摘要:
A computer determines whether it has been booted from a hard disk drive or from an alternate source (e.g., a floppy drive or portable memory) that entails a higher risk of importing a virus into the computer, and if it is determined that a non-HDD source was booted from, corrective action such as a virus scan can be preemptively taken.
摘要:
An apparatus, a system, and a method are provided for transitioning networked computing devices to a lower power state. The apparatus, system, and method include an interface module configured to receive a power saving command from a remote site on a network. A determination module is provided to determine whether the client is in a selected state whereby it can comply with the power savings command. A power saving module is provided to execute a selected power saving scheme responsive to a determination that the client is in a selected state whereby it can comply with the power savings command.
摘要:
An apparatus for securely backing up data using a cryptographic module includes a mass storage device having a first accessible portion and a second encrypted portion. The mass storage device is initialized to only decrypt the encrypted portion on the system that first created the encrypted portion. The cryptographic module may be a Trusted Platform Module (TPM) based on specifications from the Trusted Computer Group. The mass storage device comprises a trusted platform interface module configured to communicate with the TPM. The system may include a motherboard having a TPM, and the mass storage device. The method in one embodiment comprises providing a computer readable mass storage device, initializing a password module, transmitting an encrypted password to the cryptographic module, authenticating the encrypted password, decrypting the encrypted password, transmitting the decrypted password to the computer readable medium, and decrypting the second encrypted portion using the decrypted password.
摘要:
A method is provided of uniquely binding, through connection, a subsystem device having restricted information space for storing code, to a system having a structure for generating and delivering a unique code to identify the system to the information storage space in the subsystem. The method comprises determining if the information storage space in the subsystem has information therein when the subsystem is connected to the system. If no information is contained in the information storage space in the subsystem, the system writes the unique code from the system to the information storage space in the subsystem. If information is in the information storage space, that information is compared with the unique code in the system, and operation of the system is allowed if, and only if, the information in the information storage space matches the unique code generated by the system. A structure for performing this method is also provided.
摘要:
A technique is disclosed for storing an electronic record of the existence of licenses available for use in a network of computers and the deployment status of programs covered by the licenses. License tokens are stored on a license server, and the stored license tokens are used to validate the deployment of applications stored on clients associated with the license server. The license server maintains the license tokens for all licensed applications used by the associated clients and maintains a license file for each client. Periodically, the license file containing token data is sent to the pre-boot environment of each client in the system, e.g., by a synching process. A license-maintenance application residing in the pre-boot environment of each client validates the applications stored on the client by comparing them with the token data in the license file upon the occurrence of a pre-boot process.
摘要:
A method and system for wirelessly connecting a client device to a wireless network's access point. When a first client device detects a Wireless Broadcast Storm During Active Scan Association (WBSDAASA) caused by a large block of other client devices attempting to simultaneously wirelessly connect to the access point using an active scan, the first client device switches to either a passive scan or a random roam active scan to connect the first client device to the access point. The first client device is thus able to avoid a connection live-lock caused by the WBSDAASA.
摘要:
A method and system is described for selectively downloading antidotes onto a client computer. The client computer is connected via a network interface card (NIC) to a network that contains an anti-virus server. The NIC is initially logically isolated from the client computer, thus permitting the NIC to autonomously examine packets to and from the client computer and the network. The NIC selectively accepts packets only from trusted Internet Protocol (IP) addresses that conform to a security format such as Internet Protocol Security (IPSec).
摘要:
A method and system for remotely controlling a hard drive on a local computer. A NIC includes a Port Selector under the control of a NIC processor. Access to the hard drive is selectively afforded to either the local computer or to a remote computer by the Port Selector. Preferably, the method and system permit remote access to a local hard drive even if the local computer is disabled, due to causes including, but not limited to, system failure, lost power or corrupted data on the hard drive.
摘要:
A system and method for autonomic wireless presence ping is presented. An IS administrator wishes to collect capacity requirement information corresponding to a wireless network, such as the number of packets a client sends to and receives from an access point. The IS administrator sends a request to the access point. In turn, the access point sends a control packet to client devices it supports, instructing them to enable an enhanced presence ping bit. Each client enables its enhanced presence ping bit, and collect enhanced status information. Each client device sends the enhanced status information to the access point either when a timer expires, or when the client device receives a ping request from the access point. The access point then forwards the enhanced status information to the IS administrator for analysis.
摘要:
Systems, methods, and media for providing remote wake-up and management of systems in a network are disclosed. More particularly, hardware and/or software for a server to receive feedback from a client as to the status of its wake-on-LAN functionality is disclosed. Embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, transmitting a first network packet comprising a wake-on-LAN packet, and receiving a return wake-on-LAN packet, which comprises an indication of the address of the client and an indication of the status of the wake-on-LAN functionality of the client. Embodiments may also include transmitting a command to start a management session on the client.