摘要:
A system, method, and program product is provided that manages a rental computer system by verifying installation of a secure time-day module in a computer system. The computer system is rendered inoperable if the secure time-day module is not installed. A current time-day value is retrieved from the secure time-day module and an end time-day value is retrieved from a secure storage area. The current time-day value is compared to the end time-day value in order to determine whether a rental period has expired. If the rental period has expired, then the user is prevented from using the rental computer system.
摘要:
A hard disk drive unit includes a microprocessor programmed to erase data stored within the drive unit if it is determined that a process potentially leading to a misuse of the data stored within the drive unit, and if secure disposal configuration data stored in nonvolatile storage within the drive indicates that the data is to be erased. Such a process includes initializing the drive unit for operation without providing a password matching a password stored in the drive unit, initializing the drive unit in a system not having CMOS configuration data matching the drive unit, and determining that a failure rate within the drive unit exceeds a threshold level.
摘要:
A hard disk drive unit includes a microprocessor programmed to erase data stored within the drive unit if it is determined that a process potentially leading to a misuse of the data stored within the drive unit, and if secure disposal configuration data stored in nonvolatile storage within the drive indicates that the data is to be erased. Such a process includes initializing the drive unit for operation without providing a password matching a password stored in the drive unit, initializing the drive unit in a system not having CMOS configuration data matching the drive unit, and determining that a failure rate within the drive unit exceeds a threshold level.
摘要:
An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The payment instrument electronically transacts payments and includes a transaction restriction. An authentication module receives an authentication from a user of the payment instrument. The security module validates the authentication with a first encryption key. In addition, the security module authorizes a change to the transaction restriction using a second encryption key if the authentication is valid. The security module resides on a computer that the user designates as authorized to validate the authentication.
摘要:
An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The payment instrument electronically transacts payments and includes a transaction restriction. An authentication module receives an authentication from a user of the payment instrument. The security module validates the authentication with a first encryption key. In addition, the security module authorizes a change to the transaction restriction using a second encryption key if the authentication is valid. The security module resides on a computer that the user designates as authorized to validate the authentication.
摘要:
A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented.
摘要:
A system and method for using a client-side hypervisor in conjunction with a secure network-side monitoring mechanism to detect removable media insertions since a client's last network session with the secure network is presented. The hypervisor uses a “client-side insertion value” to track the number of times that a user inserts removable media into a socket located on the client. When the client is connected to the secure network, the client's hypervisor notifies the secure network of each insertion and the secure network increments a “secure network-side tracker value.” For each login request, the client includes the client-side insertion value, which the secure network compares against its secure network-side tracker value. When the two values are different, the secure network sends an action request to the client, such as a request to perform a full system scan. Once the client performs the action, the client's hypervisor resets its client-side insertion value and attempts to logon to the secure network again.
摘要:
A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented.
摘要:
A system and method for using a client-side hypervisor in conjunction with a secure network-side monitoring mechanism to detect removable media insertions since a client's last network session with the secure network is presented. The hypervisor uses a “client-side insertion value” to track the number of times that a user inserts removable media into a socket located on the client. When the client is connected to the secure network, the client's hypervisor notifies the secure network of each insertion and the secure network increments a “secure network-side tracker value.” For each login request, the client includes the client-side insertion value, which the secure network compares against its secure network-side tracker value. When the two values are different, the secure network sends an action request to the client, such as a request to perform a full system scan. Once the client performs the action, the client's hypervisor resets its client-side insertion value and attempts to logon to the secure network again.
摘要:
Hypervisors are a new technology in the industry that enable multiple Operating Systems to co-exist on a single client. The use of a hypervisor provides a novel approach to thermal fan control. The hypervisor is able to fire up a maintenance Operating System on demand or have it running from the powering of the computer. The maintenance Operating System continuously monitors the status of the user Operating System and determines if the system is within the desired fan noise profile by measuring noise levels using means well known in the art. If the system seems to be drifting out of the desired profile, the maintenance Operating System will determine what type of action is required and choose the most appropriate course of action. These actions can be performed by either the maintenance Operating System or the hypervisor, as appropriate.