Method and Apparatus for Preventing Unauthorized Modifications to Rental Computer Systems
    41.
    发明申请
    Method and Apparatus for Preventing Unauthorized Modifications to Rental Computer Systems 有权
    防止未经授权修改租用计算机系统的方法和装置

    公开(公告)号:US20080077785A1

    公开(公告)日:2008-03-27

    申请号:US11535538

    申请日:2006-09-27

    Abstract: A method for preventing unauthorized modifications to a rental computer system is disclosed. During boot up of the rental computer system, a determination is made whether or not a time-day card is bound to the rental computer system. If the time-day card is bound to the rental computer system, another determination is made whether or not a time/date value on the time-day card is less than a secure time/date value stored in a secure storage location during the most recent power down. If the time/date value on the time-day card is not less than the secure time/date value, yet another determination is made whether or not the time/date value is less than an end time/date rental value. If the time/date value is less than the end time/date rental value, the rental computer system continues to boot.

    Abstract translation: 公开了一种防止对租赁计算机系统的未经授权的修改的方法。 在租赁计算机系统的引导期间,确定时间日卡是否绑定到租赁计算机系统。 如果时间日卡被绑定到租赁计算机系统,则另外确定时间日卡上的时间/日期值是否小于最多存储在安全存储位置中的安全时间/日期值 最近掉电。 如果时间日卡上的时间/日期值不小于安全时间/日期值,则另外确定时间/日期值是否小于结束时间/日期租赁值。 如果时间/日期值小于结束时间/日期租金值,则租用计算机系统将继续启动。

    Method for controlling file access on computer systems
    42.
    发明申请
    Method for controlling file access on computer systems 有权
    控制计算机系统文件访问的方法

    公开(公告)号:US20070283169A1

    公开(公告)日:2007-12-06

    申请号:US11446737

    申请日:2006-06-05

    CPC classification number: G06F12/1475 G06F21/78

    Abstract: A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.

    Abstract translation: 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。

    Reducing start-up time and avoiding customer-induced system failures for personal computers
    44.
    发明授权
    Reducing start-up time and avoiding customer-induced system failures for personal computers 失效
    减少启动时间,避免客户导致的个人电脑系统故障

    公开(公告)号:US06721885B1

    公开(公告)日:2004-04-13

    申请号:US09658130

    申请日:2000-09-08

    CPC classification number: G06F9/4401 G06F11/2289

    Abstract: Disclosed is a method for reducing power-up time and avoiding customer-induced failures of computer systems during power-up. An intrusion switch, which is connected to the inside frame of the computer system is utilized. The intrusion switch signals the BIOS of the computer system whenever the cover of the computer's system unit is opened. The BIOS controls the POST operation during power-up of the computer system. During an initial power-up of the computer system, the POST configuration code examines and configures the hardware and sets the applicable registers, etc. At the end of the POST configuration code, the register values are stored in non-volatile storage. During a subsequent power-up of the computer system, a check is made to see if the cover of the system had been opened. When the cover has not been opened, the BIOS assumes that no changed has occurred in the hardware configuration and the BIOS restores the register values from non-volatile storage without completing the POST operation. When the cover has been opened, the BIOS discards the register values and initiates the POST operation, i.e., a full configuration operation is performed and new values stored in the registers and non-volatile storage element.

    Abstract translation: 公开了一种在上电期间减少上电时间并避免客户导致的计算机系统故障的方法。 使用连接到计算机系统的内部框架的入侵开关。 每当打开计算机系统单元的盖子时,入侵开关就会通知计算机系统的BIOS。 BIOS在电脑系统启动期间控制POST操作。 在计算机系统的初始上电期间,POST配置代码检查和配置硬件并设置适用的寄存器等。在POST配置代码结束时,寄存器值存储在非易失性存储器中。 在计算机系统的随后上电期间,检查系统的盖是否已打开。 当盖子尚未打开时,BIOS假定在硬件配置中没有发生任何变化,BIOS会从非易失性存储器中恢复寄存器值,而无需完成POST操作。 当盖子打开时,BIOS将丢弃寄存器值并启动POST操作,即执行完整配置操作,并将新值存储在寄存器和非易失性存储元件中。

    Computer system which is disabled when it is disconnected from a network
    45.
    发明授权
    Computer system which is disabled when it is disconnected from a network 失效
    计算机系统在与网络断开连接时被禁用

    公开(公告)号:US6105136A

    公开(公告)日:2000-08-15

    申请号:US23606

    申请日:1998-02-13

    CPC classification number: G06F21/86 G06F21/78

    Abstract: Described is a computer system which is coupled to a remote computer via a data communication link. The computer system has a normally closed enclosure and is capable of securing data retained within the system against unauthorized access. The computer system includes an erasable memory element mounted within the enclosure for selective activation to active and inactive states and for receiving and storing a security password when in the active state. A manually operable option switch is mounted within the enclosure. The option switch is operatively connected with the erasable memory element and manually settable by a user of the computer system for setting the erasable memory element to the active and inactive states. A communication line detector is operatively connected with the erasable memory element for detecting a disconnection of the data communication link and for clearing any stored security password from the erasable memory element in response to a change of the communication link detector between a first state and a second state.

