摘要:
A computer determines whether it has been booted from a hard disk drive or from an alternate source (e.g., a floppy drive or portable memory) that entails a higher risk of importing a virus into the computer, and if it is determined that a non-HDD source was booted from, corrective action such as a virus scan can be preemptively taken.
摘要:
An apparatus, system, and method are disclosed for securing I/O communications between a blade and peripheral interface device. The apparatus includes a determination module, a source security module, and a source communication module. The determination module identifies I/O data configured for transmission to a destination module configured to receive secure I/O data. The source security module encrypts the I/O data to generate secured I/O data such that subsequent decryption of the secured I/O data is restricted to a destination module. The source communication module transmits the secured I/O data over a vulnerable communication link to the destination module. The vulnerable communication link comprises a message intercept vulnerability. The destination module is configured to unencrypt the secure I/O data for a destination device such as a display device.
摘要:
A data processing system and method are disclosed for prohibiting an unauthorized user from modifying a priority level associated with a client computer system. The priority level is utilized by a client computer system during transmission of the client's data over a network. One of a plurality of priority levels is associated with the client computer system. The plurality of priority levels includes a higher priority level and a lower priority level. The client computer system associates the priority level with the data transmitted by the client computer system over the network. The data associated with the higher priority level is typically transmitted prior to data associated with the lower priority level. In response to an attempt to modify the associated priority level, the client determines whether the attempt is being made by an approved user. In response to a determination that the attempt is not being made by an approved user, the attempted modification of the priority level is prohibited. In another embodiment, a priority level may be associated with each class of data. When the client computer system transmits a packet, the client determines which class of data is included in the packet. The priority level associated with that class is then associated with the packet including that class of data. The client, then, transmits the packet which is associated with one of the priority levels.
摘要:
A data processing system and method are described for providing a dynamically assigned network address to a client computer system. The data processing system includes a server computer system coupled to the network. An access port is provided which is coupled to the network. The computer system is coupled to the network utilizing the access port. The computer system is then powered on. The computer system requires a network address in order to communicate utilizing the network. The computer system initially has no stored network address each time prior to being powered on. A dynamic network address is provided to the computer system utilizing only the access port each time the computer system is powering on.
摘要:
A data processing system and method are disclosed for remotely recovering a client computer system's primary password. The primary password be correctly entered prior to the client computer system becoming fully accessible to a user. The client computer system is coupled to a server computer system utilizing a network. Prior to the client computer system completing a boot process, a user is prompted to enter the primary password. An interrogative password method is provided in response to an incorrect entry of the primary password. The primary password is recoverable in response to a successful execution of the interrogative password method. The primary password is recoverable from the server computer system by the client computer system prior to said client computer system completing said boot process utilizing the interrogative password method.
摘要:
A system and method for connecting a computer terminal (e.g., a personal computer) to a data transmission network with the appropriate settings for connection obtained from the network if the terminal has been moved and the settings are not appropriate for the new location. The system and method involve detecting that the terminal has been removed from the data transmission network, and, if the terminal has been moved, checking to determine whether the previous settings are appropriate for use in the new location. If the settings are appropriate, then the previous settings are used; if not, new settings for the terminal are obtained from the network, using a program such as the IBM's Dynamic Host Connection Program (DHCP), with the details on the settings (or connection) maintained at both the network and the computer terminal and updated when a new or changed connection to the data transmission network is made.
摘要:
A data processing system and method are described for determining a physical location of a client computer system. The client and server computer systems are coupled together to form a local area network. Identifying information is associated with a tag. The client computer system transmits a wireless query signal to a physical region. In response to the tag being located within the physical region, the tag receives the wireless query signal. In response to a receipt of the query signal by the tag, the tag transmits a reply signal. The reply signal includes the identifying information. In response to a receipt of the reply signal by the client computer system, the physical location of the client computer system is determined utilizing the identifying information.
摘要:
A method for providing an authentication of a user of a computer system in a network is disclosed. The method comprises capturing biometric data of a user; encrypting and signing the biometric data with a private key and sending the encrypted and signed data to a central server in the network. The method further comprises accepting and verifying credentials associated with the signed and encrypted data from the server utilizing the public key from the server. The method further comprises installing the credentials into the computer if the credentials are verified. In a method and system in accordance with the present invention, a user can walk up to any client within an enterprise and have their locally captured biometric input authenticated at a central server. The user can then have their individual credentials securely imported to the local client for subsequent use during that time period, without needing any additional identification or memory token such as a smartcard.
摘要:
A carton for shipping a computer is provided with an access panel in one of its sidewalls. The access panel is located adjacent to the power connector, network connector, and power switch for the computer. The access panel provides external access to the connectors and the switch when the computer is packaged inside the carton. The carton also has an intake flap and an exhaust flap in its other sidewalls. If the computer needs to be reconfigured or otherwise electronically accessed, the task may be performed without removing the computer from the carton. The access flap is opened so that power and network cables may be coupled to the computer connectors. One end of a ventilation hose is attached to the aperture formed by the intake flap and the other end of the hose is secured to an air compressor. When the computer is operational, the air compressor supplies compressed air through the hose to force ventilating air into the carton. The air circulates inside the carton, around the computer and out the exhaust port to maintain the thermally sensitive components of the computer in an acceptable operating temperature range. In addition, ventilation may be supplied or augmented by evacuating air through the exhaust port.