摘要:
Methods, systems and computer program products for controlling scheduling in an ATM node in a network are provided which aggregate connection information for connections to the ATM node to provide a set of aggregate connection information for the ATM node. The set of aggregate connection information is distributed to other ATM nodes in the network and may be used in accepting connections to the ATM network based on the aggregate connection information. Scheduling may be provided by associating a timestamp value in each cell associated with an accepted connection as it is received by the ATM node. Received cells are grouped into a plurality of cell groups in timestamp order based upon characteristics of the cells and cells are selected from each group so as to transmit the cells in earliest deadline first order.
摘要:
Methods, systems and computer program products for controlling scheduling in an ATM node in a network are provided which aggregate connection information for connections to the ATM node to provide a set of aggregate connection information for the ATM node. The set of aggregate connection information is distributed to other ATM nodes in the network and may be used in accepting connections to the ATM network based on the aggregate connection information. Scheduling may be provided by associating a timestamp value in each cell associated with an accepted connection as it is received by the ATM node. Received cells are grouped into a plurality of cell groups in timestamp order based upon characteristics of the cells and cells are selected from each group so as to transmit the cells in earliest deadline first order.
摘要:
Methods, systems and computer program products are provided which provide for controlling access to digital data in a file by encrypting the data with a first key, encrypting the first key with a second personal key generated from a password/passphrase associated with the file and further encrypting the encrypted first key with a control key which is managed by the system. In certain embodiments, user authentication may also be provided by issuing a ticket which is utilized to create, access and administer the files in the system.
摘要:
Methods, systems and computer program products are provided which allow for generation and authentication of RSA encrypted values by utilizing a combination of entity specific information such as biometric information and by incorporating information about the secret seeds into the cryptographic values p and q utilized to encrypt the information. Thus, authentication of an encrypted message may be achieved without requiring storage of the secret seed values utilized to generate the cryptographic values. Furthermore the present invention assures that users with different entity specific information utilize different p and q values.
摘要:
A method for protecting data for access by a plurality of users. A server encrypts data using a master key and a symmetric encryption algorithm. For each authorized user, a key encryption key (KEK) is derived from a passphrase, and the master key is encrypted using the KEK. The server posts the encrypted data and an ancillary file that includes, for each user, a user identifier and the master key encrypted according to the user's KEK. To access the data, a user enters the passphrase into a client, which re-derives the user's KEK, and finds, in the ancillary file, the master key encrypted using the user's KEK. The client decrypts the master key and then decrypts the data. A KEK may be derived from a natural language passphrase by hashing the passphrase, concatenating the result and a predetermined text, hashing the concatenation, and truncating.
摘要:
A system to exchange and authenticate public cryptographic keys between parties that share a common but secret password, using a pair of random numbers, a pair of Diffie-Hellman public keys computed from the random numbers and the password, a Diffie-Hellman symmetric secret key computed from the Diffie-Hellman public keys and the random numbers, and hashed values of arguments that depend upon these elements.
摘要:
An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information to be relatively securely and efficiently transmitted over networks without disclosure of such sensitive information at a transmitting or receiving terminal, or at points along the data transmission network.
摘要:
A method for protecting data for access by a plurality of users. A server encrypts data using a master key and a symmetric encryption algorithm. For each authorized user, a key encryption key (KEK) is derived from a passphrase, and the master key is encrypted using the KEK. The server posts the encrypted data and an ancillary file that includes, for each user, a user identifier and the master key encrypted according to the user's KEK. To access the data, a user enters the passphrase into a client, which re-derives the user's KEK, and finds, in the ancillary file, the master key encrypted using the user's KEK. The client decrypts the master key and then decrypts the data. A KEK may be derived from a natural language passphrase by hashing the passphrase, concatenating the result and a predetermined text, hashing the concatenation, and truncating.
摘要:
Methods, systems and computer program products are provide for controlling access to software is provided by the software to be controlled being divided into a first encrypted portion and a second unencrypted portion. The second unencrypted portion has access to, and may even incorporate, a first secret value and a software identification associated with a copy of the software. The first encrypted portion is encrypted with a first key value which is based on the first secret value and a second secret value. The second secret value is obtained and the first key value generated from the obtained second secret value and the first secret value. The first encrypted portion of the software may then be decrypted with the first key value. The software may be installed on a data processing system utilizing the decrypted first encrypted portion of the software.
摘要:
Methods, systems and computer program products are provided for controlling access to digital data in a file by obtaining a passphrase from a user and generating a personal key based on the obtained passphrase. A file encryption key is generated and the digital data in the file encrypted with the file encryption key to provide an encrypted file. The file encryption key is encrypted with the personal key to provide an encrypted file encryption key. A file header containing the encrypted file encryption key and associated with the encrypted file. The encrypted file and the file header associated with the encrypted file may be stored at a file server.