Abstract:
A system, method, and program product is provided that updates the firmware on a hybrid drive by reserving a memory area within the hybrid disk drive's nonvolatile memory buffer. The firmware update is then stored in the reserved memory area. The next time the platters of the hybrid disk drive spin up, the firmware update that is stored in the reserved memory area is identified. The identified update is then written to a firmware memory of a firmware that controls the operation of the hybrid drive. In one embodiment, the update is written to the firmware memory by flashing the firmware's memory. After the firmware is updated, the hybrid drive is reset. Resetting of the hybrid drive includes executing the updated firmware.
Abstract:
An electronic device receives a stop position tag that indicates a stop position within first electronic content which is a first sensory type. The electronic device identifies a start position within second electronic content using the stop position tag. The second electronic content is a second sensory type that is different than the first sensory type. In turn, the electronic device executes the second electronic content at the identified start position. In one embodiment, the first sensory type is an auditory sensory type and the second sensory type is an image sensory type.
Abstract:
A method, apparatus, and system are disclosed for updating firmware on a storage device. The apparatus includes a detection module and an update module. The detection module detects, during a boot sequence, an indicator of an available update of firmware controlling a storage device. The available update is stored on non-volatile storage media of the storage device. The update module updates the storage device with the available update in response to the detection module detecting the indicator of the available update.
Abstract:
A method and apparatus are disclosed for sharing an integrity security module in a dual-environment computing device. The apparatus include an integrity security module, one or more processors, a detection module and a regeneration module. The one or more processors may have access to the integrity security module and may operate in two distinct operating environments of a dual-environment computing device. The detection module may detect, during an initialization sequence, a power state transition of an operating environment of the dual-environment computing device. The regeneration module may regenerate one or more integrity values from a stored integrity metric log in response to detecting the power state transition of the operating environment of the dual-environment computing device.
Abstract:
An apparatus and method are disclosed for dynamically zoning a touch screen environment. The apparatus includes an identification module detecting a number of users around a perimeter of a display, a zoning module generating, via a processor, a plurality of user zones in response to the number of users detected, and a positioning module orienting a gesture zone, within each of the plurality of user zones, in relation to a corresponding user. The method includes detecting a number of users around a perimeter of a display, generating, via a processor, a plurality of user zones in response to the number of users detected, and orienting a gesture zone, within each of the plurality of user zones, in relation to a corresponding user.
Abstract:
A method, apparatus, and system are disclosed for updating firmware on a storage device. The apparatus includes a detection module and an update module. The detection module detects, during a boot sequence, an indicator of an available update of firmware controlling a storage device. The available update is stored on non-volatile storage media of the storage device. The update module updates the storage device with the available update in response to the detection module detecting the indicator of the available update.
Abstract:
Computer implemented method, system and computer program product for controlling software entitlement. A computer implemented method for controlling software entitlement includes receiving a request to install a software item on a designated machine. A determination is made if the designated machine is of a machine type authorized for installation of the software item. If the designated machine is of a machine type authorized for installation of the software item, a determination is made, using stored configuration data, if at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied using stored configuration data. If the at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied, installation of the software item on the designated machine is enabled in accordance with the at least one additional criterion.
Abstract:
A system, method, and program product is provided that initializes expected PCRs stored in a TPM by generating and storing a random number, seeding expected PCRs with the random number, inputting a set of startup code processes to a hash algorithm resulting in a set of hash values, updating the expected PCRs using the set of hash values, and saving the expected PCRs in a nonvolatile data area that is secured by the TPM. Upon reboot, the random number is retrieved from the nonvolatile data area, the PCRs are seeded with the retrieved random number, the startup code processes are input to the hash algorithm process resulting in another set of hash values, the PCRs are updated using the resulting set of hash values, and an encrypted data object is decrypted in response to the PCRs being the same as the expected PCRs.
Abstract:
A data processing system and method of password protecting the boot of a data processing system are disclosed. According to the method, in response to an attempt to boot the data processing system utilizing a boot device, the boot device is interrogated for a password. If the boot device supplies password information corresponding to that of a trusted boot device, the data processing system boots utilizing the boot device. If, however, the boot device does not supply password information corresponding to that of a trusted boot device, booting from the boot device is inhibited. In a preferred embodiment, the password information comprises a unique combination of the boot device's manufacturer-supplied model and serial numbers.
Abstract:
To unlock a HDD when a computer is in the suspend state, at both BIOS and the HDD a secret is combined with a password to render a new one-time password. BIOS sends its new one-time password to the HDD which unlocks itself only if a match is found. The new one-time password is then saved as an “old” password for subsequent combination with the secret when coming out of subsequent suspend states. In this way, if a computer is stolen the thief cannot sniff the bus between BIOS and the HDD to obtain a password that is of any use once the computer ever re-enters the suspend state.