摘要:
A system and method to allow valid profiles in autonomic computing discover is presented. A client accesses a network and sends a profile information request to a central computing device, such as a server. The server identifies client properties, such as the client's location and a user functionality description which corresponds to the client's user. The server uses the identified client properties to select an appropriate master profile from a master profile look-up table. The server sends master profile information, such as the master profile's pathname and revision time, to the client. In turn, the client determines whether it already has a valid profile or whether it should download an up-to-date version. If the client requires an up-to-date profile version, the client downloads the master profile from the server and uses the downloaded profile for various computing tasks.
摘要:
A data processing system and method are disclosed for protecting data within a hard disk drive included within a data processing system. Data is generated. A signature value is provided which is stored in a signature device. The signature device is capable of being inserted into and removed from a computer system. A textual description of the data is created. The data is encrypted utilizing both the signature value stored on the device and the textual description. The encrypted data is then stored on the hard disk drive. The data processing system does not permanently store encryption keys.
摘要:
A computing system includes a security register, in which a flag bit is set whenever a clock pulse and scan code are transmitted from the microcontroller in the system keyboard. The presence of this flag bit indicates that an associated code, which is stored in an output buffer of the keyboard/auxiliary device controller of the system has been sent by the keyboard, as a result of a keystroke, instead of by a program executing within the CPU of the system. The security register is read and reset as the associated code is read from the output buffer. An application program can use the data from the security register to determine if data has come from the surreptitious entry of data through keystroke emulation.
摘要:
Features of a data processing system, such as its configuration, are protected utilizing a machine-specific limited-life password. The data processing system includes execution resources for executing a watchdog program, a limited-life value generator, and non-volatile storage that stores a machine-specific value at least partially derived from relatively unique information associated with the data processing system (and preferably also derived from a secret control password). In response to each attempted access to the protected features of the data processing system, the watchdog program generates at least one machine-specific limited-life password from the machine-specific value and a limited-life value generated by the limited-life value generator. The watchdog program allows access to the protected features in response to entry of the machine-specific limited-life password and otherwise denies access. Depending upon implementation, the limited-life value can represent a timestamp that limits the duration that the machine-specific limited-life value is valid or a nonce that limits the number of times that the machine-specific limited-life value can be used.
摘要:
A system and method for isolating a computer system from entry of a personal identification number (PIN) to a smart card. The system and method includes a computer system that is in communication with an unsecure network to allow a user to engage in a purchase transaction. The system and method also includes a smart card reader in which a smart card is inserted and read. A secure personal-identification-number (PIN) entry device is coupled between the computer system and the smart card reader. The secure PIN entry device is used for entering a correct code for the PIN. Communication between computer system and secure PIN entry device is disconnected until the correct code for the PIN is entered at secure PIN entry device and sent to the smart card in order to authorize use of the smart card for the purchase transaction. In response to the correct code for the PIN being entered and sent to the smart card, communication between computer system and secure PIN entry device is established. The secure PIN entry device has a processor for controlling the disconnection and connection of communication between the computer system and the secure PIN entry device. The secure PIN entry device also has a display for displaying a message request relating to the purchase transaction. The message request prompts a user to provide the PIN to authorize use of the smart card for a purchase transaction.
摘要:
An apparatus for broadcasting optical signals within an optoelectric computer network is disclosed. The optoelectric computer network includes multiple computers. Each of the computers includes a first fiber optic cable for sending optical signal beams and a second fiber optic cable for receiving optical signal beams. The apparatus for broadcasting optical signals within the optoelectric computer network includes a lens and a mirror array. The lens is capable of splitting an optical signal beam received from a first fiber optic cable of one of the computers into multiple optical signal beams. The mirror array, which is formed by an array of deformable mirrors, then individually directs each of the split optical signal beams to a respective second fiber optic cable of the selected remaining computers within the optoelectric computer network.
摘要:
A computer-input stylus which provides visual color feedback when utilized in conjunction with a computer-implemented software-based drawing application. The input stylus includes a cylindrical body in a conical tip. A color display within the stylus is utilized to illuminate the conical tip with a color indicative of a currently selected color within the software-based drawing application, providing visual color feedback. The color display is implemented utilizing multiple light-emitting diodes or an active matrix liquid crystal display mounted within an optically transparent portion of the conical tip.
摘要:
A computer system with a PC Card external connector sends signals to PCI devices as if respective PC Card functions. A cooperating docking station connects to the PC Card connector and so processes the PC Card signals that a set of signals for supporting PCI bus standard are made available at a PCI bus of the docking station. The docking station is hence able to connect to a bus commonly available on computers, particularly laptop computers, for direct plug-in connection and yet supports connection of PCI adapters that otherwise tend to be supported only within a main computer at an internal PCI bus.
摘要:
An Internet appliance has added hardware and software functionality to allow communication where a dialing action request is authorization is verified using a personal identification means (PIM). A user first selects a communication access number by requesting a dialing action on a actual or a virtual keypad or by clicking a “hot spot” on a Web page. Selecting an access number (e.g., dialing of a telephone number), alerts the user of the Internet appliance of the selection process whether the user instigates or the selection is attempted from a remote device using the Internet appliance facilities. Either method will trigger software commands that prompt the user to enter a PIM either to authorize his own use or another one's use of the Internet appliance. The PIM may comprise, but is not limited to, keying in a personal identification number (PIN), a biometric identification, or a smart card stored number. The PIM is correlated to an authorization means that verifies that the user so identified is authorized to make or allow the prescribed connection. The Internet appliance has a security protocol that is used to encrypt and decrypt the PIM data. Also the device drivers used to execute a dialing action are also encrypted by the security protocol and are only decrypted on granting of authorized use of the Internet appliance. If the user so requests and is authorized, they may also select to use the security protocol to execute secure communication. The security protocol includes but is not limited to a Public/Private symmetric key technology.
摘要:
A system, method, and program for managing a user key used to sign a message for a data processing system having an encryption chip are disclosed. A user is assigned a user key. In order to encrypt and send messages to a recipient(s), the messages are encrypted with the user key. The user key, in turn, is encrypted with an associated key. The associated key is further encrypted using an encryption chip key stored on the encryption chip. The encrypted messages are communicated to a recipient to validate an association of the user with the encrypted messages. The associated key is decrypted with the encryption chip key. The user key is decrypted with the associated key, and the messages are decrypted with the user key. Thereafter, validation of the association of messages with the user is removed by revoking the associated key. In a preferred embodiment, encryption resources are centralized in a server system having the encryption chip. The server system is coupled to and provides encryption services to a plurality of client systems. Messages to be encrypted are sent from a user's client system to the server system, which encrypts the messages using the encryption chip. The encrypted messages are sent from the server system to the client system, which then transmits the encrypted messages to their intended recipient(s). All data relating to the encrypted messages are erased from the server system after the encrypted messages are sent from the server system to the client system.