Abstract: In a content transmitting method in a content transmitting apparatus, wherein the content transmitting apparatus adds copy control information for indicating to execute a recoding control with either one of “copy can be made only one (1) generation” or “number of times of copying is limited”, on number-limited copy target content, when distributing the number-limited copy target content, which can be copied within a region of limited number of pieces.
Abstract: A method is provided for providing, with a GPU, selective cryptographic assist to data storage operations. The method is performed by a computer, the computer having a general-purpose central processing unit (CPU) and a special-purpose processor optimized for performing vector-based calculations. The method includes (a) calculating a processing load value on the CPU as the CPU performs a set of data storage operations, (b) comparing the calculated processing load value to a threshold value, (c) if the threshold value exceeds the calculated processing load, then performing cryptographic operations related to a data storage operation of the set of data storage operations on the CPU to the exclusion of the special-purpose processor, and (d) otherwise, performing the cryptographic operations related to the data storage operation on the special-purpose processor to the exclusion of the CPU. A corresponding apparatus is also provided.
Type:
Grant
Filed:
March 30, 2011
Date of Patent:
October 29, 2013
Assignee:
EMC Corporation
Inventors:
Arun Kumar Chengottarasappan, Santhosh V. Kudva
Abstract: The present invention provides an establishment method and device for a link between an access point and a repeater in a wireless distribution system. The method comprises: starting the access point and the repeater in the wireless distribution system; the access point and the repeater transmitting an interactive message to each other, and obtaining channel information, channel encryption mode, cipher key information, and address information of an opposite end about the link between the access point and the repeater from the interactive message; the access point and the repeater establishing the link between the access point and the repeater according to the channel information, the channel encryption mode, the cipher key information, and the address information of the opposite end. The device comprises: a starting module, an interactive module, and an establishment module.
Abstract: A gateway device that is in electronic connection with at least one client computer, a first domain name system (DNS) server located in a first communication network, and a second DNS server located in a second communication network separated from the first communication network. When a domain name is transmitted to both the first DNS server and the second DNS server, the first DNS server and the second DNS server respectively resolve the domain name into two groups of internet protocol (IP) addresses, and the gateway device compares the two groups of IP addresses with each other to select one of the two groups of IP addresses that is identified as all IP addresses of which are safe, and allows the client computer to access websites within the first communication network via the selected group of IP addresses to prevent the client computer from phishing attacks.
Abstract: The cryptographic scheme subdivides time into periods with an index j=0, 1, 2, etc. A public key indicates elements u and v of a first cyclic group G1 of prime order p and, for each period j, an integer sj between 0 and p?1 and elements g1,j of the group G1 and g2,j, wj and hj of another cyclic group G2 of order p. The private key of a member of the group indicates an integer xi between 0 and p?1 and, for each period j, an element Ai,j of the group G1 such that Ai,n=[Ai,n-1/g1,n-1]1/(xi?sn) for 1?n?j. To sign a message during a period j?0, the member selects two integers ? and ? between 0 and p?1, calculates T1=u?, T2=Ai,j·v?, S1=g2,j? and S2=e(Ai,j, hj)? where e(., .) is a bilinear map of G1×G2 onto GT, and determines according to the message the data that justify the fact that the elements T1, T2, S1 and S2 are correctly formed with knowledge of the private key of the member for the period with index j.