摘要:
A data processing system has a microprocessor, a memory system and a plurality of system devices the operation of which is controlled by BIOS routines. The BIOS routines are accessed through protected entry points. When an application program attempts to access one of the routines by using a hard coded instruction for jumping to such entry point, a BIOS signaling routine is executed which provides a signal to an operating system allowing the operating system to control the access without being bypassed.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to trusted platform module (TPM) unification in a trusted computing environment and provide a novel and non-obvious method, system and computer program product for trusted platform module data harmonization. In one embodiment of the invention, a TPM log harmonization method can include designating both a single master TPM for a master node among multiple nodes, and also a multiplicity of subsidiary TPMs for remaining ones of the nodes. The method further can include extending the single master TPM with a measurement representing a rendezvous operation for the nodes.
摘要:
A method for interlocking a plurality of servers to a server system is disclosed. The method comprises assigning an identifier to each of the plurality of servers, wherein the identifier associates each of the plurality of servers to the server system, thereby defining a plurality of interlocked servers.
摘要:
A flash memory is provided that includes a primary flash bank and a secondary flash bank. The primary flash bank includes CRTM logic and BIOS logic and the secondary flash bank comprises a backup copy of the CRTM logic and the BIOS logic. A switching mechanism is configured to selectively activate the primary flash bank or the secondary flash bank.
摘要:
Methods, systems, and computer program products are provided for glyphword-based security. Embodiments include establishing a glyphword comprising a plurality of glyphs; and creating a plurality of glyphsheets wherein each glyphsheet includes one or more glyphs included in the established glyphword and one or more glyphs not included in the established glyphword; and for each glyphsheet: presenting to a user the glyphsheet; receiving from the user at least one selection of a glyph included in the glyphsheet; determining whether the glyphsheet is the last glyphsheet if the glyph selected by the user is not included in the glyphs of the glyphword; and providing access to a resource if the glyphsheet is the last glyphsheet.
摘要:
A method and system for method of removing a node from a multi-node computer. The node receives a system management interrupt (SMI), resulting in a quiescenting of only that node. The SMI receiving node then polls other nodes in the multi-node computer to determine if the SMI affects an operation of any of the other nodes, and quiescents any other node affected by the SMI. Each quiescent node then transfers all of the contents of its system memory to a backup memory in an unaffected remote node in the multi-node computer. The remote node than assumes the function of the removed node that had received the SMI. The method and system thus allows node removal in the event of a hot-swap request or a predicted failure of a node.
摘要:
A system and method for remote power control across multiple nodes of a partitioned data processing system. The system includes one or more nodes, each node including a chassis housing a traditional SMP server. The system may be partitioned into two or more SPAR's. Partition management software provides out of band power control to an entire partition, regardless of the number of nodes in the partition. The partition management code installed on each node of the partition is enabled to broadcast a power-on request to each of the nodes in the partition. Thus, when any service processor receives a power-on request, that service processor will resend the power on request to the broadcast group, thereby causing all of the nodes in the SPAR to power up. The broadcast packets may be routed to the other nodes via an out-of-band or private management LAN. Using this implementation, existing network and system management software can reset the system by sending a normal power-on request to any service processor in the SPAR complex thereby minimizing the multi-node architecture's impact.
摘要:
A method and system for managing a secure network boot of a server blade. The server blade is part of a server blade chassis, which holds multiple server blades that communicate with outside devices via a Pre-boot eXecution Environment (PXE) enabled network interface card. When a server blade receives a response from a PXE boot server offering a boot program download, a Remote Supervisory Adapter (RSA) card, managed by a remote manager, compares the identity of the responding PXE boot server with a list of trusted PXE boot servers. Only if the responding PXE boot server is on the list of trusted PXE boot servers will the server blade be allowed to use a boot program provided by the responding PXE boot server.
摘要:
A cache controller structure and method are provided for managing cache access for a computer system. The computer system has a processor having a direction flag and configured to run a repetitive string operation, wherein the string operation is configured to sequentially access a targeted memory block for each repetition depending on the state of the direction flag. A cache controller logic is provided to control a cache embedded in the processor while the processor executes string operations. The cache controller is configured to manipulate the cache lines responsive to the direction flag and to a position of a targeted memory block within a cache line. In some embodiments, the controller logic is also configured to manipulate the cache lines responsive to a repetition parameter value within the string operation.
摘要:
Method and system aspects for securely transferring a computer system are described. A computer system is disabled at a shipping point via an RFID (radio frequency identification) interface and re-enabled at a receiving point via the RFID interface. Disabling the computer system includes selecting a boot password, writing the boot password to storage in the computer system via the RFID interface, and setting a disable bit in the storage via the, RFID interface. Re-enabling the computer system includes entering the boot password via the RFID interface and clearing the disable bit.