摘要:
An apparatus and method for exclusively binding data to a data processing system. The logical binding apparatus of the present invention includes a detachable circuit device mounted within a system planar. Data to be bound within the system planar is stored in a memory device within the detachable circuit device. A battery signal is applied from the system planar to a binding pin on the detachable circuit device, wherein the binding pin is applied to the input of a binding latch. The binding latch remains in a reset state while the battery signal is applied. Upon removal of said binding signal from the binding pin, the binding latch is set thus signaling a processing unit within the detachable circuit device to remove the data from the memory device.
摘要:
A method of asset control and workstation computer deployment that utilizes a dual port electronic memory identification RFID tag to hold serial number and hardware and software configuration profiles as well as user information. The RFID tag is mapped into the workstation computer memory space and can also be read and written by wireless radio frequency signalling. Serial numbers and MAC address is stored on the tag by the manufacturer. User information, workstation profile and software image information is stored onto the tag while the computer is being received for forwarding to the final workstation destination without the need to unpack and power up the computer. The information stored on the tag is used to allow automated system configuration and software downloading to the computer.
摘要:
Methods and apparatus applying RFID technology to identify electronic components, devices, and systems to provide functions such as, for example, security of the assets, inventory tracking of the assets, identification of the assets, and short distance communication between the assets are disclosed. RFID transponders are integrated into electronic components, devices and systems at the component level (i.e., circuit chip, circuit board, etc.), the asset level (i.e., box, computer, etc.), or system level (i.e., network system, computer system, etc.).
摘要:
A computer system is presented which provides a trusted platform by which operations can be performed with an increased level trust and confidence. The basis of trust for the computer system is established by an encryption coprocessor and by code which interfaces with the encryption coprocessor and establishes root of trust metrics for the platform. The encryption coprocessor is built such that certain critical operations are allowed only if physical presence of an operator has been detected. Physical presence is determined by inference based upon the status of registers in the core chipset.
摘要:
Access to secure data through a portable computing system is provided only when a timer within the system is running. The timer is reset with the portable system connected to a base system, either directly, as by a cable, or indirectly, as through a telephone network. In an initialization process, the portable and base systems exchange data, such as public cryptographic keys, which are later used to confirm that the portable system is connected to the same base system. In one embodiment, the initialization process also includes storing a password transmitted from the portable system within the base system, with this password later being required within the reset process.
摘要:
A method for providing an authentication of a user of a computer system in a network is disclosed. The method comprises capturing biometric data of a user; encrypting and signing the biometric data with a private key and sending the encrypted and signed data to a central server in the network. The method further comprises accepting and verifying credentials associated with the signed and encrypted data from the server utilizing the public key from the server. The method further comprises installing the credentials into the computer if the credentials are verified. In a method and system in accordance with the present invention, a user can walk up to any client within an enterprise and have their locally captured biometric input authenticated at a central server. The user can then have their individual credentials securely imported to the local client for subsequent use during that time period, without needing any additional identification or memory token such as a smartcard.
摘要:
A method and system for updating a root of trust measurement (RTM) function in a personal computer is disclosed. The RTM function is located in a boot block of the personal computer. The method and system comprise initializing a request to update the RTM function and unlocking the boot block based on an authentication process. The method and system further includes updating the RTM function. Through the use of the method and system in accordance with the present invention, the RTM function in a personal computer is updated in a manner that ensures that the update is authentic.
摘要:
A method of monitoring a computer system, by detecting a power interruption to the computer system, using power down sense logic, and generating an alert associated with the power interruption. When the computer system is networked, the alert is transmitted to a remote server. The power down sense logic sends a message to an auxiliary processor (which may be an application-specific integrated circuit, or ASIC), and the auxiliary processor creates a network transmission packet indicating that the computer system is losing power. The auxiliary processor may allow selection of a transmission mode such as uni-cast transmission, multi-cast transmission, or broadcast transmission. A common power supply provides a first power signal to the computer system, and a second power signal to the power down sense logic and auxiliary processor, and maintains the second power signal for a longer duration than the first power signal upon removal of a power source for the power supply, sufficient to carry out the sending of the message from the power down sense logic and the creating of the network alert.
摘要:
The present invention is directed toward a method, system and computer readable medium (the present invention) for tracking memory modules in a computer system. The present invention includes identifying each of the memory modules based upon identification information added to each of the memory modules by their manufacturer to provide a unique serial number by each of the memory modules; and providing the unique serial number to a display via a browser. The identification information comprises electronically readable information which is preferably stored in an electronically erasable programmable read only memory (EEPROM) and from which the unique serial numbers are generated for identifying the memory modules. One aspect of the present invention further includes comparing the unique serial numbers with corresponding last known serial numbers, wherein a mismatch in the serial numbers indicates that the corresponding memory modules have been replaced. Another aspect of the present invention further includes copying the unique serial numbers to a radio frequency (RF) enabled memory, wherein the unique serial numbers can be logged utilizing an RF reader means. The RF reader may be included in an RF gate and/or a hand held device. Computer systems with Radio Frequency Identification (RFID) technology configured in accordance with the present invention enable automated electronic tracking of computer assets such as the memory modules as they pass through the RF gate in or out of a portal.
摘要:
Described is a system which includes at least one computer system connected to a main computer system via a data transmission network. The at least one computer system has a network connector for communicating data with the main computer. The network connector is supplied with auxiliary power and is operative to communicate with the main computer regardless of whether the at least one computer system is in a normal operating state. The main computer includes a program for detecting when the at least one computer system has been disconnected from the data transmission network. The program sends a first packet to the at least one computer system via the network. The at least one computer system is operative to receive the first packet and respond by sending a second packet to the main computer. The second packet includes data which specifically identifies the at least one computer system.