摘要:
A method of labelling an article, including a) choosing a first character string comprising an identification number chosen to represent an article or a given class of articles, the character string comprising two or more characters, b) expressing each character in said character string as a binary number having seven or more binary digits, c) storing a sequence of binary numbers corresponding to said character string in a data store, and d) attaching the data store to, or incorporating the data store in, an article. The sequence of binary numbers is preferably generated by multiplication of the identification number by an integer, followed by conversion of the resultant number into a base 84 number. The data store preferably comprises anisotropic magnetic particles having a permanent non-random orientation in predetermined spaced regions.
摘要:
Method and system aspects for automated generation and distribution of certificates in a computer network of computer systems are described. These aspects include generating a request by a first computer system for a certificate from a second computer system, and responding to the request in the second computer system by automatically generating the certificate and distributing the certificate to the first computer system. Further, generating a request includes issuing a POST/CERTREQ request, and sending a self-signed certificate from the first computer system to the second computer system using HTTP. Automatically generating the certificate includes sending a sequence of certificates to the first computer system, the sequence of certificates including the newly generated certificate of the first computer system with a signature from the second computer system and a self-signed certificate from the second computer system.
摘要:
A method, system, and computer program product for using a digital certificate to access legacy host applications and/or data which are protected by a host-based security system such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation) and which typically require a separate user identification and password. Use of the present invention enables the client to access the host applications and/or data using a single system log on, without requiring modification to host programs.
摘要:
When information about an encrypting/decrypting method is received, it is complied with a library. A mapping data object that represents the structure of the circuit is generated. The mapping data object is written to a programmable logic device/unit. When the programmable logic device/unit is used for an encrypting/decrypting circuit, an encrypting/decrypting system that can flexibly change an algorithm at high speed can be accomplished.
摘要:
A computer system and method manages encryption keys for data. The system and method generates a session key and encrypts given data with the session key. The system and method generates a key encryption key based on a secret initial vector, or password. The session key is encrypted using the key encryption key. The encrypted data and the encrypted session key are then interleaved according to a set of indices created by a one-way transform. The one-way transform takes as its input the initial vector, the length of the encrypted session key and the length of the encrypted data. The data is recovered by a party knowing the initial vector using the one-way transform to determine the location of the encrypted session key in the interleaved data. The session key is decrypted which allows the data to be decrypted.
摘要:
To provide a method and a system for creating a mini time key from a time key, a plurality of mini time keys are created within a unit time period. First, a unit time decryption key is prepared immediately after the unit time is created. Then, the last mini time key is created by applying a one-way function to the unit time decryption key. A desired mini time key is created by applying the one-way function to a mini time key following the desired mini time key. In other words, the mini time keys are created as a timed series arranged in a descending order beginning with the last mini time key. In this manner, even when a specific mini time key is externally leaked for a specific reason, a following mini time key in a timed series can not be created by using this mini time key. In addition, even when the mini time keys are sequentially published, the security of the unit time decryption key is maintained.
摘要:
A data processing system, method, and program are described for monitoring the security of an operating system being executed by the data processing system. A plurality of security requirements are established for utilizing the operating system. A plurality of system parameters are established. And, a plurality of user values are established for each user of the operating system. A determination is made regarding whether each of the plurality of security requirements is met. This determination is made utilizing the plurality of system parameters and the plurality of user values for each user of the operating system. The operating system is deemed to be secure when all of the plurality of security requirements are met. A notice of a security breach is generated in response to a determination that one or more of the plurality of security requirements is not met. A suggested correction is provided for correcting the security breach.
摘要:
The present invention is apparatus and method for encoding, decoding, and encoding and decoding security information in a Musical Instrument Digital Interface (MIDI). In order to perform encoding, musical information and security information are received. The musical information is encoded to generate a plurality of MIDI events. The security information is encoded to generate a plurality of MIDI events of a selected standard type of MIDI event, the generated MIDI events being overrun events that have no effect on a musical output. The generated MIDI events are transmitted. In order to perform decoding, the transmitted MIDI events are received. The plurality of MIDI events encoding security information are detected among the received MIDI events and the plurality of MIDI events encoding security information are decoded to recover the security information.
摘要:
The present invention relates to a method and an arrangement for performing secure transactions during an information dialogue between a mobile terminal and a WAP server in a mobile network. The dialogue is made by using USSD. According to the invention there is provided a SAT application on the SIM card of the terminal that signs and encrypts data which are to be transferred in a secure way.
摘要:
An electronic rights management and authorization system to account for the dynamic, multi-dimensional, and granular nature of rights. A database structure divides works and rights into two related tables. A works table includes information sufficient to identify works managed by the system, while a rights table identifies a right associated with a work and includes one or more date fields delimiting the right. The rights table may also include type of use information. Additional tables, such as a work relation table, a party table, or an order table, may be provided. Software is used to manage and to query the database structure. The system has broad applicability to intellectual, real, and personal property; contract management; and similar items. The system may be implemented in standalone mode, through the client/server model of computing, or over the Internet.