    Abstract translation: 描述了经由数据通信链路耦合到远程计算机的计算机系统。 计算机系统具有常闭外壳,并且能够保护系统中保留的数据,防止未经授权的访问。 计算机系统包括安装在机箱内的可擦除存储器元件,用于选择性地激活到主动和非活动状态,并且在处于活动状态时接收和存储安全密码。 手动可操作的选项开关安装在外壳内。 选项开关可操作地与可擦除存储元件连接,并且可由计算机系统的用户手动设置,用于将可擦除存储器元件设置为活动状态和非活动状态。 通信线路检测器可操作地与可擦除存储器元件连接,用于响应于通信链路检测器在第一状态和第二状态之间的变化来检测数据通信链路的断开并用于从可擦除存储器元件清除任何存储的安全密码 州。

    Field programming apparatus and method for updating programs in a
personal communications device
    46.
    发明授权
    Field programming apparatus and method for updating programs in a personal communications device 失效
    用于更新个人通信设备中的程序的现场编程设备和方法

    公开(公告)号:US5590373A

    公开(公告)日:1996-12-31

    申请号:US279638

    申请日:1994-07-25

    CPC classification number: G06F8/65 H04W88/00

    Abstract: A field programming tool for a personal communications device, provides an automatic, capability to update computer programs stored in the device. The personal communications device includes an electrically programmable read only memory (EPROM), that stores the operating system programs and the applications programs to be loaded into a random access memory (RAM) for executed by a central processing unit (CPU) in the device. A reprogramming card is provided for the device, containing pre-stored new programs that are to be loaded into the EPROM of the device. A method is provided for automatically loading the new programs from the reprogramming card into the EPROM, in an accurate, foolproof manner. This is accomplished using a sequencing program stored on the reprogramming card and loaded into the RAM of the device, where it is executed. An option attach connector alerts the device that the reprogramming card is connected to the PCMCIA slot of the device. It's presence is a signal to the device to begin the automatic operation of reprogramming the EPROM with the new programs stored in the reprogramming card, using the sequencing program in the reprogramming card.

    Abstract translation: 用于个人通信设备的现场编程工具提供了更新存储在设备中的计算机程序的自动的能力。 个人通信设备包括电可编程只读存储器(EPROM),其存储要加载到随机存取存储器(RAM)中的操作系统程序和应用程序,以由设备中的中央处理单元(CPU)执行。 为设备提供重新编程卡,其中包含要加载到设备的EPROM中的预先存储的新程序。 提供了一种以重新编程卡自动将新程序以准确,笨重的方式加载到EPROM中的方法。 这是使用存储在重新编程卡上的加载到设备的RAM中的排序程序来完成的,在该程序的执行中。 选件连接连接器将重新编程卡连接到设备的PCMCIA插槽提醒设备。 存在是使用重新编程卡中的排序程序,使用存储在重新编程卡中的新程序开始自动操作重新编程EPROM的信号。

    Secure resume for encrypted drives
    49.
    发明授权
    Secure resume for encrypted drives 有权
    加密驱动器的安全简历

    公开(公告)号:US08539246B2

    公开(公告)日:2013-09-17

    申请号:US13049071

    申请日:2011-03-16

    CPC classification number: G06F21/62 G06F21/78 G06F2221/2107 H04L9/3226

    Abstract: Systems, methods and products are described that provide secure resume for encrypted drives. One aspect provides a method including: receiving an indication to resume from a suspended state at a computing device; responsive to authenticating a user at one or more input devices, accessing a value in a BIOS derived from authenticating the user at the one or more input devices; responsive to accessing the value, releasing a credential for unlocking one or more encrypted drives; and thereafter proceeding to resume from the suspend state.

    Abstract translation: 描述了为加密驱动器提供安全恢复的系统,方法和产品。 一方面提供了一种方法,包括:在计算设备处接收从暂停状态恢复的指示; 响应于在一个或多个输入设备处认证用户,访问在所述一个或多个输入设备处认证所述用户而导出的BIOS中的值; 响应于访问该值,释放用于解锁一个或多个加密驱动器的凭证; 之后继续从暂停状态恢复。

    Security to extend trust
    50.
    发明授权
    Security to extend trust 有权
    安全性扩大信任

    公开(公告)号:US08341393B2

    公开(公告)日:2012-12-25

    申请号:US12641029

    申请日:2009-12-17

    Abstract: An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash in a secure register; load an operating system; validate a certificate associated with the core root of trust measurement code and validate a certificate associated with the system management code; based on the validated certificates, provide an expected hash associated with the core root of trust measurement code and the system management code; decide if the expected hash matches the hash stored in the register; and, if the expected hash matches the hash stored in the register, commence a dynamic root of trust measurement session. Various other apparatuses, systems, methods, etc., are also disclosed.

    Abstract translation: 示例性装置包括一个或多个处理器; 记忆; 配置为对与信任测度代码的核心根和系统管理代码相关联的值进行散列的电路; 将哈希存储在安全寄存器中; 加载操作系统; 验证与信任测度代码的核心根相关联的证书,并验证与系统管理代码相关联的证书; 基于验证的证书,提供与信任测度代码的核心根和系统管理代码相关联的预期散列; 确定预期哈希是否与存储在寄存器中的哈希匹配; 并且如果期望的哈希与存储在寄存器中的哈希匹配,则启动信任测量会话的动态根。 还公开了各种其它装置,系统,方法等。

Patent Agency Ranking