Abstract:
The invention partitions the HDD into three areas, namely, no access, write-only, and the conventional read/write. Sensitive data (antivirus programs, back up data, etc.) is written into write-only areas, which thereafter become designated “no access” by appropriately changing their designation a data structure known as “logical block address” or “LBA”. Only users having approved passwords can change the status of a “no access” block back to “write-only” or “read/write”.
Abstract:
A system, method, and program product is provided that has a virtualized environment provided by a hypervisor. In the virtualized environment, one or more guest operating systems operate simultaneously with a privileged operating system. One of the guest operating systems identifies a device software update, such as a device driver or firmware update, corresponding to a hardware device that is attached to the computer system. The hypervisor is used to notify the privileged operating system of the device software update. When the privileged operating system is notified of the update, the privileged operating system uses one or more techniques to deny the guest operating systems access to the device. The privileged operating system then updates the device software update. After the device software update has been applied, the privileged operating system resumes access between the guest operating systems and the hardware device.
Abstract:
A system, method, and program product is provided that has a virtualized environment provided by a hypervisor. In the virtualized environment, one or more guest operating systems operate simultaneously with a privileged operating system. One of the guest operating systems identifies a device software update, such as a device driver or firmware update, corresponding to a hardware device that is attached to the computer system. The hypervisor is used to notify the privileged operating system of the device software update. When the privileged operating system is notified of the update, the privileged operating system uses one or more techniques to deny the guest operating systems access to the device. The privileged operating system then updates the device software update. After the device software update has been applied, the privileged operating system resumes access between the guest operating systems and the hardware device.
Abstract:
When data changes in LBAs of a disk storage, the IDs of changed LBAs are written to a cache, with the LBAs being hashed to render a hash result. The hash result and contents of the cache are written to a file on the disk, the cache flushed, and the hash result written back to the cache for hashing together with subsequent changed LBAs. The process repeats. In this way, the hash result in the most current file on the disk can be compared with the hash result in cache, and if the two match, it indicates that the files on the disk contain an accurate record of changed LBAs.
Abstract:
An end user or IT owner via the use of an application specifies which TPM is to be loaded or which TPM operation is to be invoked given the authenticated presentation of a biometric such as a fingerprint or a token such as a smart card. A secure table stored in the microcontroller made up of TPM hashes and their corresponding endorsement keys is indexed to these authentication records. The microcontroller compares a received biometric or smart card value to the stored values to determine which TPM emulator to load. This architecture uniquely stores individually secured algorithms, and applications that can be bound to the user and the system on which they are running.
Abstract:
A system, method, and program product is provided that updates the firmware on a hybrid drive by reserving a memory area within the hybrid disk drive's nonvolatile memory buffer. The firmware update is then stored in the reserved memory area. The next time the platters of the hybrid disk drive spin up, the firmware update that is stored in the reserved memory area is identified. The identified update is then written to a firmware memory of a firmware that controls the operation of the hybrid drive. In one embodiment, the update is written to the firmware memory by flashing the firmware's memory. After the firmware is updated, the hybrid drive is reset. Resetting of the hybrid drive includes executing the updated firmware.
Abstract:
A call from a user operating system (UOS) to BIOS to configure a connected device into a reduced energy consumption mode is routed through a virtual machine monitor (VMM). The VMM determines whether a service O.S. (SOS) is in need of the device and if so the VMM informs the UOS that the device has been configured as ordered, while allowing the SOS to complete its task with the device. If the SOS is not in need of the device, or at the completion of the SOS task with the device, the VMM passes the call to ACPI/BIOS to configure the device in the demanded energy consumption mode.
Abstract:
An intelligent battery charger is disclosed which tracks usage of the computer by the user and the charging and usage habits of the user. This tracking includes dates, times, and elapsed usage time, as well as dates, times, and elapsed charging time. Parameters regarding the specific battery being charged are also known by the intelligent battery charger. This information is utilized to develop a usage and charging profile for a particular battery in the device for which it is used. To execute a deep cycle, rather than require that the user wait to plug in a charger until the battery level has reached a certain low level, the charger itself controls the on and off operation of the charging system, based on the profiles.
Abstract:
An area is established by positioning a string of boundary objects that are reflective to a range of ultrasonic frequencies. Tracking objects may be placed inside the area which also are reflective to the range of ultrasonic frequencies. An array of transducers insonify the area and the reflected signals are received by each transducer, digitized and stored as digital data. The digital data is read out in time reverse order and time reversal signals are generated that are coupled to each corresponding transducer. The time reversed signals focus energy on the reflective sources. The reflected signals resulting from the time reversed signals are analyzed to generate a reference signature indicating relative locations of boundary and tracking objects. The time reversed signals are sent intervals to generate new signatures which are compared to the reference signature to determine if tracking objects have been moved outside the area.
Abstract:
A method, system and computer program product for creating a preload. A preload may be stored onto a computer system prior to the computer system being manufactured. One or more attributes of an object of a preload may be defined. Each preload object may be an aggregation of one or more software element objects. A comparison may be made between the attributes in each software element object with the one or more attributes in the defined preload object. Upon identifying one or more software element objects whose attributes comprise the one or more attributes of the defined preload object, one or more part numbers associated with the one or more identified software element objects may be transmitted to a manufacturing system. Software associated with the identified one or more software element objects may be retrieved and installed onto a preload associated with the defined preload object.