摘要:
A system, computer program product and computer-implemented method of dynamically adding a best suited application server to a cluster of application servers are provided. To do so, a history of quality of service (QoS) of a plurality of application servers is maintained. Using the history of QoS, an application server is dynamically selected and added to the cluster when the cluster is under a heavy workload. The selected application server is one that has the most historically favorable QoS and a heavy workload is one that exceeds a user-configurable threshold.
摘要:
A system, computer program product and computer-implemented method of dynamically adding a best suited application server to a cluster of application servers are provided. To do so, a history of quality of service (QoS) of a plurality of application servers is maintained. Using the history of QoS, an application server is dynamically selected and added to the cluster when the cluster is under a heavy workload. The selected application server is one that has the most historically favorable QoS and a heavy workload is one that exceeds a user-configurable threshold.
摘要:
A user device and method for securely sending messages to a recipient. The device and method initiate a search for a certificate needed to encrypt a message to a particular recipient prior to receiving a send instruction from the user. The device may determine when a user changes the recipients for the message and, as the user composes the message, determine whether the requisite certificates are stored locally on the device or need to be obtained from a remote source. If the certificates required are not on the device, then a search of the remote source is initiated. The detection of changes to the recipient list and the initiation of any required searches occurs prior to receipt of a send instruction from the user.
摘要:
A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device, without having to download those certificates to the computing device in their entirety. The data server is further adapted to transmit the status data to the computing device. In one embodiment, at least one status property of the certificates is verified at the data server in determining the status data. In another embodiment, additional certificate data is determined and transmitted to the computing device, which can be used by the computing device to verify, at the computing device, at least one other status property of the certificates.
摘要:
A method for preventing a recipient of an electronically transmitted message from taking at least one action in relation to the message is disclosed. The message has at least two parts with one of the parts having a higher level of security than the other part. The method includes the step of extracting information from the message. The information indicates that the higher level security part is not permitted to have the action taken on it while the other part is so permitted. The method also includes the step of preventing the higher level security part from having the action taken on it in reaction to said recipient making an offending request.
摘要:
Increasing security for a hand-held data processing device with communication functionality where such a device includes an access-ordered memory cache relating to communications carried out by the device. The hand-held data processing device has a locked state that is entered by the device receiving or initiating a trigger. On occurrence of the trigger to enter the locked state the memory cache is reordered so as to disrupt the access-ordering of the cache to obscure device traffic information and thus increase the security of the device in the locked state.
摘要:
A communication system is provided with program logic for enforcing an IT Policy specifying suitable encryption encoding levels for corresponding security classification levels (and/or encryption strengths).
摘要:
A device coupled to a smart card reader may request random data from a smart card inserted into the smart card reader, and the smart card reader may incorporate the random data into its randomness pool. A device having a source of random data may have a driver installed thereon for another device and the driver may extract random data from the source and transmit it securely over a wireless communication link to the other device. The other device, which may be a smart card reader, may incorporate the extracted random data into its randomness pool. A smart card reader may incorporate traffic received from a smart card inserted therein into its randomness pool.
摘要:
A cryptographic key is used to secure a communication link between a first device and a second device. Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link to create a hash result, and d) applying the hash function to the first cryptographic key, the second cryptographic key and the hash result.
摘要:
Different target transmit powers are determined for different wireless transmissions from a wireless device, the different transmissions having different security requirements. For example, the security requirements of a particular transmission may include a security ranking of a device to which one or more frames carried by the particular transmission are addressed. In another example, the security requirements of a particular transmission may include the confidentiality of data carried by the particular transmission.