摘要:
A hardware enablement apparatus includes a processor, and a communications interface configured for writing license data to one or more data registers and for using the license data to selectively enable, under control of the processor, hardware features associated with the data registers, at least one of the data registers being implemented in non-volatile memory.
摘要:
A method of enforcing software license protection in a computer system comprising; morphing the data prior to distribution, resulting in morphed data; wherein morphing of data is accomplished by applying a reversible morphing algorithm to modify data, wherein said reversible morphing algorithm is uniquely seeded and/or controlled with control information.
摘要:
A method of protecting data in a computer system against attack from viruses and worms comprising; storing morphed data in system memory; de-morphing data as it is being transferred to cache memory, resulting in de-morphed data.
摘要:
The disclosed embodiments relate to the field of remote server management. More particularly, the disclosed embodiments relate to providing secure communications in the context of remote server management. In an exemplary embodiment of the invention, a client computer uses an established encrypted communication channel to request secret data from a managed server. The managed server provides the requested secret data, which is used by both the managed server and the client computer to encrypt communications across a second communications link.
摘要:
A management sub-system connects via a USB bus to a server or computer being managed. The management sub-system also couples to a management console, which has a number of conventional peripherals, including CD-ROM, floppy drive, hard disk, keyboard, mouse, and the like. These peripherals are emulated as USB peripherals coupled to the server by the management sub-system. The management sub-system includes a Composite USB function logic device that connects to the USB controller in the server. The Composite USB function logic device emulates the various peripherals available at the management console, and provides configuration data to the USB controller consistent with the emulation. Consequently, the server sends and receives data from these peripherals at the management console, as if the peripherals were locally connected by the USB bus to the server. The management sub-system monitors the operation of the server and publishes a web page that can be viewed by a web browser at the management console. In addition to viewing this status information, the management console can operate as a virtual terminal, capable of downloading files and programs from any of the emulated peripherals to the server, and of receiving input signals from the emulated input devices.
摘要:
Embodiments of a tamper-evident connector are disclosed which may optionally be used in a trusted computing environment. In an exemplary embodiment, a tamper-evident connection includes a mate-once engaging assembly for providing with a first component, the mate-once engaging assembly including a foldable portion. The tamper-evident connection also includes a receiving chamber for providing with a second component, the mate-once engaging assembly fitting in the receiving chamber to physically secure the first component to the second component, the foldable portion of the mate-once engaging assembly unfolding during removal of the mate-once engaging assembly from the receiving chamber to provide evidence of tampering when the first component has been removed from the second component. Optionally, the first component is a Trusted Platform Module (TPM) and the second component is a system board.
摘要:
A method for managing disk operations for a computer having a disk array utilizing parity fault tolerant and recovery techniques. A disk READ request results in a copy of the data and its associated parity information being stored in a reserved memory cache. Subsequent WRITE requests to the same disk sectors result in the computer system checking to see if a valid copy of the old parity and data are present in the reserved memory area for the purposes of generating new parity information without having to read the old data and parity information from the disk array.
摘要:
Using a cryptographic co-processor in a computing system to encode data parameters determined during initialization, or during operation, or determined from machine specific values or states to bind data optionally to a specific machine, a specific cryptographic co-processor, or a specific operating environment machine state.
摘要:
One embodiment is a computer system having firmware that shares a secret with a cryptographic co-processor to determine if the cryptographic co-processor has been tampered with or removed from the computer system.
摘要:
A file system technique extends the life cycle of limited read/write media. Rewrite cycles of each file and/or each region of the media may be tracked. Different regions of the media are classified as static and dynamic based on their respective number of rewrite cycles. Static files are migrated to the more worn out or dynamic regions of the media, and dynamic files are integrated to the less worn out or static regions of the media. The file system is further sensitized by allocating a new file to an available region after a most recently used region. Where multiple versions of a data region exist, the file system marks a version of the data region as unstable after a certain number of rewrite cycles to the version and directs rewrite cycles to a subsequent version of the data region.