摘要:
An approach that smoothes a cryptographic function's timing footprint is presented. A processor includes a “function timing smoother” that smoothes out spikes in the amount of time that a particular cryptographic function requires to execute. When a cryptographic function executes, the function timing smoother tracks the amount of time that the cryptographic function executes (current execution time) and compares the time with the amount of time that the same cryptographic function took for a previous execution (previous execution time). When the current execution time is less than the previous execution time, the function timing smoother adds instructions or varies an execution unit's clock speed in order to increase the cryptographic function's current execution time. Using this approach, a malicious user is not able to decipher sensitive information from the cryptographic function's timing footprint.
摘要:
A system and method to smooth a cryptographic function's timing footprint is presented. A processor includes a “function timing smoother” that smoothes out spikes in the amount of time that a particular cryptographic function requires to execute. When a cryptographic function executes, the function timing smoother tracks the amount of time that the cryptographic function executes (current execution time) and compares the time with the amount of time that the same cryptographic function took for a previous execution (previous execution time). When the current execution time is less than the previous execution time, the function timing smoother adds instructions or varies an execution unit's clock speed in order to increase the cryptographic function's current execution time. Using this approach, a malicious user is not able to decipher sensitive information from the cryptographic function's timing footprint.
摘要:
An approach that smoothes a cryptographic function's timing footprint is presented. A processor includes a “function timing smoother” that smoothes out spikes in the amount of time that a particular cryptographic function requires to execute. When a cryptographic function executes, the function timing smoother tracks the amount of time that the cryptographic function executes (current execution time) and compares the time with the amount of time that the same cryptographic function took for a previous execution (previous execution time). When the current execution time is less than the previous execution time, the function timing smoother adds instructions or varies an execution unit's clock speed in order to increase the cryptographic function's current execution time. Using this approach, a malicious user is not able to decipher sensitive information from the cryptographic function's timing footprint.
摘要:
An approach for controlling lighting in a digital video stream is presented. A user loads digital content into a light tracking system. The digital content includes three tracks, which are a video track, an audio track, and a light control track. After loading, the user selects either a “partial light effect setting” or a “full light effect setting.” When the user selects a partial light effect setting, the light tracking system lowers the environmental lighting device's illumination at the beginning of the digital content's playing, and raises the environmental lighting device's illumination at the end of the digital content's playing. When the user selects a full light effect setting, the light tracking system adjusts the environmental lighting device's illumination throughout the digital content's playback, as well as lowering and raising the environmental lighting device's illumination at the beginning and the end of the movie, respectively.
摘要:
A locking digital pen system includes memory means which is available for storing user passwords for a plurality of users. When a user wishes to activate the digital pen, the user is enabled to use the digital pen to enter a password. After verification of the password, the pen is unlocked and the system associates the user with a matching digital signature certificate. When the user wishes to lock the pen, the user is enabled to actuate a button on the pen or provide an entry to a coupled computer to initiate a locking sequence. The system then disassociates the user from the digital signature certificates so the pen can no longer be used to digitally sign documents and the pen enters a locked state. In another embodiment, an authorized user may disable the unlocking function of the pen whereby the pen may not be unlocked by entry of a password but rather only when a special code is entered into the system.
摘要:
An improved method, apparatus, and computer instructions for processing outbound traffic passing through a port. This port is for a server and receives a request from a client. The request includes a universal resource identifier to a destination. A determination is made as to whether the request requires encryption using the universal resource identifier in the request. The request is sent through the port to the destination in an encrypted form, in response to a determination that the request requires encryption.
摘要:
The present invention provides a computer implemented method, system, and computer program product for selective encryption of a data transmission. A data transmission is received. When the data transmission is received, the data transmission is unmarshaled. When the transmission is unmarshaled, objects and a set of sensitive fields within the data transmission are identified by referencing a metadata database. Only the set of sensitive fields within the data transmission are encrypted to form a partially encrypted data transmission. The partially encrypted data transmission is marshaled to form a marshaled data transmission. The marshaled data transmission is transmitted to a recipient.
摘要:
A method and system for managing a multi-focus remote control session (RCS) within a computer system. A unique identifier (UserID) of each user and associated input devices are registered to the RCS. The users have shared concurrent control of a computer screen via the input devices. Responsive to selection of windows within the computer screen by the input devices, concurrently operative focus is provided to each selected window and is specific to the UserID associated with the input device that selected the window. Each selected window having focus may be accessed and manipulated by only the input devices associated with the UserID to which the focus provided to each selected window is specific. The selected windows to which focus has been provided are recording in a computer readable medium in association with the UserID specific to the selection of the windows.
摘要:
A computer implemented method and a computer usable program product for ordering a plurality of instant messages are provided. A data processing system receives at least one incoming instant message. Responsive to identifying the at least one incoming instant message as a response to at least one outgoing instant message originating from the data processing system, the data processing system associates the at least one incoming instant message with the at least one outgoing instant message to form a set of related messages. The data processing system presents the at least one incoming instant message to a first user, wherein a relationship between the at least one incoming instant message and the at least one outgoing instant message is identified.
摘要:
Methods, systems, and media are disclosed for altering the captured input within a digital pen. One embodiment includes capturing the input by the digital pen, wherein the input comprises dots and measurements. Further, the method includes modifying, within the digital pen, the input based on an attribute selected for the input, wherein the modifying produces a modified input. Such modifying may occur by conversion functions, such as to a preferred input format, e.g., Excel®spreadsheet, or a preferred stylistic format, e.g., black 12 point font, wherein the conversion functions modify the input to affect such preferences based on a position of one or more selectors located on the exterior of the digital pen. Finally, the method includes transmitting the modified input to a computer system in wireless communication, for example, with the digital pen.