摘要:
A method, computer program product and system for reducing the boot time of a TCPA based computing system. A flash memory in the TCPA based computing system may include a register comprising bits configured to indicate whether the segments of the flash memory have been updated. The flash memory may further include a table configured to store measurements of the segments of the flash memory. The flash memory may further include a boot block code that includes a Core Root of Trust for Measurement (CRTM). The CRTM may read the bits in the register to determine if any of the segments of the flash memory have been updated. The CRTM may further obtain the measurement values in the table for those segments that store the POST BIOS code that have not been updated thereby saving time from measuring the POST BIOS code and consequently reducing the boot time.
摘要:
Provides management tools for a System Owner to assure that a personal computer system is secured against access by an unauthorized user by foreclosing the possibility of circumventing a system's security protection during an adapter ROM scan. If security function, such as that for C2 functionality, is enabled, prior to the adapter ROM Scan for the system, the POST code detects whether or not disabling of the keyboard during adapter ROM Scan is enabled. If enabled, the keyboard is disabled or locked prior to adapter ROM Scan. On some systems, the security function may not be used and, the system does not consider password protection for the adapter utilities. If however, the security functionality of the system is enabled, the POST code will continue to enable the password protection for the adapter ROM Scan. Once the input device, e.g., keyboard, is disabled the adapter ROM scan will begin. Upon completion of the adapter ROM scan, the input device will be enabled and progress will continue through POST.
摘要:
A system, method, and program product is provided that updates the firmware on a hybrid drive by reserving a memory area within the hybrid disk drive's nonvolatile memory buffer. The firmware update is then stored in the reserved memory area. The next time the platters of the hybrid disk drive spin up, the firmware update that is stored in the reserved memory area is identified. The identified update is then written to a firmware memory of a firmware that controls the operation of the hybrid drive. In one embodiment, the update is written to the firmware memory by flashing the firmware's memory. After the firmware is updated, the hybrid drive is reset. Resetting of the hybrid drive includes executing the updated firmware.
摘要:
An electronic device receives a stop position tag that indicates a stop position within first electronic content which is a first sensory type. The electronic device identifies a start position within second electronic content using the stop position tag. The second electronic content is a second sensory type that is different than the first sensory type. In turn, the electronic device executes the second electronic content at the identified start position. In one embodiment, the first sensory type is an auditory sensory type and the second sensory type is an image sensory type.
摘要:
A method, apparatus, and system are disclosed for updating firmware on a storage device. The apparatus includes a detection module and an update module. The detection module detects, during a boot sequence, an indicator of an available update of firmware controlling a storage device. The available update is stored on non-volatile storage media of the storage device. The update module updates the storage device with the available update in response to the detection module detecting the indicator of the available update.
摘要:
A method and apparatus are disclosed for sharing an integrity security module in a dual-environment computing device. The apparatus include an integrity security module, one or more processors, a detection module and a regeneration module. The one or more processors may have access to the integrity security module and may operate in two distinct operating environments of a dual-environment computing device. The detection module may detect, during an initialization sequence, a power state transition of an operating environment of the dual-environment computing device. The regeneration module may regenerate one or more integrity values from a stored integrity metric log in response to detecting the power state transition of the operating environment of the dual-environment computing device.
摘要:
An apparatus and method are disclosed for dynamically zoning a touch screen environment. The apparatus includes an identification module detecting a number of users around a perimeter of a display, a zoning module generating, via a processor, a plurality of user zones in response to the number of users detected, and a positioning module orienting a gesture zone, within each of the plurality of user zones, in relation to a corresponding user. The method includes detecting a number of users around a perimeter of a display, generating, via a processor, a plurality of user zones in response to the number of users detected, and orienting a gesture zone, within each of the plurality of user zones, in relation to a corresponding user.
摘要:
A method, apparatus, and system are disclosed for updating firmware on a storage device. The apparatus includes a detection module and an update module. The detection module detects, during a boot sequence, an indicator of an available update of firmware controlling a storage device. The available update is stored on non-volatile storage media of the storage device. The update module updates the storage device with the available update in response to the detection module detecting the indicator of the available update.
摘要:
Computer implemented method, system and computer program product for controlling software entitlement. A computer implemented method for controlling software entitlement includes receiving a request to install a software item on a designated machine. A determination is made if the designated machine is of a machine type authorized for installation of the software item. If the designated machine is of a machine type authorized for installation of the software item, a determination is made, using stored configuration data, if at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied using stored configuration data. If the at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied, installation of the software item on the designated machine is enabled in accordance with the at least one additional criterion.
摘要:
To unlock a HDD when a computer is in the suspend state, at both BIOS and the HDD a secret is combined with a password to render a new one-time password. BIOS sends its new one-time password to the HDD which unlocks itself only if a match is found. The new one-time password is then saved as an “old” password for subsequent combination with the secret when coming out of subsequent suspend states. In this way, if a computer is stolen the thief cannot sniff the bus between BIOS and the HDD to obtain a password that is of any use once the computer ever re-enters the suspend state.