摘要:
A hybrid Bermudagrass cultivar, named ‘Emerald Dwarf,’ is distinguished by greater rhizome development and rooting depth in conjunction with low surface stolon development. The cultivar is especially suited to golf greens.
摘要:
A user device and method for securely sending messages to a recipient. The device and method initiate a search for a certificate needed to encrypt a message to a particular recipient prior to receiving a send instruction from the user. The device may determine when a user changes the recipients for the message and, as the user composes the message, determine whether the requisite certificates are stored locally on the device or need to be obtained from a remote source. If the certificates required are not on the device, then a search of the remote source is initiated. The detection of changes to the recipient list and the initiation of any required searches occurs prior to receipt of a send instruction from the user.
摘要:
A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device, without having to download those certificates to the computing device in their entirety. The data server is further adapted to transmit the status data to the computing device. In one embodiment, at least one status property of the certificates is verified at the data server in determining the status data. In another embodiment, additional certificate data is determined and transmitted to the computing device, which can be used by the computing device to verify, at the computing device, at least one other status property of the certificates.
摘要:
A method for preventing a recipient of an electronically transmitted message from taking at least one action in relation to the message is disclosed. The message has at least two parts with one of the parts having a higher level of security than the other part. The method includes the step of extracting information from the message. The information indicates that the higher level security part is not permitted to have the action taken on it while the other part is so permitted. The method also includes the step of preventing the higher level security part from having the action taken on it in reaction to said recipient making an offending request.
摘要:
Increasing security for a hand-held data processing device with communication functionality where such a device includes an access-ordered memory cache relating to communications carried out by the device. The hand-held data processing device has a locked state that is entered by the device receiving or initiating a trigger. On occurrence of the trigger to enter the locked state the memory cache is reordered so as to disrupt the access-ordering of the cache to obscure device traffic information and thus increase the security of the device in the locked state.
摘要:
A communication system is provided with program logic for enforcing an IT Policy specifying suitable encryption encoding levels for corresponding security classification levels (and/or encryption strengths).
摘要:
A device coupled to a smart card reader may request random data from a smart card inserted into the smart card reader, and the smart card reader may incorporate the random data into its randomness pool. A device having a source of random data may have a driver installed thereon for another device and the driver may extract random data from the source and transmit it securely over a wireless communication link to the other device. The other device, which may be a smart card reader, may incorporate the extracted random data into its randomness pool. A smart card reader may incorporate traffic received from a smart card inserted therein into its randomness pool.
摘要:
A cryptographic key is used to secure a communication link between a first device and a second device. Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link to create a hash result, and d) applying the hash function to the first cryptographic key, the second cryptographic key and the hash result.
摘要:
Different target transmit powers are determined for different wireless transmissions from a wireless device, the different transmissions having different security requirements. For example, the security requirements of a particular transmission may include a security ranking of a device to which one or more frames carried by the particular transmission are addressed. In another example, the security requirements of a particular transmission may include the confidentiality of data carried by the particular transmission.
摘要:
A system and method for verifying a digital signature on a certificate, which may be used in the processing of encoded messages. In one embodiment, when a digital signature is successfully verified in a signature verification operation, the public key used to verify that digital signature is cached. When a subsequent attempt to verify the digital signature is made, the public key to be used to verify the digital signature is compared to the cached key. If the keys match, the digital signature can be successfully verified without requiring that a signature verification operation in which some data is decoded using the public key be performed.