摘要:
A method and apparatus for saving, retrieving, and adjusting metering data uses information about the period between saves of the metering data to non-volatile memory and other information, for example, a number of recovery events experienced by the computer. The retrieved metering data may be adjusted according to the number of recovery events so that more frequent power interruptions cause metering data adjustments to favor a service provider. The time between data saves may be altered to increase the difficulty of timing attacks. Information about the time between saves, or the period of the save cycle, may also be stored with the metering data for use in the metering data restoration process.
摘要:
To enforce contractual usage terms on an electronic device, such as a computer, a security function or circuit may consume all the devices processing power except enough to run a restoration program. The security function may provide problems or challenges for the processor to solve that are designed to consume all but a fraction of the processors compute power. Another embodiment occupies nearly all the device's system memory with a pattern and requires the device to respond to requests related to the memory contents. Both approaches place time limits on the response to help ensure the resource allocations are not being avoided. The security circuit may reset the computer when an incorrect or when no response is received within the time limit.
摘要:
A computer is architected so that a monitoring and enforcement of an operating policy is carried out at an interface circuit that transmits data between a processor and one or more function blocks. The function blocks may include system memory, a display, a network, a USB port, or a non-volatile memory. Since the interface circuit handles every transaction between the processor and its supported function blocks, the interface circuit is an effective point at which to enforce limited performance modes when the computer's usage is not in compliance with the operating policy.
摘要:
An electronic device, such as, a computer, may be adapted for self-monitoring for compliance to an operating policy. The operating policy may specify a pay-per-use or subscription business model and measurements associated with compliant usage. A secure execution environment may measure usage in accordance with the business model as well as monitor and enforce compliance to the operating policy. To increase the difficulty of attacking or otherwise disabling the secure execution environment, elements of the secure execution environment may be distributed. The distribution points may include other functional elements of the computer, such as interface circuits, or may even be remotely located over a network. An implementation method for disaggregating the secure execution environment is also disclosed.
摘要:
A backup broker maintains a list of destination computers that may be ranked according to ability to satisfy quality service requires corresponding to data backup. When a source computer requests that any target file be backed up, the backup broker indicates one or more destination computers meeting a designated quality of service selection. An agent on the source computer encrypts and optionally segments a backup file to form the target file. The agent may then send the file to the backup broker or directly to the destination computer or computers. The backup broker may also periodically test potential and active destination computers to confirm their ability to maintain a designated service level. The backup broker charges for backup according to the requested quality of service selection. The backup broker compensates the destination computer based on its ability to provide consistent service levels and corresponding to the amount of data actually stored.
摘要:
A computer network firewall or network filter functions normally to pass data on open ports to a respective service or data source associated with an open port. In addition, traffic arriving on closed ports may be directed to a handler for analysis and response. The handler may analyze and catalog the source and type of traffic arriving on the closed ports. The handler may then send a response with either a fixed response or data tailored to the type and nature of the traffic. The handler may respond slowly to cause the source of the traffic to wait for the response, thereby slowing the speed at which a potential attacker can identify valid targets and proceed past non-valid targets.
摘要:
A computer participates in a system for licensing use in a metered fashion using individual licenses cryptographically linked to the computer and a particular service provider or underwriter. The computer may have a cryptographic unit, secure memory, sanction and metering functions as part of a secure execution environment for enabling metered operation and conformance to a security policy. Payment for licenses may be made through a payment system with licenses generated at a server with access to cryptographic functions for verification of requests, certificate/key pair generation, and signing licenses.
摘要:
A method and apparatus for assuring delivery of paid advertising to a user may involve asking a question about an advertisement or requiring data about the advertisement to be entered. In one embodiment, a human presence indicator, such as stylized letters, may be displayed during or after the presentation of an advertisement to be copied by a user to indicate presence during the advertisement. When the challenge relating to ad viewing is correctly answered, a value associated with viewing the ad may be credited to a user account, either locally or at a clearinghouse or other repository.
摘要:
A method and apparatus for saving, retrieving, and adjusting metering data uses information about the period between saves of the metering data to non-volatile memory and other information, for example, a number of recovery events experienced by the computer. Adjusting the retrieved metering data according to the number of recovery events may discourage attempts by a subscriber to time power interruptions in an effort to advantageously use the metering data restoration process. Similarly, the time between saves of the metering data may be altered to help thwart such timing attacks. Information about the time between saves, or the period of the save cycle, may also be stored with the metering data for use in the metering data restoration process.
摘要:
A computer is provided with an isolated computing environment. The isolated computing environment is adapted to allow initial programming for use in manufacturing, distribution and sales. The isolated computing environment further allows an authenticated source or authenticated code to update the isolated computing environment with code and configuration data for use in the end-user environment. To encourage final updating, the computer may be placed in a limited-function mode until authorized code is installed and operational. A method and apparatus are disclosed for the sanctioning and secure update of the isolated computing environment.