Abstract:
A system and method improves operational performance of a computer by enhancing digital security with an added electronic circuit. The electronic circuit stores sensitive data in an un-erasable state such that the sensitive data may not be altered. The electronic circuit limits transfer of the sensitive data only once after each power-up or after each reset of the computer. The electronic circuit prevents access to the sensitive data by an authorized program. The electronic circuit utilizes its own storage medium and a random access memory, the latter of which can receive and store the sensitive data from the non-transitory computer storage medium. The method uses a software driver and a copy-of-copy of first security key obtained from the sensitive data stored on the electronic circuit. The software driver installs a software module on the computer using the copy-of-copy of first security key to encrypt each installed file.
Abstract:
A system and method improves digital security in a computer by adding an electronic circuit. The electronic circuit stores sensitive data in an un-erasable state such that the sensitive data may not be altered. The electronic circuit limits transfer of the sensitive data only once after each power-up or after each reset of the computer. The electronic circuit prevents access to the sensitive data by an authorized program. The electronic circuit utilizes its own storage medium and a random access memory, the latter of which can receive and store the sensitive data from the non-transitory computer storage medium. The method includes hosting on the computer a software driver and a copy-of-copy of first security key obtained from the sensitive data stored on the electronic circuit. The software driver is operable to install a software module on the computer using the copy-of-copy of first security key to encrypt each installed file.
Abstract:
A method and apparatus prevents hacker code from infecting an application program by requiring decryption of the application program prior to running the application program on a computer. The method includes steps of: providing a storage device that is a separate unit from components necessary to operate the computer; storing a symmetric private key on the storage device; using the symmetric private key to produce an encrypted application program upon first installation; thereafter decrypting that part of the encrypted application program needed implement a command to run the application program; precluding the computer from running any part of the application program that has not been first encrypted with the symmetric private key; and, decrypting, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program.
Abstract:
A method of three-level hosting infrastructure provides a server computer accessible to users through hosts. The hosting infrastructure includes hosting resources used by the server computer for the benefit of at least a first host. The first host then uses the hosting resources of the server computer and also hosts one or more other hosts, who may use the hosting resources through the first host. The method enables one host to be included into another host. The method enables received content at the hosting infrastructure to be hosted by two or more hosts.
Abstract:
A method and an apparatus for enciphering and deciphering content with symmetric and asymmetric cryptography with the use of the shadow numbering system where two or more shadow values are used with two or more base values with a two side equation, on one side the value to encipher is multiplied with one of the shadow value then the modulus taken with the base value, to decipher the enciphered value is multiplied with the shadow value that didn't take part of the first equation then the modulus is taken with the base value, thus, deciphering the enciphered value.
Abstract:
A virtual network resource infrastructure for hosting and managing a plurality of e-malls and each e-mall uses the virtual network resource infrastructure for offering e-commerce solution and the hosting of: e-shops, e-distributors and web sites. Also, on-line foreign language interface translation and interface exchange. Further having satellite e-malls with e-services and e-mall using satellite e-malls' e-services; user surfing tracking means and multiple sales channel where e-shops, e-malls, satellite e-malls and e-distributors sell their products directly or cross-sell each others products.
Abstract:
Two strings encryption algorithm where a long and a short string are used. The byte values of the short string points to a location of the long string and the plaintext is aligned with the long string's location and encryption is performed using the long string's byte values and the plaintext the process is repeated for all bytes of the short string pointing to the long string and aligned a byte to encrypt with the long string.
Abstract:
A method is disclosed for providing a requested contents and associated contents to a user of a client computer system. A provider's server receives a request from the client computer system to send a first object in an HTML page for display on the client computer system. The provider examines the requested first object and includes a related second object in the HTML page. The HTML page with both objects is then sent to the client computer system for display. In an alternative embodiment, the HTML page is sent to the user with code to receive and display one or more objects sent independently from a second server to the user based on the first content or on user action within the first content.
Abstract:
Two strings encryption algorithm where a long and a short strings are used. The byte values of the short string points to a location of the long string and the plaintext is aligned with the long string and encryption is performed using the long string's byte values and the plaintext the process is repeated for all bytes of the short string. The short string defines the encryption strength by pointing to the long string encrypting at first and re-encrypting thereafter. At the end, once the encryption is finished, the short key byte's values are used and once again pointing to the long string and removing a byte from the location and the removed byte(s) form a third string. The process will repeat until all the bytes values from the first string are used and a third string of equal length as of the short string is formed. Finally, the third string will perform the same process and its byte's values are used to point the long string and insert a byte of the short string into the location where they're pointing to, the process will repeat until all bytes of the short string are inserted into the long string. The long and short (third) strings are now unbalanced and the third (short) string becomes the private content's key. The reverse process is used to remove the short string, insert the third string and have two balanced string and decryption can be performed thereafter.
Abstract:
A virtual network resource infrastructure for hosting and managing a plurality of e-malls and each e-mall uses the virtual network resource infrastructure for offering e-commerce solution and the hosting of: e-shops, e-distributors and web sites. Also, on-line foreign language interface translation and interface exchange. Further having satellite e-malls with e-services and e-mall using satellite e-malls' e-services; user surfing tracking means and multiple sales channel where e-shops, e-malls, satellite e-malls and e-distributors sell their products directly or cross-sell each others products.