摘要:
Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
摘要:
The disclosed embodiments relate to method and apparatus for providing computer security system. The method may include calculating a hash value of an operation at an administrative system. The signed hash of the operation may be created in the administrative system. The signed hash may be received at the managed system. The managed system may validate the signed hash by using a stored reference hash. Upon determining if the signed hash is valid, the managed system may execute the operation that corresponds to the signed hash.
摘要:
A method and apparatus for protecting a computer system. Specifically, a method and system for validating portions of memory at each power-on cycle is described. A Boot Block is used to validate the BIOS, CMOS and NVRAM of a system. The BIOS may also be used to validate the Boot Block, CMOS and NVRAM.
摘要:
A method and apparatus for protecting a computer system. Specifically, a method and system for validating portions of memory at each power-on cycle is described. A Boot Block is used to validate the BIOS, CMOS and NVRAM of a system. The BIOS may also be used to validate the Boot Block, CMOS and NVRAM.
摘要:
A method and system of quorum negotiation utilizing power mains. Unlike current systems, this communication is provided as a secondary channel, with the primary channel being a standard network system. By using this technique, if the heartbeat is lost over the primary communication system, the secondary, power-mains system can be used to check the heartbeat to validate whether or not the “lost” system is still in operation. If communication cannot be established over the power mains, it is assumed that the “lost” system is down and should be dropped from any cluster.
摘要:
A method for defining the elliptic curve for purposes of elliptic curve encryption using biometrics such as a fingerprint to define the elliptic curve equation's coefficients.
摘要:
A method for providing secure remote control commands in a distributing computer environment. In the preferred embodiment of the invention, a network administrator or network management software creates a shutdown record, including an index or time stamp, for powering down a specified network computer(s). Prior to broadcast over the network, a secure one-way hash function is performed on the shutdown record. The result of the one-way hash function is encrypted using the network administrator's private key, thereby generating a digital signature that can be verified by specially configured network nodes. The digital signature is appended to the original shutdown record prior to broadcast to the network. Upon receiving the broadcast message, the targeted network computer(s) validates the broadcast message by verifying the digital signature of the packet or frame. The validation process is performed by decrypting the hash value representation of the shutdown record using the network administrator's public key. A one-way hash function is also performed on the original shutdown record portion of the received message. If the two values match, the broadcast message is determined to be authentic and the shutdown control code is executed. The invention insures that the shutdown command was neither modified in transit nor originated from an unauthorized source.
摘要:
The read head portion of a chip card reader is compactly mounted on the rear side of a front device bay faceplate in a computer in a manner permitting a peripheral device, representatively a hard disk drive, to be mounted in the device bay immediately behind the read head. To permit this installation of both the card read head and the peripheral device at the same computer drive bay, the read head is installed on the rear side of the faceplate at an acute angle relative thereto, with the card entry opening in the read head being aligned with a card insertion slot formed in the faceplate and being inclined at the read head installation angle. The electronics associated with the read head are also compactly mounted on the rear side of the faceplate. The angling of the read head relative to the device bay faceplate substantially reduces the rearward projection thereof toward the associated drive bay to an extent permitting the read head to be disposed entirely forwardly of the disk drive within the drive bay.
摘要:
A secure start-up system for a computer enables a flash memory to be reset in a secured way. Various operations are carried out to make sure that the reset is an authorized one, and to avoid unauthorized, e.g. virus, infiltration. These operations include multiple tests to avoid the probability of the reset being unauthorized. Any one or more than one of the following can be used. Flashing is only authorized when a special flash enable bit is set in the non-volatile memory. This flash enable bit is reset during every startup cycle. Flashing is only authorized from a cold boot as opposed from a warm boot. This minimizes the possibility of a computer routine authorizing flashing by a software reset. Flashing is only authorized from a floppy. This prevents a virus from writing the flashing routine to the boot sector of a non-removable disc. The user is warned prior to flashing, and asked to confirm. Finally, contents of the flashing routine can be checked using some kind of checking algorithm such as a secure hash algorithm.
摘要:
A method and apparatus for securely transferring an encrypted-data key and a medium key, from a media storage such as a DVD disk to an output device in a computer system, using a randomly generated first secure transfer key generated by a disk drive of the computer system, the first key having a uniqueness factor derived from a phase locked loop circuitry. The first secure transfer key is combined with an output key stored in the output device forming a second secure transfer key. The second secure transfer key is used to encrypt the data key and the medium key to form a third secure transfer key. The third secure transfer key is passed to the output device where the data key and the medium key are decrypted. The data key and the medium key are then used by the output device to decrypt encrypted program data from the disk.