Abstract:
Provided is a secure apparatus for protecting the integrity of a software system and a method thereof. The apparatus comprises: a template repository for storing templates required for generating an agent module; a template generator for randomly selecting one template from said template repository and generating a new agent module according to the selected template; and a transceiver for sending said new agent module to an external apparatus communicating with said secure apparatus to update a current agent module which is running in said external apparatus, wherein said current agent module is used to verify the integrity of said software system running in said external apparatus. The secure apparatus can protect software in an insecure environment with a high software protection level to prevent the software from being tampered or bypassed.
Abstract:
A method and apparatus for digital rights management (DRM) with steps and means for receiving a registration request from one of a plurality of DRM agent devices requesting to register one of a plurality of user accounts and the one DRM agent device to one of a plurality of rights issuers, completing a registration process in the one rights issuer, including establishment of a relationship among the one user account, the one DRM agent device and the one rights issuer; and returning a registration completion response to the one DRM agent device. The invention provides support to the many-to-many relationships among DRM entities, such as DRM agent device, user account and rights issuer, so that the DRM system can be applied to more business modes.
Abstract:
A method for obtaining working information in software engineering is provided. The method includes generating a sensor for a software tool used in software engineering according to data storage manner of the software tool, where the sensor detects artifact change events associated with the software tool; and collecting the artifact change events from the sensor and analyzing at least one attribute of the artifact change events to obtain the working information. Also provided is an article of manufacture for carrying out the method for obtaining working information in software engineering as described in this application.
Abstract:
An apparatus, method, and computer readable article of manufacture for obtaining working information in software engineering. The apparatus includes a sensor generator, configured to generate a sensor for a software tool used in software engineering according to the data storage manner of the software tool, such that the sensor detects the artifact change events associated with the software tool; and a central analyzer, configured to collect the artifact change events from the sensor, and analyze at least one attribute of the artifact change events, thereby obtaining working information. Also provided is a method corresponding to the apparatus described above. By using the apparatus and method for the invention, it can detect artifact change events for various software tools, and based on that, obtain various kinds of desired working information, therefore helping the collaboration of a team and the implementation of a project.
Abstract:
A method and system for dynamically providing a composite source information report whenever source information of a composite object is updated. The system includes a subscription handler for receiving a subscription request and generating a subscription query, a means for determining whether source information of an element in a composite object has been edited (added, deleted and/or modified), a source information determining handler for automatically determining source information of an element in a composite object and a composite source information report generation handler for generating a composite source information report and providing the report to users. The system further comprises an authentication handler, an editing handler, an editing monitor, a source information recording handler, subscription source information retrieving handler and a server database.
Abstract:
Provided is a secure apparatus for protecting the integrity of a software system and a method thereof. The apparatus comprises: a template repository for storing templates required for generating an agent template; a template generator for randomly selecting one template from said template repository and generating a new agent template according to the selected template; and a transceiver for sending said new agent module to an external apparatus communicating with said secure apparatus to update a current agent module which is running in said external apparatus, wherein said current agent module is used to verify the integrity of said software system running in said external apparatus. The secure apparatus can protect software in an insecure environment with a high software protection level to prevent the software from being tampered or bypassed.
Abstract:
A method and system for dynamically providing a composite source information report whenever source information of a composite object is updated. The system includes a subscription handler for receiving a subscription request and generating a subscription query, a means for determining whether source information of an element in a composite object has been edited (added, deleted and/or modified), a source information determining handler for automatically determining source information of an element in a composite object and a composite source information report generation handler for generating a composite source information report and providing the report to users. The system further comprises an authentication handler, an editing handler, an editing monitor, a source information recording handler, subscription source information retrieving handler and a server database.
Abstract:
The present invention provides a method of distributing content to a plurality of clients. The method on a server begins with accessing content to be distributed to a plurality of clients and identifying a first type of content to be distributed as crucial content and identifying a second type of content to be distributed as non-crucial content. The crucial content is any content required to properly render, after a decryption process, the content. The non-crucial content is all the other content to be distributed. The crucial content is encrypted with a first encrypting key which is unique to each of the plurality of clients. The crucial content which has been encrypted is transmitted. The non-crucial content is transmitted to the plurality of clients.
Abstract:
A method, system and an article of manufacture tangibly embodying a computer readable program for protecting Web application data between a server and a client. A response created by the Web application for the client is backed up and modified by adding capturing code for capturing a user action, user data of the client, or combination thereof. The modified response is sent to the client and a request submitted by the client and the user action and/or user data captured by the capturing code is received. A verifying request is generated according to the received user action and/user data captured by the capturing code and the backup of the response. The request submitted by the client is verified according to the verifying request and the verified request is sent to the Web application of the server.
Abstract:
A method, system and an article of manufacture tangibly embodying a computer readable program for protecting Web application data between a server and a client. A response created by the Web application for the client is backed up and modified by adding capturing code for capturing a user action, user data of the client, or combination thereof. The modified response is sent to the client and a request submitted by the client and the user action and/or user data captured by the capturing code is received. A verifying request is generated according to the received user action and/user data captured by the capturing code and the backup of the response. The request submitted by the client is verified according to the verifying request and the verified request is sent to the Web application of the server.