摘要:
Protecting data files from being stolen or compromised in a data processing operation having stored data in a plurality of data files by receiving user requests for access to data files, determining whether said requests are unauthorized intrusions into the requested data files and, responsive to a determination that a request is an unauthorized intrusion, changing the identification of the requested data files by renaming the files. Preferably, the rename should be one which does not identify the contents of the file, i.e. the rename disguises the file contents. Then, it is also desirable that the renamed file be moved to a new “hidden” directory. In such a case, the renamed file is also assigned a covert name which indicates a covert location in the new directory. Then, there is provided a log referencing each renamed file to the covert name of the respective file so as to indicate the covert location of said file in said new directory.
摘要:
A Visual Macro Program records and replays desired actions performed by a user in creating or editing a document. The recorded actions are appended to the document as an attachment that can be replayed by a user at a later time by enabling a tag associated with the recorded actions.
摘要:
A receipt receives an electronic message from a sender, wherein said electronic message comprises at least one suggested folder name specified by the sender for the recipient to select as a folder name for filing the electronic message, wherein the at least one suggested folder name is detected by a sender computer system from a selection by the sender within a user interface of the sender computer system of the at least one suggested folder name for the electronic message and inserted into the electronic message. The electronic message is filtered to detect the at least one suggested folder name for filing the electronic message in a messaging filing directory. Responsive to the recipient selecting to file the electronic message, the electronic message is filed in at least one folder with the suggested folder name from among a plurality of folders.
摘要:
Replay attacks in an encrypted file system are prevented by generating a session key and providing the session key to one or more drive managers and an encrypted file system process. When a drive request is received by the encrypted file system process the drive request is encrypted using the generated session key. The encrypted drive request is sent to a drive manager. The drive manager attempts to decrypt the drive request using the session key. If the encrypted drive request is successfully decrypted, then the drive manager performs the requested operation. On the other hand, if the request is not decrypted successfully, then the request is not performed by the drive manager. Drive managers can include both disk device drivers and a logical volume managers.
摘要:
A method of rescinding previously transmitted e-mail messages are provided. After a sender composes an e-mail message, the message may be stored on a computing system when it is sent to the recipients. As customary, the e-mail message may contain a list of recipients to whom it is to be sent. A notification message is then generated and sent to the recipients (and to the sender) instead of the actual e-mail message. The notification message allows the recipients to automatically access the stored e-mail message. When and if the sender decides to rescind the message, the user may access the message and modify the list of recipients to exclude any number of recipients as well as to modify the text of the e-mail message. Any recipient whose e-mail address has been excluded will not be allowed to access the e-mail message.
摘要:
A system and method for dynamically adjusting or modifying the password expiration period for a given user based upon how a user accesses the password-protected resource. The tighter the physical control of how a user can access a resource results in a loosening or maintaining of the password expiration period to be a relatively long period of time, whereas the looser the physical control of how a user can access a resource results in a tightening of the password expiration period to be a relatively short period of time. The password expiration period is adjusted based on both actual usage patterns as well as variances in such usage patterns.
摘要:
A receipt receives an electronic message from a sender, wherein said electronic message comprises at least one suggested folder name specified by the sender for the recipient to select as a folder name for filing the electronic message, wherein the at least one suggested folder name is detected by a sender computer system from a selection by the sender within a user interface of the sender computer system of the at least one suggested folder name for the electronic message and inserted into the electronic message. The electronic message is filtered to detect the at least one suggested folder name for filing the electronic message in a messaging filing directory. Responsive to the recipient selecting to file the electronic message, the electronic message is filed in at least one folder with the suggested folder name from among a plurality of folders.
摘要:
A Migration Thin Virtual File System (“MTVLS”) conducts file migration using a thin virtual layer that is size selectable and provides an uninterruptible migration path from the old file system to the new file system without an increase in the time to receive data. The MTVLS selects a file from the source file system, opens a corresponding file in the target system, mounts the thin virtual layer over the source file and the target file, and migrates that data from the source file to the target file.
摘要:
A data processing system for efficiently attaching files to electronic mail message. In a multi-level hierarchical file storage system within the data processing system wherein one or more files may be active, only those files, which are active, are initially proffered as candidates for attachment in response to a user's indicated desire to attach a file to an electronic mail message. If the user fails to select an active file for attachment, the user is prompted to select a file from the multi-level hierarchical file storage system for attachment. After attachment, the electronic mail message and attachment are transmitted.
摘要:
A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.