摘要:
A system or computer usable program product for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.
摘要:
A method for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.
摘要:
A method for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.
摘要:
A method, system or computer usable program product for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.
摘要:
Mechanisms are provided for calculating state of cryptographic objects and generating search filters for querying cryptographic objects based on the given state or on the given combination of unique states. The mechanism to calculate a state of a cryptographic object allows an application or system to resolve the current state of any cryptographic object with the following set of state altering date values: initial date, activation date, deactivation date, compromise date, and destroy date. A processing module may retrieve the state meta-data and calculate the current state of a given cryptographic object. The current state may be, for example, one of the following: unknown, pre-active, active, deactivated, compromised, destroyed, and destroyed-compromised. The mechanism to generate a search filter may generate a search query language (SQL) search filter to query for cryptographic objects using the state altering date values stored for each object.
摘要:
A system and method to provide native support in a distributed computing environment distributed file system for an operating system's extended file attributes. Such attributes remain invisible in the namespace which the operating system's distributed file system clients may access. A directory of the form .*.sub.-- for a file in DFS namespace is created for which extended attributes (EA) are required, with a subdirectory thereunder whose name is that of the file. Extended attributes are filed under this .*.sub.-- directory having filenames of the attributes' names. Provision is made for discriminating EAs and for efficiently accessing total EA size and number of critical EAs, by cumulating and storing them in an additional file under the subdirectory.
摘要:
Mechanisms are provided for calculating state of cryptographic objects and generating search filters for querying cryptographic objects based on the given state or on the given combination of unique states. The mechanism to calculate a state of a cryptographic object allows an application or system to resolve the current state of any cryptographic object with the following set of state altering date values: initial date, activation date, deactivation date, compromise date, and destroy date. A processing module may retrieve the state meta-data and calculate the current state of a given cryptographic object. The current state may be, for example, one of the following: unknown, pre-active, active, deactivated, compromised, destroyed, and destroyed-compromised. The mechanism to generate a search filter may generate a search query language (SQL) search filter to query for cryptographic objects using the state altering date values stored for each object.
摘要:
A system, apparatus and method for processing Personal InFormation EXchange Syntax (PFX) objects in a data processing system is presented. The PFX object may be formatted, i.e. may maintain a syntax, as defined by PKCS (Public Key Cryptography Standard) standards, and in particular PKCS #12. A PFX object utility allows a user to view and edit the contents of data objects embedded within a PFX object via a graphical user interface. Graphical objects represent the data objects embedded within a PFX object. A user may drag and drop objects onto other objects within the PFX object, and the PFX object utility automatically performs the necessary operations.