摘要:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point selectively dissociates clients on the wireless network. In order to select which clients are dissociated first, a predetermined client dissociation policy is established. The policy can include account priority, bandwidth utilization, elapsed time since last transfer, and, amongst other criteria, whether the client is currently transferring in peer-to-peer mode on the wireless network. Upon detecting the degraded condition, either immediately or after a predetermined delay to ensure that the degraded condition is not temporary, clients on the wireless network are dissociated according to the preestablished policy.
摘要:
A data processing system and method are disclosed for providing an access connector which limits access to a network to only authorized client computer systems. The network is controlled by a server computer system. The access connector is provided for physically coupling a client computer system to the network. The access connector is physically coupled to the network. Prior to permitting the client computer system to attempt to establish a client communication link with the network, the client computer system attempts to authenticate itself to the server computer system. In response to the client computer system being unable to authenticate itself to the server computer system, the access connector prohibits the client computer system from establishing a client communication link between the client computer system and the network.
摘要:
A method and system are described for permitting a dumb device having no operating system to create and transmit a network packet utilizing a network. The dumb device is coupled to a client computer system utilizing the network. A network interface is established within the dumb device. In response to an event, the dumb device generates an internal output signal. The output signal is received within the dumb device by the network interface. In response to a receipt of the output signal, the network interface creates and transmits a network packet including an indication of the event to the client computer system, wherein a dumb device having no operating system creates and transmits a network packet.
摘要:
A data processing system and method are described for permitting a portable computer to automatically detect the presence of a printer within a remote area, and responsive to the detection, automatically establishing a communications link with the printer. The portable computer is physically disconnected from the printer. The portable computer transmits a wireless query signal to the remote area. In response to a printer physically located within the remote area receiving the wireless query signal, the printer transmits a wireless reply signal to the remote area. In response to the portable computer receiving the wireless reply signal, the computer automatically establishes a communications link with the printer so that the computer may utilize the printer to print information. The communications link may be established with a printer for which the computer does not include a printer driver necessary for communicating with the printer.
摘要:
A data processing system and method are disclosed for prohibiting access to a SCSI bus prior to a correct entry of an access password. The system includes a plurality of internal SCSI bus devices coupled to the SCSI bus. The system also includes an external SCSI connector for coupling external SCSI devices to the SCSI bus. The access password is established and stored within the system. The plurality of internal SCSI bus devices and the external devices are prohibited from accessing the SCSI bus prior to a correct entry of the access password. The SCSI bus includes a busy signal line. Prior to a correct entry of the access password, the system asserts the busy signal line, indicating that the SCSI bus is busy. Both internal and external devices are prohibited from accessing the SCSI bus while the busy signal line is asserted.
摘要:
A system for monitoring tamper events in a computer system is disclosed. The computer system is on a network. The system comprises a tamper real time clock (RTC) means which receives at least one tamper event signal from the computer system. The tamper RTC means includes a timer for indicating the time of a tamper event and a management device for receiving the at least one tamper event signal. The management device issues a command to the tamper RTC means to obtain the time of the at least one tamper event. The management device also generates a network packet which includes the time of the tamper event to a system administrator of the network. The present invention in a preferred embodiment is directed to a computer system which has the ability to functionally detect and store the time of a tamper event. A tamper real time clock (RTC) circuit is operatively connected with logic to store the date and time of an event as it occurs. In a preferred embodiment, the tamper event could be as simple as a toggle switch being activated when a cover on the computer system is removed. The computer system could also send network alerts when the cover is removed.
摘要:
A system and method for monitoring tamper events in a computer system in accordance with the present invention is disclosed. The system comprises a detector means for detecting at least one tamper event and for providing an indication when the tamper event has occurred for longer than a predetermined time period. The system also includes an adapter means coupled to the detector means for receiving the indication and for disabling the computer system. The present invention is directed to a computer system, which has the ability to functionally determine if a tamper event is authorized and therefore allows the computer to operate after such an event. In a preferred embodiment, the tamper event could be as simple as a toggle switch being activated when the cover of the personal computer is removed.
摘要:
A client on a network is provided with auxiliary low power logic, at the network adapter, that is always active and simulates network traffic (e.g. Ethernet format) normally sent under control of the main client system processor(s). This logic receives commands from the network manager, even when the system CPU is powered down or the system is not operational; information which allows the network manager to exercise broader control and perform maintenance and upgrades which would otherwise require service call for maintenance and reconfiguration of the client system. The auxiliary logic also can receive and interpret commands from the network that conform to a predefined format.
摘要:
A method and system are disclosed for placing a computer in a safe and secure lock down state from a remote location using a remote command device such as a cellular telephone. The method and system includes optional security provisions before restarting the computer.
摘要:
An apparatus for a sleep state video interface of an information handling device includes a storage device storing machine-readable code and a processor executing the machine-readable code. The apparatus includes a notification module receiving a sleep notification to place an information handling device into a sleep state. The information handling device receives a video signal. The apparatus includes a sleep module entering the information handling device into the sleep state in response to the notification module receiving the sleep notification. The video signal passes through the information handling device to a display as the information handling device is in the sleep state.