摘要:
Authentication of an entity remotely managing a data processing system is enabled to allow changes by the remote entity to hard-locked critical security information normally accessible only during the POST and only to trusted entities such as the system BIOS. The remote entity builds a change request and generates a hash from the change request with a current password appended. The change request and the hash are stored in a lockable non-volatile buffer which, once locked, requires a system reset to access. During the next POST, a trusted entity such as the system BIOS reads the change request, generates an authentication hash from the change request and the current password within the hard-locked security information, and compares the buffered hash with the generated hash. If a match is determined, the security information is updated; otherwise a tamper error is reported.
摘要:
A data processing system and method are disclosed for automatically recovering from an unsuccessful boot of the system. A boot of the system is initiated utilizing a first boot code stored in a first storage location. A determination is made regarding whether the boot was successful. If a determination is made that the boot was unsuccessful, a boot is reattempted utilizing a second boot code stored in a second storage device.
摘要:
A client on a network is provided with low power logic, at the network adaptor, that is always active and simulates network packet traffic (e.g. Ethernet packets) normally sent under control of the main client system processor(s). This logic collects client status information regarding power state and reports to the network manager such information which allows the network manager to exercise broader control and perform maintenance and upgrades which would usually require a dialog with the user and consequently limit off-hours reconfiguring of the client.
摘要:
A data processing system and method are described for permitting a server computer system to generate a detailed repair request utilized to a remote client computer system. The server and client computer systems are coupled together utilizing a local area network. In response to an error in operation of the client caused by a malfunctioning part included within the client, the client identifies the malfunctioning part. The client automatically transmits a notification of the error and an identification of the part to the server without requiring a user's presence at the client. The server generates a detailed repair request which includes the identification of the part. The repair request is detailed including an identity of the malfunctioning part to be repaired and is generated remotely by the server without a user's presence at the client being required.
摘要:
A method for providing an authentication of a user of a computer system in a network is disclosed. The method comprises capturing biometric data of a user; encrypting and signing the biometric data with a private key and sending the encrypted and signed data to a central server in the network. The method further comprises accepting and verifying credentials associated with the signed and encrypted data from the server utilizing the public key from the server. The method further comprises installing the credentials into the computer if the credentials are verified. In a method and system in accordance with the present invention, a user can walk up to any client within an enterprise and have their locally captured biometric input authenticated at a central server. The user can then have their individual credentials securely imported to the local client for subsequent use during that time period, without needing any additional identification or memory token such as a smartcard.
摘要:
A method and system are disclosed for transmitting a network packet which identifies only selected ones of a plurality of client computer systems. The client computer systems are coupled to a server computer system to form a network. A logical group is specified which includes only a first plurality of the plurality of client computer systems by specifying one of a plurality of group identifiers. A network packet is then transmitted utilizing the network to the logical group. The network packet includes the group identifier which identifies the logical group, wherein only the logical group are the intended recipients of the packet.
摘要:
A method of monitoring a networked computer system by detecting a change to a configuration of the computer system, using detection logic of the computer, and generating an alert associated with any change in the configuration in real time. The alert is transmitted to a remote server on the network. In an illustrative implementation, the detection logic can detect (i) a change in the number of storage devices present in the computer system, (ii) a change in the number of memory modules present in the computer system, and (iii) a change in the number of processors present in the computer system. The configuration information may be saved between boot operations of the computer using a battery-powered latch.
摘要:
A method of monitoring a computer system, by detecting a power interruption to the computer system, using power down sense logic, and generating an alert associated with the power interruption. When the computer system is networked, the alert is transmitted to a remote server. The power down sense logic sends a message to an auxiliary processor (which may be an application-specific integrated circuit, or ASIC), and the auxiliary processor creates a network transmission packet indicating that the computer system is losing power. The auxiliary processor may allow selection of a transmission mode such as uni-cast transmission, multi-cast transmission, or broadcast transmission. A common power supply provides a first power signal to the computer system, and a second power signal to the power down sense logic and auxiliary processor, and maintains the second power signal for a longer duration than the first power signal upon removal of a power source for the power supply, sufficient to carry out the sending of the message from the power down sense logic and the creating of the network alert.
摘要:
A method, computer program, and system for paging platform configuration registers in and out of a trusted platform module. In a trusted computing platform, an unlimited number of platform configuration registers can be obtained through paging. The trust platform module encrypts and decrypts platform configuration registers for storage outside the trusted platform module.
摘要:
When a flash unlock routine unlocks the flash memory to permit updating of a BIOS image, a message is left in secure non-volatile memory, such as a EEPROM. Upon the next re-boot, the boot block code will detect the special message in the non-volatile memory and perform a signature verification of the next block of code that is to be executed during the POST process. This code block will check the remainder of the BIOS image before POST proceeds.