Abstract:
Systems and methods to access password-protected stored data when a corresponding data password has been lost, forgotten, or is otherwise unavailable, and to recover the data password to facilitate access to the password-protected data from a digital memory device such as a hard disk drive associated with a user computer. In some embodiments the computer is communicatively coupled with a network and receives at least one encryption key from a secure computer via the network. In other embodiments the computer is a stand alone computer and receives at least one encryption key from a removable, non-volatile memory such as a CD ROM. The encryption key is used to encrypt the data password and both are stored on the hard disk drive. If the data password becomes lost, forgotten, or otherwise unavailable, the encrypted password is recovered from the hard disk drive and decrypted to recover the data password.
Abstract:
Methods and arrangements for capturing information related to operational conditions are disclosed. Embodiments include volatile memory to quickly record operational parameters via, e.g., basic input output system (BIOS) code, system management interrupt (SMI) code and/or executing applications. Many embodiments provide an alternative power source and a voltage switch to protect against loss of the information between storage in the volatile memory and storage in the non-volatile memory. Some embodiments include a read controller that provides access to the volatile memory when primary power is available. The read controller may also offer direct access to the non-volatile memory in case of a catastrophic failure that renders the processing device substantially non-functional. Further embodiments include a second processing device to generate a usage model and/or to perform diagnostics with the operational parameters.
Abstract:
A method and system for accessing a remote real communication port (“COM port”) from a server blade in a server blade chassis by creating a virtual COM port in the server blade. A basic input/output system (BIOS) controller monitors an internal COM port in the server blade for communication traffic. Upon detecting the communication traffic, the BIOS controller reroutes the traffic to a virtual USB COM port created by the BIOS controller chipset. The virtual USB COM port directs the communication traffic to an internal universal serial bus (USB) device in the server blade. The USB device then forwards the traffic to an Ethernet media access controller (MAC) input/output (I/O) on a sideband channel to a remote system, which passes the communication traffic to a real COM port in the remote system.
Abstract:
A secure computer system includes a central processing unit in which plural programs reside. The system includes means for verifying whether the at least one program is trusted or not trusted. That means can be an external key device that includes a verification program that can communicate with the programs residing within the central processing unit.
Abstract:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point selectively dissociates clients on the wireless network. In order to select which clients are dissociated first, a predetermined client dissociation policy is established. The policy can include account priority, bandwidth utilization, elapsed time since last transfer, and, amongst other criteria, whether the client is currently transferring in peer-to-peer mode on the wireless network. Upon detecting the degraded condition, either immediately or after a predetermined delay to ensure that the degraded condition is not temporary, clients on the wireless network are dissociated according to the preestablished policy.
Abstract:
A data processing system and method are disclosed for providing an access connector which limits access to a network to only authorized client computer systems. The network is controlled by a server computer system. The access connector is provided for physically coupling a client computer system to the network. The access connector is physically coupled to the network. Prior to permitting the client computer system to attempt to establish a client communication link with the network, the client computer system attempts to authenticate itself to the server computer system. In response to the client computer system being unable to authenticate itself to the server computer system, the access connector prohibits the client computer system from establishing a client communication link between the client computer system and the network.
Abstract:
A method and system are described for permitting a dumb device having no operating system to create and transmit a network packet utilizing a network. The dumb device is coupled to a client computer system utilizing the network. A network interface is established within the dumb device. In response to an event, the dumb device generates an internal output signal. The output signal is received within the dumb device by the network interface. In response to a receipt of the output signal, the network interface creates and transmits a network packet including an indication of the event to the client computer system, wherein a dumb device having no operating system creates and transmits a network packet.
Abstract:
A data processing system and method are described for permitting a portable computer to automatically detect the presence of a printer within a remote area, and responsive to the detection, automatically establishing a communications link with the printer. The portable computer is physically disconnected from the printer. The portable computer transmits a wireless query signal to the remote area. In response to a printer physically located within the remote area receiving the wireless query signal, the printer transmits a wireless reply signal to the remote area. In response to the portable computer receiving the wireless reply signal, the computer automatically establishes a communications link with the printer so that the computer may utilize the printer to print information. The communications link may be established with a printer for which the computer does not include a printer driver necessary for communicating with the printer.
Abstract:
A data processing system and method are disclosed for prohibiting access to a SCSI bus prior to a correct entry of an access password. The system includes a plurality of internal SCSI bus devices coupled to the SCSI bus. The system also includes an external SCSI connector for coupling external SCSI devices to the SCSI bus. The access password is established and stored within the system. The plurality of internal SCSI bus devices and the external devices are prohibited from accessing the SCSI bus prior to a correct entry of the access password. The SCSI bus includes a busy signal line. Prior to a correct entry of the access password, the system asserts the busy signal line, indicating that the SCSI bus is busy. Both internal and external devices are prohibited from accessing the SCSI bus while the busy signal line is asserted.
Abstract:
A system for monitoring tamper events in a computer system is disclosed. The computer system is on a network. The system comprises a tamper real time clock (RTC) means which receives at least one tamper event signal from the computer system. The tamper RTC means includes a timer for indicating the time of a tamper event and a management device for receiving the at least one tamper event signal. The management device issues a command to the tamper RTC means to obtain the time of the at least one tamper event. The management device also generates a network packet which includes the time of the tamper event to a system administrator of the network. The present invention in a preferred embodiment is directed to a computer system which has the ability to functionally detect and store the time of a tamper event. A tamper real time clock (RTC) circuit is operatively connected with logic to store the date and time of an event as it occurs. In a preferred embodiment, the tamper event could be as simple as a toggle switch being activated when a cover on the computer system is removed. The computer system could also send network alerts when the cover is removed.