Abstract: A mechanism for authenticating multiple connections to a network server is disclosed. A client establishes a first connection to the server. In establishing the first connection, the client provides authentication information and authorization information, and in response the server assigns first access privileges to the client. When the client requests a second connection, the server receives authentication information from the client, and assigns limited access privileges to the client. The server associates the first connection with the second connection and the client. The server automatically associates the first access privileges with the second connection, without requiring the client to provide authorization information for the second connection.
Abstract: A multilevel computer security system including a computer with multiple security subsystems for secure data storage and data communications at each security level, a smart-card reader for controlling user access to each security level, and an electronically-activated switch for activating only the selected and authorized security level. Access to each level of restricted data requires a user to insert his smart card into a smart-card reader. The selection of an authorized level generates an activation signal, for a selected security level and permitted computer assets for the selected security level. Since only one security level is ever active and the switching from one level to another requires the computer RAM to be powered off, there can be no possibility of user access to unauthorized data.
Abstract: A packet data filter which stores ordered rules and sequentially applies the rules to received data packets to determine the disposition of the data packet. The packet filter maintains a match count in memory which indicates the number of times each rule matched an incoming data packet. Periodically, at the initiation of a user, or based on operating parameters of the filter, the rules are automatically re-ordered based on the match count. As a result of the re-ordering, rules with higher match counts are moved earlier in the sequential evaluation order and rules with lower match counts are moved later in the sequential evaluation order. As such, rules which are more likely to match incoming data packets are evaluated earlier, thus avoiding the evaluation of later rules. In order to prevent a re-ordering which would change the overall security policy of the packet filter, pairs of rules are compared to determine if they conflict (i.e.
Abstract: A method of testing a computer system includes the steps of partitioning a physically formatted hard disk to define a whole region of the hard disk as a first partition region and a part of the first partition region as a second partition region, setting the second partition region as a boot driver, installing a test program file in the second partition region to form an original hard disk, testing the computer system using the test program file in the second partition region, erasing the second partition region overlapped with part of the first partition region, and setting the first partition region as a boot driver region. To substantially test the computer system, the program files which are installed on the first and second partition regions of the original hard disk are duplicated on other hard disks with a disk duplicating apparatus. The hard disks thus duplicated are established in computer systems, respectively.
Abstract: The present invention is a system for providing secure access and execution of application software stored on a first computer by a second computer using a communication device while a communication link is maintained between the first and second computers. More specifically, the present invention is a secure software rental system. The system enables a user in a remote location using a personal computer and a modem to connect to a central rental facility, transfer application software from the central rental facility to the remote computer, and execute the application software on the remote computer while electronically connected to the central rental facility. When the communication link between the central rental facility and the remote computer is interrupted or terminated, the application software no longer executes on the remote computer. The application software stored on the central rental facility is integrated with the header software to provide a security feature of the present invention.
Abstract: A test generator generates tests by randomly traversing a description of the interface of a program being tested, thereby generating tests that contain randomly selected actions and randomly generated data. When executed, these tests randomly manipulate the program being tested.
Abstract: A method and apparatus for detecting computer viruses comprising the use of a collection of relational data to detect computer viruses in computer files. The collection of relational data comprises various relational signature objects created from viruses. Computer files, as they are checked for viruses, are run through a process to create those relational signature objects. Those objects created from the file are then checked against the collection of relational data. Depending on the results, the file may be infected and prohibited from running on the system. The method may be performed on a single, stand-alone computer system in real time, as well as a networked machine.
Abstract: A secure commerce server system and method. A secure commerce server system includes a plurality of regions or burbs, including an internal burb and an external burb, a commerce server and an administration server. Processes and data objects associated with the administration server are bound to the internal burb. Processes and data objects associated with the commerce server are bound to the external burb. Processes bound to one burb cannot communicate directly to processes and data objects bound to other burbs. The administration server cannot be manipulated by a process bound to the external burb.
Abstract: A micro-controller integrated on a single substrate and which includes a read-only information memory for storing firmware, an address controller for performing address control, and an input port for inputting information supplied thereto from a source external to the substrate further incorporates a correcting information storage memory for receiving correcting information input thereto from the source external to the substrate through the input port and storing the correcting information upon an initialization of the micro-controller, wherein the correcting information is indicative of a modification for a defective information part stored in the read-only information storage memory, and a switching circuit for selectively switching the access by the address controller from the defective information part in the read-only information storage memory to the correcting information in the correcting information storage memory.
Abstract: An object of the invention is to perform data reading processing both when an error occurs and when no error occurs by using a memory unit using a nonvolatile semiconductor memory for storing sales data of an electronic cash register. A memory area of a nonvolatile semiconductor memory is divided into a first area and a second area. Sales data is successively written into a plurality of data records from the forefront address of the first area. Into a plurality of flag areas, flags representing whether sales data writing was normally performed or not are written. Sales data sets “C” and “E” having writing errors are newly written in two data records successively from the forefront address of the second area. Of all the data records in the first area, the three data records having no writing errors can be successively read out from the forefront address of the first area, so that data reading can be efficiently performed.
