Patent application number | Description | Published |
20080250246 | Method for Controlling Secure Transactions Using a Single Multiple Dual-Key Device, Corresponding Physical Deivce, System and Computer Program - A device is provided for controlling secure transactions using a physical device held by a user and bearing at least one first pair of asymmetric keys, including a first device public key and a first corresponding device private key. The control includes, prior to implementing the device, certifying a first device public key and characteristics data of the physical device by signing with a first certification key, delivering a factory certificate, after verifying that the device private key is housed in a tamper-proof zone of the physical device. At least one second pair of asymmetric keys is generated, including a second device public key and a second device private key housed in a tamper-proof zone of the device. A second device public key is certified by signing with at least the first device private key, delivering a provisional certificate. The factory and provisional certificate are verified using, respectively, a second certification key corresponding to the first certification key, and the first device public key. In case of positive verification, the method includes delivering by a trusted third party a device certificate corresponding to the signature by the provider at least the second device public key and an identifier of the user and the characteristic data of the device. | 10-09-2008 |
20080270798 | Anonymous Authentification Method - An authentication method based on an encryption algorithm with a secret key. According to the invention, the anonymity of the entity being authenticated is guaranteed, so that only a legitimate authentication entity may recognize the identity of the entity which is being authenticated. | 10-30-2008 |
20080292104 | Recovery of Expired Decryption Keys - At least one expired decryption key intended to be used for asymmetrical decryption of encrypted data is recovered in a terminal after generation of a cryptographic encryption key/decryption key pair stored in a cryptographic medium such as a microchip card. The expired decryption key is stored in a database accessible to a user of the terminal and encrypted beforehand as a function of the new generated encryption key. In the terminal connected to the cryptographic medium, the encrypted expired encryption key is decrypted as a function of the decryption key stored in the cryptographic medium so that the encrypted data is decrypted as a function of the thus decrypted expired decryption key. | 11-27-2008 |
20090019282 | Anonymous authentication method based on an asymmetic cryptographic algorithm - A method for authenticating at least one client entity (A) by means of an authentication entity (B) based on a public key encryption (ASYM(PB,R))/decryption (ASYM(SB,R′)) algorithm, implemented on the client entity side and authentication entity side, respectively, including, on the client entity side:
| 01-15-2009 |
20090106548 | METHOD FOR CONTROLLING SECURED TRANSACTIONS USING A SINGLE PHYSICAL DEVICE, CORRESPONDING PHYSICAL DEVICE, SYSTEM AND COMPUTER PROGRAM - A method is provided for controlling secure transactions using a physical device held by a user and bearing at least one pair of asymmetric keys, including a device public key and a corresponding device private key. The method includes, prior to implementing the physical device, certifying the device public key with a first certification key of a particular certifying authority, delivering a device certificate after verifying that the device private key is housed in a tamper-proof zone of the physical device; verifying the device certificate by a second certification key corresponding to the first certification key; and in case of a positive verification, registering the user with a provider delivering a provider certificate corresponding to the signature by the provider of the device public key and an identifier of the user. | 04-23-2009 |
Patent application number | Description | Published |
20100042752 | REMOTE MANAGEMENT OF STORAGE CONTROLLERS - A method for data storage includes accepting a management command by a first storage controller, which exchanges data for storage with at least a second storage controller over a dedicated communication connection using a dedicated storage protocol. The management command is addressed to a destination storage controller and contains an instruction to modify or report a data storage configuration in the destination storage controller. Upon determining that the destination storage controller is different from the first storage controller, the management command is forwarded over the dedicated communication connection from the first storage controller to the second storage controller using the dedicated storage protocol. | 02-18-2010 |
20100318780 | HIERARCHICAL SERVICES STARTUP SEQUENCING - Exemplary methods, system, and computer program product embodiments for managing services within a data storage subsystem using a processor in communication with a memory device during a startup sequence are provided. At least one service facilitated by a provider is provided. At least one requirement is linked to the at least one service. The at least one service and the at least one requirement are incorporated into a specification file. A directed acyclic graph, interrelating the at least one service and an additional service based on the at least one requirement, is constructed. The directed acyclic graph is traversed using an initialization process to generate a determination which of an available plurality of services to provide. The determination further includes an analysis of the which of the available plurality of services to provide in view of at least one hardware resource in the data storage subsystem. | 12-16-2010 |
20120096250 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 04-19-2012 |
20120096252 | PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A method includes storing, to a volatile memory coupled to a processor executing a first operating system kernel, a planned system configuration, and tagging the planned system configuration. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters. | 04-19-2012 |
20120239922 | PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A planned system configuration is stored to a volatile memory coupled to a processor executing a first operating system kernel. The planned system configuration is tagged. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters. | 09-20-2012 |
20120246455 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 09-27-2012 |
20140372746 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 12-18-2014 |