摘要:
Aspects for providing protection against theft and loss of a portable computer system are described. The aspects include establishing boundary conditions within which the portable computer system is authorized for use and tracking a position of the portable computer system with a global position system (GPS) unit in the portable computer system. The position is compared to the boundary conditions to identify whether the portable computer system has violated the boundary conditions, and anti-theft routines are performed when the position has violated the boundary conditions. The anti-theft routines include calling a preset phone number with a cellular calling facility of the portable computer system.
摘要:
A system and method for installing a customized set of software on a personal computer, tailored to the requirements of the prospective user and avoiding unnecessary software and attendant license fees. Software (all that may be desired) in unusable form is loaded onto the personal computer then selected software (that which a particular user may require and/or desire) is converted (decompressed and/or decrypted) to produce usable versions of the selected software while the other software may be erased, if desired, to free up space in storage. The selection of software is done on the user's function (department and/or mission) and may be supplemented by a user selection from a menu, based on a selection utility.
摘要:
Described is a computer system which is coupled to a remote computer via a data communication link. The computer system has a normally closed enclosure and is capable of securing data retained within the system against unauthorized access. The computer system includes an erasable memory element mounted within the enclosure for selective activation to active and inactive states and for receiving and storing a security password when in the active state. A manually operable option switch is mounted within the enclosure. The option switch is operatively connected with the erasable memory element and manually settable by a user of the computer system for setting the erasable memory element to the active and inactive states. A communication line detector is operatively connected with the erasable memory element for detecting a disconnection of the data communication link and for clearing any stored security password from the erasable memory element in response to a change of the communication link detector between a first state and a second state.
摘要:
Method and system aspects for securely transferring a computer system are described. A computer system is disabled at a shipping point via an RFID (radio frequency identification) interface and re-enabled at a receiving point via the RFID interface. Disabling the computer system includes selecting a boot password, writing the boot password to storage in the computer system via the RFID interface, and setting a disable bit in the storage via the, RFID interface. Re-enabling the computer system includes entering the boot password via the RFID interface and clearing the disable bit.
摘要:
A method and system are disclosed for transmitting a network packet which identifies only selected ones of a plurality of client computer systems. The client computer systems are coupled to a server computer system to form a network. A logical group is specified which includes only a first plurality of the plurality of client computer systems by specifying one of a plurality of group identifiers. A network packet is then transmitted utilizing the network to the logical group. The network packet includes the group identifier which identifies the logical group, wherein only the logical group are the intended recipients of the packet.
摘要:
A method for determining the physical locations of a plurality of computers in a network is disclosed. The network includes a plurality of wall plates, each of the wall plates for coupling one of the computers to the network. The method and system comprises providing an additional information physical layer and logic in each of the wall plates. The method and system further comprises capturing and storing the system media access-controller (MAC) address of the connect computer in the additional logic of each of the plurality of wall plates and storing a physical address of the wall plate in the logic of each of the plurality of wall plates. The method and system also comprises providing a command from the network that will cause the system MAC address and the physical address of at least one of the plurality of computers to be provided to an application in the network. A system and method in accordance with the present invention adds a low cost physical layer and logic within an Ethernet wall plate associated with the computer on the network. The logic is designed to respond to a broadcast signal to a UDP (User Datagram Protocol) port. In so doing the physical location of the computer can be determined. In a preferred embodiment, a command is provided from the network that will cause the MAC address and the physical address of at least one of the plurality of computers to be provided to an inventory application in the network, thereby allowing a network administrator to remotely determine the physical location (room, floor, building, etc.) of any and all computers attached to the network.
摘要:
The present invention comprises a method and system for configuring the language of a BIOS of a computer system. The method and system comprise providing a plurality of BIOS images in the computer system, each of the plurality of BIOS images being related to a particular language, selecting one of the pluralities of BIOS images based on the language supported by the computer system and utilizing the selected BIOS to configure the computer system. Through the use of the method and system in accordance with the present invention, the language being supported by the computer system is determined when the computer system is booted up as opposed to when the computer system is being built. This results in an increase in manufacturing productivity since original equipment manufacturers can build computer systems without having to worry about language restrictions.
摘要:
A method and apparatus are disclosed for sharing an integrity security module in a dual-environment computing device. The apparatus include an integrity security module, one or more processors, a detection module and a regeneration module. The one or more processors may have access to the integrity security module and may operate in two distinct operating environments of a dual-environment computing device. The detection module may detect, during an initialization sequence, a power state transition of an operating environment of the dual-environment computing device. The regeneration module may regenerate one or more integrity values from a stored integrity metric log in response to detecting the power state transition of the operating environment of the dual-environment computing device.
摘要:
A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
摘要:
A method and system are disclosed in which a management module (MM) designates an idle blade in a client blade farm to be an “administrative blade” that has administrator access to the virtual images of all users. The MM identifies when a particular user image is, or is not, in use and conveys this information to the administrative blade. The administrative blade performs virus scans, backups, defrags, patch installs, software upgrades, and other such maintenance functions on user images when they are inactive, thereby eliminating the performance impact to active users.