Abstract:
A system and method for access control of a hardfile responsive to a computer system having an operating system is disclosed. The method includes detecting a special boot condition during a pre-boot test of the computer system; and altering, in response to the special boot condition, an operating system access configuration of the hardfile. The system includes a computer system that adjusts an operating system access to a hardfile based upon various boot conditions.
Abstract:
During power up initialization, security data such as passwords and other sensitive data which are stored in a lockable memory device are read and copied to protected system management interrupt (SMI) memory space, subject to verification by code running in the SMI memory space that the call to write the security data originates with a trusted entity. Once copied to SMI memory space, the security data is erased from regular system memory and the lockable storage device is hard locked (requiring a reset to unlock) against direct access prior to starting the operating system. The copy of the security data within the SMI memory space is invisible to the operating system. However, the operating system may initiate a call to code running in the SMI memory space to check a password entered by the user, with the SMI code returning a “match” or “no match” indication. The security data may thus be employed after the lockable memory device is hard locked and the operating system is started.
Abstract:
In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from an administration system in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. If the incoming packet matches the particular data sequence associated with the sleeping computer, the sleeping computer transmits a reply message to the administration system. Upon receiving the reply, the administration system modifies the reply message in a predetermined manner and transmits the modified reply to the sleeping computer. If the sleeping computer determines the reply message was modified in the predetermined manner, then a signal is issued to wake the sleeping computer. Otherwise, the incoming packet is discarded and the sleeping computer is not awakened.
Abstract:
A computer system processor incorporates a special S-latch which may only be set by secure signals. One state of the S-latch sets the processor into a secure mode where it only executes instructions and not commands from an In Circuit Emulator (ICE) unit. A second state of the S-latch sets the processor into a non-secure mode. A non-volatile random access memory (NVRAM) is written with secure data which can only be read by boot block code stored in a BIOS storage device. The boot block code is operable to read the secure data in the NVRAM and set the S-latch to an appropriate security state. If the boot block code cannot set the S-latch, then remaining boot up with BIOS data is stopped. On boot up the boot block code reads the NVRAM and sets the S-latch into the appropriate security state.
Abstract:
An apparatus and method for exclusively binding data to a data processing system. The logical binding apparatus of the present invention includes a detachable circuit device mounted within a system planar. Data to be bound within the system planar is stored in a memory device within the detachable circuit device. A battery signal is applied from the system planar to a binding pin on the detachable circuit device, wherein the binding pin is applied to the input of a binding latch. The binding latch remains in a reset state while the battery signal is applied. Upon removal of said binding signal from the binding pin, the binding latch is set thus signaling a processing unit within the detachable circuit device to remove the data from the memory device.
Abstract:
A data processing system and method are described for permitting a server computer system to remotely disable an input device included within a client computer system coupled to the server utilizing a network. The server computer system transmits a message to the client computer system to disable the input device. In response to a receipt of the message, a network adapter included within the client computer system disables the input device by prohibiting a data stream output from the input device from being received by an input/output controller included within the client computer system.
Abstract:
A folding keyboard for a data processing system having two or more keyboard sections, keys attached to the keyboard sections, and a keyboard housing for receiving the keyboard sections. The keyboard may be configured to assume an extended position in which each of the keyboard sections is extended, and may be further configured to assume a second position in which each of the keyboard sections are collapsed. The keyboard may be further configured to transmit in response to a change in the extension state of the keyboard, a state signal to the data processing system for directing the data processing system to transition between a wake mode and a sleep mode. The keyboard may include one or more connectors attached to the keyboard sections for transitioning the keyboard from the extended position to the collapsed position, may include one or more rollers for facilitating movement of the keyboard between the extended position and the collapsed position, and may include one or more locks for selectively maintaining the keyboard in the extended position or the collapsed position.
Abstract:
A data processing system and method are described for permitting a server computer system to function as a remote keyboard input device for a client computer system prior to the client computer system completing its boot process. The client computer system is coupled to the server computer system utilizing a network. Each keystroke entered into the server computer system is captured by the server. A scan code associated with each captured keystroke is transmitted to the client computer system utilizing the server computer system via the network. The scan code associated with each keystroke is executed utilizing the client computer system. The server computer system functions as a remote keyboard input device for the client computer system.
Abstract:
A method for remotely powering up a computer, includes: receiving a telephone call by a device coupled to a powered down computer; determining an originator's telephone number for the telephone call; determining if the originator's telephone number matches one of a plurality of authorized telephone numbers; and powering up the computer if the originator's telephone number matches one of the plurality of authorized telephone numbers. The method and system utilizes the well known “Caller-ID” technology to determine the originator's telephone number for a telephone call received by a modem coupled to the computer. If there is no match, the computer remains in a powered down state. In this manner, the system discriminates between the received telephone calls, and avoids powering up the computer when the received call is not for this purpose. This avoids wasting power.
Abstract:
A periodic system “wake-up” is implemented during S1, S2 or S3 states utilizing a hardware timer. A memory scrubbing routine is initiated that reads out all memory locations and writes back any memory locations that have single bit (correctable) Error Correction Code errors. This procedure minimizes the chances of a multiple bit error build up over time that may cause an unrecoverable error. The scrubbing routine is invoked whenever the system is brought out of S1, S2, or S3 state to insure that there are no single bit errors present when full system operation is resumed.