摘要:
Embodiments of the present invention provide a system, method, and computer program product for updating software on an embedded computer device. According to one aspect of the present invention, a concurrent embedded application update is performed in which selected state information for one or both of an embedded virtual machine and a plurality of applets on an embedded computer device is securely exported to a host computer device. After software updates have been installed, the selected state information can be restored on the embedded computer device from which it was exported and/or it can be migrated to a second embedded computer device.
摘要:
Techniques for creating an identity document are provided. The techniques include obtaining two or more identity-linked images, deriving one or more at least partially transparent regions from one of the two or more identity-linked images, combining the two or more identity-linked images to create a combined image, and embedding authentication data into the combined image, inside the one or more at least partially transparent regions, to create an identity document.
摘要:
A method for creating entropy in a virtualized computing environment includes waking one or more samplers, each sampler having a sampling frequency; sampling a sample source with each of the one or more samplers; placing each of the samplers in an inactive state when not sampling; determining a difference between an expected value and a sampled value at each sampler; and providing a function of the difference from each of the one or more samplers to an aggregator.
摘要:
A bytecode construction, a method, and a system for optimizing just in time compilation. The bytecode includes several regions wherein a region is a logical sequence of one or more bytecode blocks and the bytecode is annotated with region hints embedded therein. The region hints have a bytecode structure and are designed for instructing a just-in-time, or JIT, runtime environment for JIT compilation of the regions by JIT compilers implemented at nodes of a network. A method and a system for implementing the bytecode construction are also presented.
摘要:
A color-based content encoding system is provided that includes providing a color-containing image from an electronic device display including a fixed pixel grid, wherein the color-containing image includes a plurality of color pixels on the fixed pixel grid, each of the color pixels having sub-pixels correlating to encoded binary data; reading the color-containing image with a scanner; and decoding the encoded binary data. In one embodiment, the plurality of sub-pixels includes three sub-pixels, wherein each sub-pixel of the three sub-pixels corresponds to a binary data value of “1” or “0”.
摘要:
A method and computer processor system with anti-tamper capability and thermal packaging structure for implementing enhanced heat removal from processor circuitry, such as, a high-performance cell processor complex, and a design structure on which the subject circuit resides are provided. The computer system includes predefined processor circuits including anti-tamper logic. A volume container substantially contains the predefined processor circuits including the anti-tamper logic. A heat spreader is provided with the predefined processor circuits within the volume container. An external heatsink structure is attached to an outside cover above the volume container. The heatsink structure includes a heatsink base and a plurality of parallel fins extending outwardly from the heatsink base. A heat pipe extending through a folded mesh is attached to the heat spreader within the volume container and is attached to the external heatsink base providing an effective heat removal path for the processor circuits.
摘要:
A method and computer processor system with anti-tamper capability and thermal packaging structure for implementing enhanced heat removal from processor circuitry, such as, a high-performance cell processor complex, and a design structure on which the subject circuit resides are provided. The computer system includes predefined processor circuits including anti-tamper logic. A volume container substantially contains the predefined processor circuits including the anti-tamper logic. A heat spreader is provided with the predefined processor circuits within the volume container. An external heatsink structure is attached to an outside cover above the volume container. The heatsink structure includes a heatsink base and a plurality of parallel fins extending outwardly from the heatsink base. A heat pipe extending through a folded mesh is attached to the heat spreader within the volume container and is attached to the external heatsink base providing an effective heat removal path for the processor circuits.
摘要:
A data processing system, which is particularly useful for carrying out modular multiplication, especially for cryptographic purposes, comprises a plurality of independent, serially connected processing elements which are provided with data in a cyclical fashion via a control mechanism that is capable of transferring data from a set of registers to earlier ones in the series of the serially connected processing elements, at the end of a predetermined number of cycles.
摘要:
Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device has memory containing security data, and security logic to use the security data to generate an authentication response to an authentication message received from the server in use. An interface device communicates with the security device. The interface device has a receiver for receiving from the user computer an authentication output containing the authentication message sent by the server to the user computer in use, and interface logic adapted to extract the authentication message from the authentication output and to send the authentication message to the security device. Includes a communications interface for connecting to the server via a communications channel bypassing the user computer. Either the security device or interface device sends the authentication response to the server via the communications channel bypassing the user computer.
摘要:
A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.