Abstract:
An apparatus and method are disclosed for dynamic keystone correction. A measurement module measures distances from a projector to each of at least three projected points of a first projected image projected on a first surface with projection angles between each projected point. The at least three projected points are endpoints for at least two vectors with a target ratio of vector lengths. An adjustment module calculates an actual ratio of actual vector lengths of the at least two vectors. The adjustment module further adjusts a first aspect ratio of first projected image until the actual ratio is equivalent to the target ratio.
Abstract:
The present invention relates to a method and system for providing an option when sending an email which will require the recipient of the email to provide an extra level of authentication before displaying the email contents in order to prove that he or she is indeed the correct recipient of the email. Validation is required by the recipient every time he or she opens an email. This validation occurs in the form of authentication that the user is indeed the intended recipient of the email, and can be provided in various means, including biometric identification, password phrases, and so forth.
Abstract:
A method and apparatus for maintaining operability with a cloud computing environment. The apparatus includes a storage module and a local environment module. The storage module may store cloud computing data from a cloud computing environment onto a local storage device. The storage module may communicate with the cloud computing environment through a remote connection. The local environment module may operate a local cloud computing environment from the local storage device while the remote connection to the cloud computing environment is unavailable. The local cloud environment may replicate at least a portion of the cloud computing environment and may be operated from the stored cloud computing data.
Abstract:
Systems, methods, apparatuses and computer program products provide alternative desktop computing solutions and generally provide client devices configured to utilize one of a local common base image and a common base image stored remotely, with a user-specific overlay image remotely storing user specific data. The clients can be configured to store the common base image locally.
Abstract:
A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
Abstract:
The present invention relates to a method for removing the driver map component from being stored on the service partition and placing it on a server for retrieval at a later time. Only the actual device drivers that are required for that system will be provided. A central repository will be provided for applications and device drivers that would leverage the AMT area. The AMT IDE-R would be used to store the hook to network install, for example an IT administrator initiated network install to an unpowered system. Two situations exist in which this method will be used. The first situation involves supplying ImageUltra content to a system that is connected to the Local Area Network while ImageUltra is running. The second situation involves supplying ImageUltra content to a system that is not connected to the Local Area Network while ImageUltra is running.
Abstract translation:本发明涉及一种用于将驱动程序映射组件移除存储在服务分区上并将其放置在服务器上以便稍后进行检索的方法。 仅提供该系统所需的实际设备驱动程序。 将为使用AMT区域的应用程序和设备驱动程序提供中央存储库。 AMT IDE-R将用于存储钩子到网络安装,例如IT管理员启动网络安装到无动力系统。 存在使用这种方法的两种情况。 第一种情况是在ImageUltra运行时将ImageUltra内容提供给连接到局域网的系统。 第二种情况是在ImageUltra正在运行时,将ImageUltra内容提供给未连接到局域网的系统。
Abstract:
A method, apparatus, and system are disclosed of forward caching for a managed client. A storage module stores a software image on a storage device of a backend server. The backend server provides virtual disk storage on the storage device through a first intermediate network point for a plurality of diskless data processing devices. Each diskless data processing device communicates directly with the first intermediate network point. The storage module caches an image instance of the software image at the first intermediate network point. A tracking module detects an update to the software image on the storage device. The storage module copies the updated software image to the first intermediate network point as an updated image instance.
Abstract:
A client computer system is provided with two operating systems, one of which is a user operating system (UOS) and the other of which is a service operating system (SOS), and a hypervisor. In the event of a hang in the first operating system, the second operating system remains active, out of the awareness of the user of the system, and has reporting and command response capabilities beyond those of prior technology.
Abstract:
A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
Abstract:
A method for providing centralized user authorization to allow secure sign-on to a computer system is disclosed. In response to a user attempting to boot up a computer system, a message is sent to a trusted server by a hypervisor within the computer to request a new hard drive password for the computer system. If the user is not authorized to access the computer system, a packet is sent by the trusted server to instruct the hypervisor to stop any boot process on the computer system. If the user is authorized to access the computer system, a packet containing a partial hard drive password is sent by the trusted server to the computer system. The packet is then encrypted with a system public key by the computer system to yield the partial hard drive password. The computer system subsequently combines the partial hard drive password with a user password to generate a new complete hard drive password to continue with the boot process.