摘要:
The hard disk drive of a computer system is loaded with a preloaded image including an operating system, a number of application programs, and a device driver installation routine, all of which are not dependent on the hardware configuration of the computer system. A hidden partition of the hard disk drive is also loaded with a number of device drivers, which are dependent upon the hardware configuration. During the first boot only of the preloaded image, the device drivers are installed by the device driver installation routine.
摘要:
A method and system for configuring an operating system in a computer system including language selection during bootup rather than at manufacture. A first aspect of the method and system comprises providing a plurality of operating system images in the computer system, each of the plurality of operating system images being based upon a particular language, selecting one of the plurality of operating system images based on the language supported by the computer system and loading the selected operating system image into the computer system. A second aspect of the method and system comprises providing a language-independent operating system image in the computer system, determining a language supported by the computer system, loading the language-independent operating system image into the computer system, and associating the language supported by the computer system with the language-independent operating system image.
摘要:
A computing system includes a motherboard including one or more connection subsystems, each of which includes a port connector and a device interface circuit conditioning signals transmitted or received through the port connector. The port connector includes a connection-sensing terminal, which is connected to ground through a cable, and which is allowed to float to a voltage supplied through a pull-up resistor when the cable is disconnected. The motherboard also includes a main voltage plane supplying electrical power to a separate voltage plane for each device interface circuit only when a cable is connected to the port connector which is also connected to the device interface circuit.
摘要:
A data processing system and method are disclosed for prohibiting an unauthorized user from modifying a priority level associated with a client computer system. The priority level is utilized by a client computer system during transmission of the client's data over a network. One of a plurality of priority levels is associated with the client computer system. The plurality of priority levels includes a higher priority level and a lower priority level. The client computer system associates the priority level with the data transmitted by the client computer system over the network. The data associated with the higher priority level is typically transmitted prior to data associated with the lower priority level. In response to an attempt to modify the associated priority level, the client determines whether the attempt is being made by an approved user. In response to a determination that the attempt is not being made by an approved user, the attempted modification of the priority level is prohibited. In another embodiment, a priority level may be associated with each class of data. When the client computer system transmits a packet, the client determines which class of data is included in the packet. The priority level associated with that class is then associated with the packet including that class of data. The client, then, transmits the packet which is associated with one of the priority levels.
摘要:
A data processing system and method are disclosed for protecting data within a hard disk drive included within a data processing system. Data is generated. A signature value is provided which is stored in a signature device. The signature device is capable of being inserted into and removed from a computer system. A textual description of the data is created. The data is encrypted utilizing both the signature value stored on the device and the textual description. The encrypted data is then stored on the hard disk drive. The data processing system does not permanently store encryption keys.
摘要:
A data processing system and method are disclosed for protecting data stored on a device included within the system. A device key pair is established which identifies a particular device included within the system. The device key pair includes a device public key and a device private key. The device includes data stored on the device which may not be fully accessed initially. A planar key pair is established which identifies a planar board included within the system. The planar key pair includes a planar public key and a planar private key. The particular device is associated with the planar by storing the device public key only within the planar, and by storing the planar public key only within the device. Access to the data stored within the device is limited to only a planar which has the stored device public key.
摘要:
A client on a network is provided with auxiliary low power logic, at the network adaptor, that is always active and simulates network traffic (e.g., Ethernet format) normally sent under control of the main client system processor(s). This logic collects client status information and reports to the network manager, irrespective of the system's CPU power level, information and provides for interaction between the user and the administration or network manager to exercise broader control and perform repair and upgrades which would otherwise require a dialog with the user and/or limit repair and reconfiguration of the client system to off-hours activity. The auxiliary logic also can receive and interpret commands from the network that conform to a predefined format.
摘要:
A method and system for enabling security attestation for a computing device during a return from an S4 sleep state. When the computing device enters into the S4 state following a successful boot up, the attestation log is appended to the TPM tick count and the log is signed (with a security signature). When the device is awaken from S4 state, the BIOS obtains and verifies the log created during the previous boot. The CRTM maintains a set of virtual PCRs and references these virtual PCRs against the log. If the values do not match, the return from S4 state fails and the device is rebooted.
摘要:
A method for authentication in a computer system includes registering a biometric template in the computer system, thereafter, verifying the authenticity of the registered biometric template and then comparing the biometric template with a biometric image of a user if the biometric template is authentic. If the user's biometric image matches the biometric template, the computer system will continue to boot.
摘要:
A method and system for conserving battery strength of a mobile node, such as a laptop computer, on a wireless local area network (WLAN). The mobile node transmit symbols, which are units of data, during transmission cycles to maintain a connection with the WLAN. A battery charge level of the mobile node is measured. As the battery charge level drops below pre-defined levels, a frequency of symbol transmission for the mobile node is reduced. The reduction of the frequency of the symbol transmission results in lower power demands by a transmitter chipset of the mobile node. Thus, the mobile node is able to prolong the life of the battery of the mobile node.