Abstract:
A data processing system and method are described for permitting a server computer system to remotely control modifications of initialization settings included within a client computer system. The client computer system is coupled to a server computer system to form a network. During a set-up process executing within the client computer system, the client computer system receives an attempted modification of one of a plurality of initialization settings utilized during booting. In response to the attempted modification, the server computer system determines whether the modification is prohibited. In response to the modification being prohibited, the server computer system prohibits the modification of the one of said plurality of initialization settings, wherein the client computer system is prohibited from booting utilizing the modified one of said plurality of initialization settings.
Abstract:
A data processing system and method are described for permitting a server computer system to remotely disable an ability of a client computer system to access a network which couples the client computer system to the server computer system. The server computer system transmits an indication to the client computer system utilizing the network that the ability of the client computer system to access said network be at least temporarily disabled. In response to a receipt of the indication by the client computer system, the ability of the client computer system to access the network is at least temporarily disabled. The client computer system is unable to transmit information utilizing the network while the client computer system is temporarily disabled.
Abstract:
A data processing system and method are described for controlling power supplied to the system. The system includes an internal power supply for receiving energy from an external source and supplying the energy to the system. The energy is full system power and is required for the system to be fully operable. The system is initially powered-off such that the energy is not initially supplied to the system. A power-on password is established. The internal power supply supplies the energy to the system only in response to a correct entry of the power-on password, wherein the system is inoperable prior to the correct entry of the power-on password.
Abstract:
A client on a network is provided with low power logic, at the network adaptor, that is always active and simulates network packet traffic (e.g. Ethernet packets) normally sent under control of the main client system processor(s). This logic collects client status information regarding power state and reports to the network manager such information which allows the network manager to exercise broader control and perform maintenance and upgrades which would usually require a dialog with the user and consequently limit off-hours reconfiguring of the client.
Abstract:
Improved handling of battery recognition tasks in an electronic device such as a cell phone, smart phone, computer system, recording device or others is facilitated. Recognition of a battery so as to enable exchange of power between the device and the battery is determined by a match between one of a plurality of number strings stored in the device and the decrypted response to an encrypted challenge derived from the one of stored number string.
Abstract:
An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The payment instrument electronically transacts payments and includes a transaction restriction. An authentication module receives an authentication from a user of the payment instrument. The security module validates the authentication with a first encryption key. In addition, the security module authorizes a change to the transaction restriction using a second encryption key if the authentication is valid. The security module resides on a computer that the user designates as authorized to validate the authentication.
Abstract:
Hacking a rental computer to use it beyond purchased rental time is prevented by plugging a time card with internal counter into a DIMM socket of the motherboard and encrypting the register locations of the time card with the private key of the motherboard to bind the time card to the motherboard. Thus, if the time card is not detected at boot or if it is removed during operation the computer is disabled. The counter counts down the rented time period as it receives clocking signals, and at the elapse of the purchased period disables the computer.
Abstract:
An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.
Abstract:
An apparatus, system, and method are disclosed for quiescing a boot environment. A reservation module reserves a portion of a first storage device. A store module stores an update boot image to the reserved portion. A detection module detects the update boot image stored on the first storage device when the computer boots and executes the update boot image in place of a standard boot image in response to detecting the update boot image. The update boot image places a computer in a known quiescent state.
Abstract:
An apparatus, system, and method are disclosed for auditing access to secure data. A detection module detects an access to the secure data. A record module records an encrypted log entry describing the access to the secure data. A verification module verifies the secure data is securely stored.