件获取实体上可由第二软件归档发生器用第一签名代码组合,以生成第二签名代码片段。 为此,第二个软件归档发生器将被馈送由第一个软件归档发生器用于生成这两个代码的那些生成指令。

    Flexibly deleting objects in a resource constrained environment
    46.
    发明授权
    Flexibly deleting objects in a resource constrained environment 有权
    灵活地删除资源约束环境中的对象

    公开(公告)号:US06272504B1

    公开(公告)日:2001-08-07

    申请号:US09289530

    申请日:1999-04-09

    IPC分类号: G06F1730

    摘要: Scheme for the distinguishing of reachable objects and non-reachable objects used by an object-based application in a system with volatile memory of limited size. The object-based application operates on n objects whereby Z objects thereof are root objects. The following steps are carried out for each root object: (a) traversing from said root object to any other object that can be reached from said root object; (b) marking all objects that were reached from said root object and storing, while marking, in said volatile memory a description of the path from said root object to the currently visited object; if the marking phase reaches an object and the respective path does not fit into said volatile memory, then this object is not marked but identified as an object which has to be processed later; and continuing the marking phase until all root objects identified as objects which have to be processed later are processed.

    摘要翻译: 用于区分由具有有限大小的易失性存储器的系统中的基于对象的应用程序使用的可达对象和不可达对象的方案。 基于对象的应用程序对n个对象进行操作,其中Z对象是根对象。 对每个根对象执行以下步骤:(a)从所述根对象遍历到可以从所述根对象到达的任何其他对象; (b)标记从所述根对象到达的所有对象,并且在所述易失性存储器中标记从所述根对象到当前访问对象的路径的描述的同时存储; 如果标记阶段到达对象并且相应的路径不适合所述易失性存储器,则该对象未被标记,但被标识为必须稍后处理的对象; 并继续标记阶段,直到所有被识别为稍后处理的对象的根对象被处理。

    MANAGEMENT OF SECRET DATA ITEMS USED FOR SERVER AUTHENTICATION
    48.
    发明申请
    MANAGEMENT OF SECRET DATA ITEMS USED FOR SERVER AUTHENTICATION 有权
    管理用于服务器认证的秘密数据项目

    公开(公告)号:US20110238994A1

    公开(公告)日:2011-09-29

    申请号:US13036445

    申请日:2011-02-28

    IPC分类号: H04L9/32

    摘要: A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to authenticate operations of the server (2). The device (6) has a user interface (13), control logic (16) and a computer interface (11) for connecting the device (6) to a local user computer (5) for communication with the remote server (2) via a data communications network (3). The control logic is adapted to establish via the user computer (5) a mutually-authenticated connection for encrypted end-to-end communications between the device (6) and server (2). In a backup operation, the secret data items are received from the server (2) via this connection. The control logic interacts with the user via the user interface (13) to obtain user authorization to backup secret data items and, in response, stores the secret data items in memory (10). To restore secret data items to the server, the control logic interacts with the user via the user interface (13) to obtain user authorization to restore secret data items and, in response, sends the secret data items to the server (2) via said connection.

    摘要翻译: 提供了一种安全装置(6),用于促进由远程服务器(2)用于认证服务器(2)的操作的密码密钥等秘密数据项的管理。 设备(6)具有用于将设备(6)连接到本地用户计算机(5)的用户接口(13),控制逻辑(16)和计算机接口(11),用于与远程服务器(2)经由 数据通信网络(3)。 控制逻辑适于经由用户计算机(5)建立用于设备(​​6)和服务器(2)之间的加密的端到端通信的相互认证的连接。 在备份操作中,经由该连接从服务器(2)接收秘密数据项。 控制逻辑经由用户界面(13)与用户交互以获得备份秘密数据项的用户授权,并作为响应将秘密数据项存储在存储器(10)中。 为了将秘密数据项恢复到服务器,控制逻辑经由用户界面(13)与用户交互以获得用户授权以恢复秘密数据项,并且作为响应,经由所述服务器(2)将秘密数据项发送到服务器(2) 连接。

    Automatic recovery of integrated circuit cards
    49.
    发明授权
    Automatic recovery of integrated circuit cards 有权
    自动恢复集成电路卡

    公开(公告)号:US06536671B1

    公开(公告)日:2003-03-25

    申请号:US09701915

    申请日:2000-12-05

    申请人: Michael Baentsch

    发明人: Michael Baentsch

    IPC分类号: G06K1900

    摘要: Integrated circuit cards comprising a microprocessor, volatile memory (RAM), non-volatile memory (ROM, EEPROM), and a power coupling device allowing external power to be supplied to the card. The integrated circuit cards further comprise failure protection device for maintaining power for a short period of time in case of a power supply failure, and a power-failure detector sensing a power supply failure. This power-failure detector triggers the transfer of information from the volatile memory to the non-volatile memory if a power supply failure is sensed. The failure protection device provides power for this transfer. The integrated circuit cards further comprise a device for setting a power supply failure indicator (PF) into the non-volatile memory if a power supply failure is sensed by the power-failure detector, in order to leave a trace that a power supply failure has occurred, where the failure protection device provides the power for setting the indicator (PF).

    摘要翻译: 集成电路卡包括微处理器,易失性存储器(RAM),非易失性存储器(ROM,EEPROM)以及允许向该卡提供外部电力的功率耦合器件。 集成电路卡还包括用于在电源故障的情况下短时间内维持电力的故障保护装置,以及感测电源故障的电源故障检测器。 如果感测到电源故障,则该电源故障检测器触发将信息从易失性存储器传送到非易失性存储器。 故障保护装置为此传输提供电源。 集成电路卡还包括用于在电源故障检测器感测到电源故障时将电源故障指示器(PF)设置到非易失性存储器中的装置,以便留下电源故障具有的痕迹 发生,故障保护装置提供设置指示灯(PF)的电源。

    Protection of sensitive information contained in integrated circuit cards
    50.
    发明授权
    Protection of sensitive information contained in integrated circuit cards 失效
    保护集成电路卡中包含的敏感信息

    公开(公告)号:US06264108B1

    公开(公告)日:2001-07-24

    申请号:US09327067

    申请日:1999-06-07

    申请人: Michael Baentsch

    发明人: Michael Baentsch

    IPC分类号: G06K1900

    摘要: An integrated circuit card comprises a shield for detecting an intrusion, a protection unit for controlling the erasure or destruction of sensitive information, and power interrupt circuitry which maintains the power if no external power is supplied. The shield informs the protection unit if an intrusion is detected and the protection unit controls the erasure or destruction of said sensitive information. The power interrupt circuitry maintains power for erasure or destruction of information if no external power is supplied.

    摘要翻译: 集成电路卡包括用于检测入侵的屏蔽,用于控制敏感信息的擦除或破坏的保护单元,以及在不提供外部电力的情况下维持电力的电源中断电路。 屏蔽通知保护单元是否检测到入侵,并且保护单元控制所述敏感信息的擦除或破坏。 如果没有提供外部电源,则电源中断电路维护用于擦除或破坏信息的电力。