摘要:
An update utility requests a signature verification of the utility's signature along with a request to unlock the flash memory stored in the utility. A trusted platform module (“TPM”) performs a signature verification of the utility using a previously stored public key. Upon verification of the signature, the TPM unlocks the flash memory to permit update of the utility. Upon completion of the update, the flash utility issues a lock request to the TPM to relock the flash memory.
摘要:
A computer system is presented which provides a trusted platform by which operations can be performed with an increased level trust and confidence. The basis of trust for the computer system is established by an encryption coprocessor and by code which interfaces with the encryption coprocessor and establishes root of trust metrics for the platform. The encryption coprocessor is built such that certain critical operations are allowed only if physical presence of an operator has been detected. Physical presence is determined by inference based upon the status of registers in the core chipset.
摘要:
An apparatus and method for exclusively binding data to a data processing system. The logical binding apparatus of the present invention includes a detachable circuit device mounted within a system planar. Data to be bound within the system planar is stored in a memory device within the detachable circuit device. A battery signal is applied from the system planar to a binding pin on the detachable circuit device, wherein the binding pin is applied to the input of a binding latch. The binding latch remains in a reset state while the battery signal is applied. Upon removal of said binding signal from the binding pin, the binding latch is set thus signaling a processing unit within the detachable circuit device to remove the data from the memory device.
摘要:
A method of asset control and workstation computer deployment that utilizes a dual port electronic memory identification RFID tag to hold serial number and hardware and software configuration profiles as well as user information. The RFID tag is mapped into the workstation computer memory space and can also be read and written by wireless radio frequency signalling. Serial numbers and MAC address is stored on the tag by the manufacturer. User information, workstation profile and software image information is stored onto the tag while the computer is being received for forwarding to the final workstation destination without the need to unpack and power up the computer. The information stored on the tag is used to allow automated system configuration and software downloading to the computer.
摘要:
Methods and apparatus applying RFID technology to identify electronic components, devices, and systems to provide functions such as, for example, security of the assets, inventory tracking of the assets, identification of the assets, and short distance communication between the assets are disclosed. RFID transponders are integrated into electronic components, devices and systems at the component level (i.e., circuit chip, circuit board, etc.), the asset level (i.e., box, computer, etc.), or system level (i.e., network system, computer system, etc.).
摘要:
A computer system is presented which provides a trusted platform by which operations can be performed with an increased level trust and confidence. The basis of trust for the computer system is established by an encryption coprocessor and by code which interfaces with the encryption coprocessor and establishes root of trust metrics for the platform. The encryption coprocessor is built such that certain critical operations are allowed only if physical presence of an operator has been detected. Physical presence is determined by inference based upon the status of registers in the core chipset.
摘要:
A method and system for booting up a computer system in a secure fashion is disclosed. The method and system comprise determining the presence of a security feature element during an initialization of the computer system wherein the security feature element includes a public key and a corresponding private key, storing a portion of the public key in a nonvolatile memory within the computer system if the security feature element is present and utilizing an algorithm to determine the presence of the security feature element prior to a subsequent boot-up of the computer system. Through the use of the present invention, a computer system is capable of being booted up whereby the computer system determines if a security feature element was previously present in the system. If a security feature element was previously present in the computer system, any stored keys, along with the secrets that they protect, are prevented from being compromised. It is also an object of the present invention to preclude the system from compromising any keys and associated secrets if a security feature element in the system was not previously present in the system.
摘要:
A method of monitoring a computer system, by detecting a power interruption to the computer system, using power down sense logic, and generating an alert associated with the power interruption. When the computer system is networked, the alert is transmitted to a remote server. The power down sense logic sends a message to an auxiliary processor (which may be an application-specific integrated circuit, or ASIC), and the auxiliary processor creates a network transmission packet indicating that the computer system is losing power. The auxiliary processor may allow selection of a transmission mode such as uni-cast transmission, multi-cast transmission, or broadcast transmission. A common power supply provides a first power signal to the computer system, and a second power signal to the power down sense logic and auxiliary processor, and maintains the second power signal for a longer duration than the first power signal upon removal of a power source for the power supply, sufficient to carry out the sending of the message from the power down sense logic and the creating of the network alert.
摘要:
The present invention is directed toward a method, system and computer readable medium (the present invention) for tracking memory modules in a computer system. The present invention includes identifying each of the memory modules based upon identification information added to each of the memory modules by their manufacturer to provide a unique serial number by each of the memory modules; and providing the unique serial number to a display via a browser. The identification information comprises electronically readable information which is preferably stored in an electronically erasable programmable read only memory (EEPROM) and from which the unique serial numbers are generated for identifying the memory modules. One aspect of the present invention further includes comparing the unique serial numbers with corresponding last known serial numbers, wherein a mismatch in the serial numbers indicates that the corresponding memory modules have been replaced. Another aspect of the present invention further includes copying the unique serial numbers to a radio frequency (RF) enabled memory, wherein the unique serial numbers can be logged utilizing an RF reader means. The RF reader may be included in an RF gate and/or a hand held device. Computer systems with Radio Frequency Identification (RFID) technology configured in accordance with the present invention enable automated electronic tracking of computer assets such as the memory modules as they pass through the RF gate in or out of a portal.
摘要:
Described is a system which includes at least one computer system connected to a main computer system via a data transmission network. The at least one computer system has a network connector for communicating data with the main computer. The network connector is supplied with auxiliary power and is operative to communicate with the main computer regardless of whether the at least one computer system is in a normal operating state. The main computer includes a program for detecting when the at least one computer system has been disconnected from the data transmission network. The program sends a first packet to the at least one computer system via the network. The at least one computer system is operative to receive the first packet and respond by sending a second packet to the main computer. The second packet includes data which specifically identifies the at least one computer system.