Abstract: A method and system for assessing risks associated with software systems include the steps of dynamically retrieving, from a plurality of external database systems, a set of risk factor data associated with the components of the software systems, and determining risk values of the components, respectively, based on a predefined risk model and the retrieved risk factor data. The retrieved risk factor data represents a multi-dimensional view of the potential risks associated with the components, and may include two or more of code complexities, architectural relationships, fault histories, development activities, designer profiles, component contention, and/or usage profiles of the software components. The risk model includes a set of risk relations that associate the retrieved risk factor data with the risk values of the components. The risk relations may be defined by correlating historical risk factor data with actual risk measurements of the components using statistical or other quantitative methods.
September 15, 1998
Date of Patent:
April 17, 2001
Nortel Networks Limited
Wendell Davis Jones, Stephen J. Aud, John P. Hudepohl, Martin L. Flournory, William B. Snipes, Eric C. Schutz
Abstract: A uni-direction protection switched ring node which switches from a working path to a protection path or vice versa includes a failure-information detect circuit which detects a failure occurring on the working path and a failure occurring on the protection path independently of each other as failure information. A failure-information-path identifying circuit determines whether a working path with a failure occurring thereon is an active or standby path or determines whether a protection path with a failure occurring thereon is an active or standby path. A select circuit selects either the working or protection path as an active path in accordance with results of detection and determination by the failure-information detect circuit and the failure-information-path identifying circuit respectively.
Abstract: A circuit analyzer, adapted to run in the memory of a processing system, for characterizing the performance of a circuit under test. The circuit analyzer of the present invention obviates traditional design steps by using gray and transparent circuit elements in addition to the traditional black circuit elements.
Abstract: One or more combinations of an operating data processing machine and a backup data processing machine are connected together to enable backup switching wherein the backup machine takes over the data processing from the operating machine when a failure occurs in the operating machine. In particular, each of the operating and backup machines is connected to one or several system resources, such as data storage or data output devices. The operating processor exclusively occupies the system resources, and when a failure occurs the operating processor is disconnected therefrom. A disconnection completion notice is sent to the backup processor, which then begins to exclusively occupy the system resources for performing ongoing data processing that would have been performed by the operating processor had the failure not occurred. When a failure occurs with the operating processor, the data being processed and the data concerning the failure are dumped to an auxiliary memory to facilitate analysis of the failure.
Abstract: A management system for software data in a system in which software data that is transmitted from a management center through a predetermined transmitting system can be used at a terminal. The management center transmits the software data and regulation data to regulate a use style of the software data. The terminal regulates the use of the software data on the basis of the regulation data.
Abstract: A registered information recovery processing apparatus and method in a store-and-forward type of electronic conference system, in which operation informations representing operations performed for various objects are stored is disclosed. Between information administrating devices which register and administrate the various objects, the stored operational informations are batch transmitted toward destination-information specified by information-exchange-destinations which is recorded in the information administering devices. Registered information recording devices record registered information which specifies the object registered in the information administrating devices. Recording controlling devices control recording of the registered information into the registered information recording devices.
Abstract: The present invention is a restoration scheme for an ad-hoc ATM LAN wherein ATM cells are transported over a wireless point-to-point link. A method for restoring communications in the ATM network includes the steps of: generating a failure message indicative of a failure of a network element, the failure message including an identification of said network element and a predetermined VPI/VCI reserved for failure reporting; communicating the failure message to all said switching nodes in said network; and referencing updated routing tables at said switching nodes, wherein said network element indicated in said failure message is eliminated from routes in said network. Each of the switching nodes is included in a network tree spanning all said switching nodes in the network, wherein each of the switching nodes is included as a root in a specific network tree, each said network tree having a tree identification, the failure message further including a tree identification field containing the tree identification.
Abstract: The invention relates to a system for securing protected software against unauthorized, i.e. non-licensed, use in computer networks. The difficulty in licensing of software in a network is that simultaneous and multi-use of the licensed software on several or all computers integrated in the network have to be realized. Without software protection the software producer will lose potential customers. This concerns local networks as well as so-called wide area networks which can be operated across national or continental boundaries.
Abstract: A method for enforcing a security policy for selectively preventing the downloading and execution of undesired Executable Objects in an individual workstation, comprising the steps of, (1) providing a security agent suitable to be installed in an individual workstation, said security agent being provided with means for introducing at least one marker in one or more data packet transmitted by a workstation to a server through a gateway, said at least one marker indicating that a security agent is installed in the transmitting workstation; (2) providing means in or coupled to the gateway for analyzing the first one or more data packet(s) received from a transmitting workstation initiating communication to a remote server, to determine whether said first ore or more data packet(s) comprise at least one marker indicating that a suitable security agent is installed in the transmitting workstation; (3) If at least one marker indicating that a suitable security agent is installed in the transmitting workstation is d
Abstract: A disk controlling apparatus creates sense data indicating the contents of an error and writes it into an intermediate buffer provided within the disk controlling apparatus together with the record normally read when a key portion or a data portion constituting a record is not normally read. The disk controlling apparatus searches the intermediate buffer for desired record, reads and informs an error while taking the sense data into consideration for each record. The disk controlling apparatus stores a write address in a memory at the time of writing data, and when data are normally written the write address is eliminated from the memory, while holding the address when data are not normally written. At the time of reading data, if the address which agrees with the read address is stored in the memory, the disk controlling apparatus reports an error to a host apparatus.
October 6, 1998
Date of Patent:
July 18, 2000
Tohru Kobayashi, Tadashi Kumasawa, Shoichi Murano, Jun Ishikawa, Jun Katayama