Patent application number | Description | Published |
20090135819 | MULTICAST ENABLED WEB-BASED APPLICATION DATA DISTRIBUTION - A method, information processing unit, and computer readable storage medium, are provided for distributing data packets efficiently across a packet-based data network of information processing units and intermediate nodes. The method with an information processing unit includes receiving data and identification of destinations on a packet-based data network, the data being associated with the identification of, and destined for reception by, each of the destinations on the packet-based data network. The method sends a single copy of the data across the packet-based data network via intermediate nodes to the destinations using a reliable multicast technique, the single copy of the data being sent contained in one or more multi-cast data packets. Each multi-cast data packet includes a multi-cast indicator and one or more unicast addresses associated with one or more of the destinations on the packet-based data network. | 05-28-2009 |
20130227704 | PROCESSOR AND DATA PROCESSING METHOD WITH NON-HIERARCHICAL COMPUTER SECURITY ENHANCEMENTS FOR CONTEXT STATES - Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a context control unit that uses context identifier tags associated with corresponding contexts to control access by the contexts to context information (i.e., context states) contained in the processor's non-stackable and/or stackable registers. For example, in response to an access request, the context control unit can grant a specific context access to a register only when that register is tagged with a specific context identifier tag. If the register is tagged with another context identifier tag, the contents of the specific register are saved in a context save area of memory and the previous context states of the specific context are restored to the specific register before access can be granted. The context control unit can also provide such computer security enhancements while still facilitating authorized cross-context and/or cross-level communications. | 08-29-2013 |
20150040222 | DETECTING AND REACTING TO INAPPROPRIATE EQUIPMENT AND PROGRAMMING IN A COMPUTER SYSTEM WITHOUT GENERATING ALERTS TO UNAUTHORIZED USERS OF THE DETECTION - A method, computer program product and system of detecting changes in hardware, software, or programming of a device in a computer system by a computer in the system coupled to the device through a network, without generating alerts or alerting unauthorized users of the detection of the changes. | 02-05-2015 |
20150074392 | SECURE PROCESSING ENVIRONMENT FOR PROTECTING SENSITIVE INFORMATION - A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data. | 03-12-2015 |
20150113281 | MULTIPLE APPLICATION PLATFORM OWNER KEYS IN A SECURE OBJECT COMPUTER SYSTEM - The computer system includes a first memory to store an executable file of a first application platform owner (APO). The executable file includes an owner identification object and an encrypted secure object payload. The computer system includes a key store having one nonvolatile key slot for each of two or more APOs. Each key slot stores one or more keys of a respective APO. The computer system further includes a processor configured upon receiving the executable file to identify a first key slot in the key store corresponding with the owner identification object. The first key slot is associated with the first APO. The processor is configured to determine whether the executable file is authentic using an APO key. Furthermore the processor decrypts the encrypted secure object payload using a first key of the first APO if the executable file is determined to be authentic. | 04-23-2015 |
20150113285 | MULTIPLE APPLICATION PLATFORM OWNER KEYS IN A SECURE OBJECT COMPUTER SYSTEM - The computer system includes a first memory to store an executable file of a first application platform owner (APO). The executable file includes an owner identification object and an encrypted secure object payload. The computer system includes a key store having one nonvolatile key slot for each of two or more APOs. Each key slot stores one or more keys of a respective APO. The computer system further includes a processor configured upon receiving the executable file to identify a first key slot in the key store corresponding with the owner identification object. The first key slot is associated with the first APO. The processor is configured to determine whether the executable file is authentic using an APO key. Furthermore the processor decrypts the encrypted secure object payload using a first key of the first APO if the executable file is determined to be authentic. | 04-23-2015 |
20150161382 | SECURE GENERATION AND MANAGEMENT OF A VIRTUAL CARD ON A MOBILE DEVICE - A method, system, and/or computer program product securely generates and/or manages a virtual card on a mobile device. The mobile device receives a protected application, which initially cannot be accessed by an operating system for execution by a processor. The mobile device also receives a security object, which is used to convert the received protected application into an executable application that can be utilized by the operating system for execution by the processor. The executable application is then executed by the processor to act as a virtual card, which provides a functionality of a predefined physical electronic or magnetic-stripe card. | 06-11-2015 |
20150294095 | SECURE MANAGEMENT OF A SMART CARD - A smart card comprises: a processing circuit; a memory that contains a protected object; an activity detector that receives a signal that describes a planned activity of a person who is in physical possession of the smart card; and an activity analyzer that evaluates features of the planned activity. In response to the activity analyzer determining that a predefined risk associated with the planned activity exceeds a predetermined value, the activity analyzer: issues an instruction to the person who is in physical possession of the smart card to provide a biomarker to a biosensor that is physically contained within the smart card; and receives, from the biosensor, real-time biometric data for the person who is in physical possession of the smart card. | 10-15-2015 |