Abstract:
Network bandwidth is allocated to storage access requests as a function of a client system activities. Client system activities that produce network access requests and remote storage access requests are monitored. The network bandwidth allocation between network access requests and storage access requests is modified as a function of the monitored client system activities.
Abstract:
A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
Abstract:
A method for providing centralized user authorization to allow secure sign-on to a computer system is disclosed. In response to a user attempting to boot up a computer system, a message is sent to a trusted server by a hypervisor within the computer to request a new hard drive password for the computer system. If the user is not authorized to access the computer system, a packet is sent by the trusted server to instruct the hypervisor to stop any boot process on the computer system. If the user is authorized to access the computer system, a packet containing a partial hard drive password is sent by the trusted server to the computer system. The packet is then encrypted with a system public key by the computer system to yield the partial hard drive password. The computer system subsequently combines the partial hard drive password with a user password to generate a new complete hard drive password to continue with the boot process.
Abstract:
A method for preventing unauthorized modifications to a rental computer system is disclosed. During boot up of the rental computer system, a determination is made whether or not a time-day card is bound to the rental computer system. If the time-day card is bound to the rental computer system, another determination is made whether or not a time/date value on the time-day card is less than a secure time/date value stored in a secure storage location during the most recent power down. If the time/date value on the time-day card is not less than the secure time/date value, yet another determination is made whether or not the time/date value is less than an end time/date rental value. If the time/date value is less than the end time/date rental value, the rental computer system continues to boot.
Abstract:
A card formed with a cavity located within the card. The cavity is used to hold one or more liquid chemicals. Additional hollow regions abut the visual and magnetic versions of the sensitive data and are normally separated from the chemicals. When the card is sharply folded, the chemicals are released from the cavity and flow in the hollow regions abutting the stored data. The chemicals render the data unreadable, such as by obscuring the visual display with an opaque film. Additionally, in at least some embodiments, the magnetic strip on the credit card is implemented in such a way that there are two separate portions, with the encoded data divided in such a way that both portions are required in order to be decoded.
Abstract:
The present invention relates to a method for removing the driver map component from being stored on the service partition and placing it on a server for retrieval at a later time. Only the actual device drivers that are required for that system will be provided. A central repository will be provided for applications and device drivers that would leverage the AMT area. The AMT IDE-R would be used to store the hook to network install, for example an IT administrator initiated network install to an unpowered system. Two situations exist in which this method will be used. The first situation involves supplying ImageUltra content to a system that is connected to the Local Area Network while ImageUltra is running. The second situation involves supplying ImageUltra content to a system that is not connected to the Local Area Network while ImageUltra is running.
Abstract translation:本发明涉及一种用于将驱动程序映射组件移除存储在服务分区上并将其放置在服务器上以便稍后进行检索的方法。 仅提供该系统所需的实际设备驱动程序。 将为使用AMT区域的应用程序和设备驱动程序提供中央存储库。 AMT IDE-R将用于存储钩子到网络安装,例如IT管理员启动网络安装到无动力系统。 存在使用这种方法的两种情况。 第一种情况是在ImageUltra运行时将ImageUltra内容提供给连接到局域网的系统。 第二种情况是在ImageUltra正在运行时,将ImageUltra内容提供给未连接到局域网的系统。
Abstract:
A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
Abstract:
An arrangement for employing a host of receivers that may already be present in a laptop, to enable the laptop to collect a significant amount of data about its location. Once the system then finds a readily available connection, it can then transmit information about its location as well as other information to help pinpoint the location of the laptop.
Abstract:
Devices, methods and products are described that provide file transfer applications. One aspect provides a method including opening a file transfer application on an information handling device having an internal storage device; providing a source display area indicating a source storage device; providing a destination display area indicating a destination storage device; responsive to movement of one or more file icons a predetermined threshold amount beyond a boundary separating said source display area and said destination display area, change one or more indications to indicate to a user a destination storage device to which one or more files is to be transferred, said changing further comprising modifying screen brightness of the source display area; and responsive to movement of said one or more file icons a predetermined threshold amount beyond said boundary, transferring said one or more files to said destination storage device. Other embodiments are described.
Abstract:
Systems, methods and products directed toward creating device preloads via employing base and additional image content. One aspect includes communicating an aspect of an information handling device, and assimilating additional image content at the information handling device responsive to communication of the aspect of the device, wherein a base image and the additional image content are combined to form a unitary device image. Other embodiments are described herein.