摘要:
A first device captures session data for each application session that is executing on a first device, and provides the session data to a second device in order for the second device to reconstruct the application sessions. A first device identifies one or more application sessions currently executing on the first device. Each of the application sessions include a media object and session data, which includes a media object identifier that corresponds to the media object and a first device media session position. The first device captures the session data transmits the captured session data to one or more second devices. The second devices are adapted to reconstruct at least one of the application sessions using the received session data and positions the application sessions at a second device media session position that corresponds to the received first device media session position.
摘要:
A system, method, and program product is provided that initializes a counter maintained in a nonvolatile memory of a security module to an initialization value. The security module receives requests for a secret from requesters. The security module releases the secret to the requesters and the released secrets are stored in memory areas allocated to the requesters. A counter is incremented when the secret is released. Requestors send notifications to the security module indicating that the requestor has removed the secret from the requestor's memory area. The security module decrements the counter each time a notification is received. When the computer system is rebooted, if the counter is not at the initialization value, the system memory is scrubbed erasing any secrets that remain in memory.
摘要:
A low power processor in a computer is kept energized in a suspend state in which a main processor of the computer is deenergized. The low power processor maintains a network connection by sending keepalive packets as required by the network communication protocol.
摘要:
An apparatus, system, and method are disclosed for protecting a motion-sensitive device. The apparatus includes an identification module, a determination module, and a scheduler. The identification module identifies a use-intensive task involving the motion-sensitive device. The determination module determines a motion forecast that predicts a substantially motionless time interval. The scheduler schedules the use-intensive task such that the use-intensive task executes within the substantially motionless time interval. In this manner, a historical movement pattern is used to schedule future tasks such that the coincidence of task use of the motion-sensitive device and movement of the motion-sensitive device is minimized.
摘要:
A system, method, and program product is provided that initializes a computer system using an initialization process that identifies secrets that were stored in memory and not scrubbed during a prior use of the computer system. During the initialization process, one or more secret indicators are retrieved that identify whether one or more secrets were scrubbed from the computer system's memory during a previous use of the computer system. If the secret indicators show that one or more secrets were not scrubbed from the memory during the prior use of the computer system, then the initialization process scrubs the memory. On the other hand, if the secret indicators show that each of the secrets was scrubbed from the memory during the prior use of the computer system, then the memory is not scrubbed during the initialization process.
摘要:
A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
摘要:
A system and method to avoid disk lube pooling is presented. A track access monitor tracks the number of times that a program accesses a particular track located on a hard drive. When the track access monitor determines that the number of track accesses to a particular track exceed a track access threshold, the track access monitor invokes a sequence of events to scan adjacent tracks in order to uniformly redistribute lubrication over the hard drive. In one embodiment, the track access monitor incrementally performs the adjacent track scanning during hard drive idle periods, such as when the system waits for a password from a user or when the operating system conserves power and idles the hard drive due to lack of activity.
摘要:
An apparatus, system, and method are disclosed for balancing the read and write requirements of applications running in a computerized system against the requirements to protect a motion sensitive device in the system and requirements to protect data. The apparatus includes an application interface, a motion policy module, and a control module. The application interface delivers configuration parameters and system information to the motion policy module which establishes a policy for controlling the motion sensitive devices. The control module is configured to selectively communicate with one or more applications running in the computerized system and motion sensitive devices on the system. The control module executes actions to protect motion sensitive devices and system data and to maintain data read and write rates on the system in accordance with the configured protection policies and inputs from motion sensor devices.
摘要:
A method and system for enabling security attestation for a computing device during a return from an S4 sleep state. When the computing device enters into the S4 state following a successful boot up, the attestation log is appended to the TPM tick count and the log is signed (with a security signature). When the device is awaken from S4 state, the BIOS obtains and verifies the log created during the previous boot. The CRTM maintains a set of virtual PCRs and references these virtual PCRs against the log. If the values do not match, the return from S4 state fails and the device is rebooted.
摘要:
A system, method, and program product is provided that executes a hypervisor in order to control access to a rental computer system. The hypervisor performs steps that include: reading a rental metric from a nonvolatile storage area, comparing the rental metric with a rental limit, allowing use of one or more guest operating systems by a user of the computer system in response to the rental metric being within the rental limit, and inhibiting use of the guest operating systems by the user of the computer system in response to the rental metric exceeding the rental limit.