Abstract:
A method for protecting Security Accounts Manager (SAM) files within a Windows® operating system is disclosed. A SAM file encryption key is generated by encrypting a SAM file via a syskey utility provided within the Windows® operating system. The SAM file encryption key is then stored in a virtual floppy disk by selecting an option to store SAM file encryption key to a floppy disk under the syskey utility. A blob is generated by performing a Trusted Platform Module (TPM) Seal command against the SAM file encryption key along with a value stored in a Performance Control Register and a TPM Storage Root Key. The blob is stored in a non-volatile storage area of a computer.
Abstract:
A computer system that may include a trusted platform module (TPM) along with a processor hashes a user-supplied password for a predetermined time period that is selected to render infeasible a dictionary attack on the password. The results of the hash are used to render an AES key, which is used to encrypt an RSA key. The encrypted RSA key along with the total number of hash cycles that were used is stored and the RSA key is provided to the TPM as a security key. In the event that the RSA key in the TPM must be recovered, the encrypted stored version is decrypted with an AES key that is generated based on the user inputting the same password and hashing the password for the stored number of cycles.
Abstract:
A method of use protects a door hinge from splattered paint while allowing movement of the door, because the barrel portion is covered by the non-adhesive central portion of a masking tape. Use of a specialized roll of painter's masking tape includes the steps of having a longitudinal narrow region in the center without adhesive, in between two outer left and right regions which include adhesive. This non-adhesive center region is sized to match the circumference of the pin barrel exposed on the front of the hinge when opened flat. The tape is cut at predetermined lengths to form disposable masks for masking door hinges. The same tape is used for masking at least a portion of both the front butt plates as well as all of the back pin barrel side of the hinge. The front mask does not impede movement of the attached pivotably openable door.
Abstract:
A method of use protects a door hinge from splattered paint while allowing movement of the door, because the barrel portion is covered by the non-adhesive central portion of a masking tape. Use of a specialized roll of painter's masking tape includes the steps of having a longitudinal narrow region in the center without adhesive, in between two outer left and right regions which include adhesive. This non-adhesive center region is sized to match the circumference of the pin barrel exposed on the front of the hinge when opened flat. The tape is cut at predetermined lengths to form disposable masks for masking door hinges. The same tape is used for masking at least a portion of both the front butt plates as well as all of the back pin barrel side of the hinge. The front mask does not impede movement of the attached door, which can be pivotably opened to 180 degrees.
Abstract:
A system and method for sale and use tax collection rate by providing a system and method including a mechanism to incent taxpayers comprising three major components: Merchants (Data Capture devices), Processors/Acquirers and the Aggregator.
Abstract:
A method for providing a secure single sign-on to a computer system is disclosed. Pre-boot passwords are initially stored in a secure storage area of a smart card. The operating system password, which has been encrypted to a blob, is stored in a non-secure area of the smart card. After the smart card has been inserted in a computer system, a user is prompted for a Personal Identification Number (PIN) of the smart card. In response to a correct smart card PIN entry, the blob stored in the non-secure storage area of the smart card is decrypted to provide the operating system password, and the operating system password along with the pre-boot passwords stored in the secure storage area of the smart card are then utilized to log on to the computer system.
Abstract:
Methods and arrangements are disclosed for secure single sign on to an operating system using only a power-on password. In many embodiments modified BIOS code prompts for, receives and verifies the power-on password. The power-on password is hashed and stored in a Platform Configuration Register of the Trusted Platform Module. In a setup mode, the trusted platform module encrypts the operating system password using the hashed power-on password. In a logon mode, the trusted platform module decrypts the operating system password using the hashed power-on password.
Abstract:
A method of use protects a door hinge from splattered paint while allowing movement of the door, because the barrel portion is covered by the non-adhesive central portion of a masking tape. Use of a specialized roll of painter's masking tape includes the steps of having a longitudinal narrow region in the center without adhesive, in between two outer left and right regions which include adhesive. This non-adhesive center region is sized to match the circumference of the pin barrel exposed on the front of the hinge when opened flat. The tape is cut at predetermined lengths to form disposable masks for masking door hinges. The same tape is used for masking at least a portion of both the front butt plates as well as all of the back pin barrel side of the hinge. The front mask does not impede movement of the attached door, which can be pivotably opened to 180 degrees.
Abstract:
Applications which function under a first operating system also function when it becomes necessary to call into action a second operating system due to provision having been made for configuration and other settings necessary to the execution of such applications (here generically called policy settings or policy source data) to be made available to the second operating system.
Abstract:
A trusted platform module (TPM) key is assigned a numerical limit for the number of times the key can be used, and once the key has been used the assigned number of times, it is rendered unusable.