摘要:
A method in one embodiment includes detecting an event for a transaction on an on-board unit (OBU) of a vehicle, where the event has a trigger associated with an agent. The method also includes determining whether the transaction is authorized, identifying network credentials in an identity profile that corresponds to the agent, providing network credentials to a transaction application corresponding to the transaction, and accessing a remote network using the network credentials. Certain embodiments include selecting the network credentials from a plurality of available network credentials corresponding to the agent. In more specific embodiments, the network credentials include one or more virtual subscriber identity modules (VSIMs) of a plurality of VSIMs provisioned on the OBU. In specific embodiments, the network credentials are mapped to a combination of two or more of the agent, the transaction application, and a predefined current location of the vehicle.
摘要:
Non-Internet Protocol (IP) centric resources are accessed based on a value in the form of an IP address. This value (represented as the IP address) is converted to a non-IP address, which is to used access one or more non-IP address space resources. This value (represented as the IP address) typically includes an encoding of the non-IP address and/or an indirect reference (e.g., table index, pointer to a memory location) to the non-IP address.
摘要:
Non-Internet Protocol (IP) centric resources are accessed based on a value in the form of an IP address. This value (represented as the IP address) is converted to a non-IP address, which is to used access one or more non-IP address space resources. This value (represented as the IP address) typically includes an encoding of the non-IP address and/or an indirect reference (e.g., table index, pointer to a memory location) to the non-IP address.
摘要:
Embodiments of the present invention provide controlled access to key management servers using store and forward protocols. A computer-implemented method for providing controlled key management includes generating a request indicative of a key management function. The request is received at the first of a number of intermediate parties capable of relaying the request toward a key management server. The key management function is performed subsequent to receiving the request from the last of the intermediate parties which is authorized to provide the request to the key management server. A response to the request is then generated.
摘要:
A method for generating a pseudo-random numbers Initially, the state of a chaotic system is digitized to form a binary string. This binary string is then hashed to produce a second binary string. It is this second binary string which is used to seed a pseudo-random number generator. The output from the pseudo-random number generator may be used in forming a password or cryptographic key for use in a security system.
摘要:
Double-bypass virtualization techniques are provided to enable use of high performance computing (HPC) application in a virtualized environment. In one example, a HPC user space application running on a virtual machine obtains direct access to virtual network interface card (vNIC) on a host-computing device associated to that virtual machine. The HPC user space application is configured to transmit and/or receive one or more data frames via the vNIC while bypassing the operating system of the virtual machine and the virtual machine hypervisor of the host-computing device.
摘要:
A system and method for managing encryption keys, wherein one of more of they keys incorporates a disabled state, and wherein the system further incorporates a namespace.
摘要:
System and method for processing data for data security. A method for encrypting a data file includes a step for providing an input file, which can be characterized by an input length, and providing a number of output files that include a first output file and a second output file. The first output is characterized by a first output length. The first output length is associated with the input length and the number of output files. The first output file includes a header section and a data section. The header section includes information associated with the number. In addition, the method includes a step for determining a first location and a second location of the input file. The second location is behind the first location by a known length.