摘要:
A computer system includes a first storage area accessible by an operating system and a second storage area accessible by authorized functions only. According to some embodiments of the invention at least one protected storage area is implemented into the second storage area, wherein the operating system installs at least one secret key and/or at least one customized processing function into regions of the at least one protected storage area, wherein the operating system transfers data and/or parameters to process into regions of the at least one protected storage area, wherein the operating system selects one of the customized processing functions to execute, wherein the selected customized processing function is executed and accesses storage regions of the at least one protected storage area to process the data and/or parameters, and wherein resulting process data is read from the at least one protected storage area.
摘要:
An improved computer system comprising a first storage area accessible by an operating system and a second storage area which is accessible by authorized functions only is disclosed. According to the invention at least one protected storage area is implemented into the second storage area, wherein the operating system installs at least one secret key and/or at least one customized processing function into regions of the at least one protected storage area, wherein the operating system transfers data, and/or parameters to process into regions of the at least one protected storage area, wherein the operating system selects one of the customized processing functions to execute, wherein the selected customized processing function is executed and accesses storage regions of the at least one protected storage area to process the data and/or the parameters, and wherein resulting process data is read from the at least one protected storage area.
摘要:
A computer program product for integrated key serving is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes using a smart card of two or more smart cards with a support element of two or more support elements to create an encryption key and storing the encryption key in an encrypted file that can only be decrypted by the smart card and the support element used to create the encryption key.
摘要:
A computer program product for integrated key serving is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes using a smart card of two or more smart cards with a support element of two or more support elements to create an encryption key and storing the encryption key in an encrypted file that can only be decrypted by the smart card and the support element used to create the encryption key.
摘要:
A coupling facility is coupled to one or more other coupling facilities via one or more peer links. The coupling of the facilities enables various functions to be supported, including the duplexing of structures of the coupling facilities. Duplexing is performed on a structure basis, and thus, a coupling facility may include duplexed structures, as well as non-duplexed or simplexed structures.
摘要:
Heuristics are employed to dynamically determine whether a given request is to be driven synchronously or asynchronously. The average synchronous service time associated with previously processed requests is monitored and used, in real-time, along with other information, to determine whether the given request is to be driven synchronously or asynchronously.
摘要:
The present invention uses feedback to determine the size of an object cache. The size of the cache, (i.e., its budget), varies and is determined based on feedback from the persistent object system. Persistent objects are evicted from the cache if the storage for persistent objects exceeds the budget. If the storage is less than the budget then persistent objects in the heap are retained while new persistent objects are added to the cache.
摘要:
The invention creates a self-contained executable application. A compiler compiles an application including main source code and initialization code to generate a list of objects needed for execution of the application. A processing device executes the compiled application to cause the initialization code to load the listed objects as persistent objects into a single persistent store. The processing device then stabilizes the persistent store to create the self-contained executable application which appears to a user as a single executable file.
摘要:
A method of distributing cryptographic keys includes determining functional keys of domain-specific cryptographic service provider (DCSP); providing the functional keys to a fused cryptographic API (FCAPI) provided on a first computing device; encoding the functional keys with key encoding keys to produced encoded keys, the encoded keys including wrap or unwrap restrictions; receiving the encoded keys at a second computing device; unwrapping each encoded key until a first functional key is discovered, the first functional key having not including a wrap template; and providing the first functional key to the DCSP on at the computing device.
摘要:
A downdraft exhaust cutting and shuttle table mechanism includes a cutting area and a loading area, which includes first and second elongated, horizontally disposed cutting tables which are shuttled into and out of a cutting area which includes a material cutting assembly positioned therein, the shuttle table mechanism including horizontal and vertical table movement devices which are operative to move the first and second cutting tables forwards and backwards between the cutting area and a loading area generally adjacent thereto and a vertical table movement device operative to move the first and second cutting tables upwards and downwards, the vertical and horizontal table movement devices cooperating to move each of the first and second cutting tables from a loading position generally horizontally forwards into the cutting area for cutting of material mounted thereon then generally horizontally backwards into the loading area to a position generally underneath the other of the cutting tables which has been lifted into the elevated loading position, thereby cycling the first and second cutting tables to alternate use of each.