摘要:
A method for authentication in a computer system includes registering a biometric template in the computer system, thereafter, verifying the authenticity of the registered biometric template and then comparing the biometric template with a biometric image of a user if the biometric template is authentic. If the user's biometric image matches the biometric template, the computer system will continue to boot.
摘要:
A method and system for conserving battery strength of a mobile node, such as a laptop computer, on a wireless local area network (WLAN). The mobile node transmit symbols, which are units of data, during transmission cycles to maintain a connection with the WLAN. A battery charge level of the mobile node is measured. As the battery charge level drops below pre-defined levels, a frequency of symbol transmission for the mobile node is reduced. The reduction of the frequency of the symbol transmission results in lower power demands by a transmitter chipset of the mobile node. Thus, the mobile node is able to prolong the life of the battery of the mobile node.
摘要:
A computer system and method are disclosed for generating a certificate that can be validated against a trusted hardware subsystem within a computer system. A security subsystem is established within the computer system. A master key pair including a master public key and master private key are established. The master private key is stored in protected storage within the security subsystem such that the master private key is inaccessible outside of the security subsystem. Generation of a self-verifying certificate is requested. A user of the computer system is then prompted to enter an authentication code in response to the request for generation of the certificate. A certificate is generated utilizing the master key pair only in response to a correct entry of the authentication code. The certificate is used only internally within the computer system.
摘要:
A data processing system and method are disclosed for remotely recovering a client computer system's primary password. The primary password be correctly entered prior to the client computer system becoming fully accessible to a user. The client computer system is coupled to a server computer system utilizing a network. Prior to the client computer system completing a boot process, a user is prompted to enter the primary password. An interrogative password method is provided in response to an incorrect entry of the primary password. The primary password is recoverable in response to a successful execution of the interrogative password method. The primary password is recoverable from the server computer system by the client computer system prior to said client computer system completing said boot process utilizing the interrogative password method.
摘要:
A data processing system and method are disclosed for maintaining secure user private keys in a non-secure storage device. A master key pair is established for the system. The master key pair includes a master private key and a master public key. The master key pair is stored in a protected storage device. A unique user key pair is established for each user. The user key pair includes a user private key and a user public key. The user private key is encrypted utilizing the master public key. The encrypted user private key is stored in the non-secure storage device, wherein the encrypted user private key is secure while stored in the non-secure storage device.
摘要:
A method of asset control and workstation computer deployment that utilizes a dual port electronic memory identification RFID tag to hold serial number and hardware and software configuration profiles as well as user information. The RFID tag is mapped into the workstation computer memory space and can also be read and written by wireless radio frequency signalling. Serial numbers and MAC address is stored on the tag by the manufacturer. User information, workstation profile and software image information is stored onto the tag while the computer is being received for forwarding to the final workstation destination without the need to unpack and power up the computer. The information stored on the tag is used to allow automated system configuration and software downloading to the computer.
摘要:
A method for associating a password with a secured public/private key pair is disclosed. A user public/private key pair is first established for a user. The user public/private key pair includes a user public key and a user private key. Then, the user public/private key pair is encrypted along with a random password, utilizing a chip public key. Next, a first password is generated by hashing a pass phrase. Finally, the random password is encrypted along with the first password, also utilizing the chip public key. As a result, a user can assess the user private key to perform an authentication function by providing the pass phrase.
摘要:
A system and method for connecting a computer terminal (e.g., a personal computer) to a data transmission network with the appropriate settings for connection obtained from the network if the terminal has been moved and the settings are not appropriate for the new location. The system and method involve detecting that the terminal has been removed from the data transmission network, and, if the terminal has been moved, checking to determine whether the previous settings are appropriate for use in the new location. If the settings are appropriate, then the previous settings are used; if not, new settings for the terminal are obtained from the network, using a program such as the IBM's Dynamic Host Connection Program (DHCP), with the details on the settings (or connection) maintained at both the network and the computer terminal and updated when a new or changed connection to the data transmission network is made.
摘要:
A data processing system and method are described for determining a physical location of a client computer system. The client and server computer systems are coupled together to form a local area network. Identifying information is associated with a tag. The client computer system transmits a wireless query signal to a physical region. In response to the tag being located within the physical region, the tag receives the wireless query signal. In response to a receipt of the query signal by the tag, the tag transmits a reply signal. The reply signal includes the identifying information. In response to a receipt of the reply signal by the client computer system, the physical location of the client computer system is determined utilizing the identifying information.
摘要:
Described is a computer system which can be pre-set over a network to boot to a first or second remote boot protocol prior to being powered on over the network. The system is coupled to a remote computer via a data communication link. The system includes a communication subsystem for communicating data with the computer system. The communication subsystem is supplied with auxiliary power and is operative to communicate with the computer system regardless of whether the computer system is in a normal operating state. The remote computer includes a program for sending a first packet to the computer system via the communication link. The first packet contains a boot parameter which is indicative of the first or second remote boot protocol. The computer system is operative to receive the first packet via the communication subsystem and store the boot parameter in a memory thereof without powering on. The memory is accessed by BIOS during a network boot sequence and the system will boot in accordance with the specified boot protocol stored in the memory.