Arnon Amir - Saratoga CA, US Prasad Manikarao Deshpande - San Jose CA, US Savitha Srinivasan - San Jose CA, US Vladimir Zbarsky - Newark CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 3/00 G06F 9/44 G06F 9/46 G06F 13/00
US Classification:
719320, 707100, 709200, 709224
Abstract:
A method of detecting tasks performed by users wherein a single task is a sequence of web URLs invocation. Task patterns are detected in web logs to identify tasks performed by users and analyze task trends over time, across corporate divisions and geographies. A grammar-based framework is used to model and detect tasks from web log patterns. The framework has two components: a declarative unit—to generate a task grammar, and a processing unit—to detect tasks from access logs by generating a state machine for applying the task grammar to the tokens associated with the access records. By analyzing user tasks, rather than just URLs, useful business information can be extracted.
System And Method For Protecting Data In A Secure System
Julian A Cerruti - San Jose CA, US Sigfredo I Nin - Morgan Hill CA, US Dulce B Ponceleon - Palo Alto CA, US Vladimir Zbarsky - Newark CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00 H04N 7/167
US Classification:
380 42, 380259, 380260, 380239
Abstract:
A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets.
A method, computer program product, and data processing system for executing larger-than-physical-memory applications while protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault or page fault detection are disclosed. Large applications are accommodated by providing a mechanism for secure program overlays, in which a single large application is broken into two or more smaller applications (overlays) that can be executed from the same memory space by overwriting one of the smaller applications with another of the smaller applications when the latter needs to be executed. So that the data may be shared among these smaller applications, each of the applications contains embedded cryptographic keys, which may be used to encrypt or decrypt information to be stored persistently while control is transferred from one application to the other.
Invoking Externally Assisted Calls From An Isolated Environment
Masana Murase - Kawasaki, JP Masaharu Sakamoto - Yokohama, JP Kanna Shimizu - Austin TX, US Vladimir Zbarsky - Newark CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 13/28
US Classification:
711154
Abstract:
A method of invoking power processor element (PPE) serviced C library functions on a synergistic processing element (SPE) running in isolated mode. When the SPE initiates a PPE-serviced function, an SPE stub routine allocates a parameter buffer in an open area of a local store (LS) memory within the SPE. The LS memory includes an open area accessible to the PPE, and an isolated area inaccessible to the PPE. The SPE stub routine copies function parameters corresponding to the PPE-serviced function to a buffer within the open area of the LS memory, and writes a message word, which contains an identification variable of the PPE-serviced function and a location variable of the function parameters, to the open area. When execution is temporarily suspended on the SPE, the PPE reads the message word from the open area of the LS memory and executes the PPE-serviced function.
Support For Multiple Security Policies On A Unified Authentication Architecture
A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for independent developers to develop software for the herein-described platform, a “global key pair” is provided in which both the public and private keys of the pair are publicly known, so that anyone may sign an application with the global key. Such an application may be allowed to execute by including the global key pair's public key in the key ring as a “vendor key” or, conversely, it may be disallowed by excluding the global public key from the key ring.
System And Method For Protecting Data In A Secure System
Julian A. Cerruti - San Jose CA, US Sigfredo I Nin - Morgan Hill CA, US Dulce B Ponceleon - Palo Alto CA, US Vladimir Zbarsky - Newark CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00 H04N 7/167
US Classification:
380 42, 380259, 380260, 380239
Abstract:
A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets.
A method, computer program product, and data processing system provide an updateable encrypted operating kernel. Secure initialization hardware decrypts a minimal secure kernel containing sensitive portions of data and/or code into a portion of the processor-accessible memory space, from which the kernel is executed. Most system software functions are not directly supported by the secure kernel but are provided by dynamically loaded kernel extensions that are encrypted with a public key so that they can only be decrypted with a private key possessed by the secure kernel. The public/private key pair is processor-specific. Before passing control to a kernel extension, the secure kernel deletes a subset of its sensitive portions, retaining only those sensitive portions needed to perform the task(s) delegated to the kernel extension. Which sensitive portions are retained is determined by a cryptographic key with which the kernel extension is signed.
Secure Policy Differentiation By Secure Kernel Design
Masana Murase - Kawasaki, JP Masaharu Sakamoto - Yokohama, JP Kanna Shimizu - Austin TX, US Vladimir Zbarsky - Newark CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
713164, 713167, 380277
Abstract:
A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for users to execute software from independent software developers, an administrative user may disable the above-described vendor key-checking as an option.
Youtube
ICONIC CORPSE: 93 Years of Vladimir Lenin
Learn about Vladimir Lenin's spa retreats and extreme preservation. He...
Duration:
9m 43s
Lenin's Embalmers presented by Encore Theatre
Sudbury - When Boris Zbarsky and Vladimir Vorobiev, two Jewish biochem...
Duration:
1m 56s
Vladimir Rebikoff, The Bear
Dr. Alan Huckleberry, piano The University of Iowa Video Recording Pro...
Duration:
36s
Mironcikov Vladimir (Srb) vs Horskov Sergei (...
Preuzeto sa arena fight Autorska prava arena Tv.
Duration:
15m 38s
Vladimir Lenin Funeral in Moscow (1924) | War...
Vladimir Lenin, leader of the Bolsheviks who had led the October Revol...
Duration:
35s
The Preservation of Vladimir Lenin by Nur & C...
[ PLEASE ENABLE THE SUBTITLE ] This video is a final project of HIST00...