摘要:
A remote flash ROM and security package is formed and delivered to a system ROM of a target computer system for remote flashing of the ROM and remote configuration of security settings for the computer system. The remote flash ROM and security package includes flash ROM and security control code for calling a remote flash and security driver to execute a remote flash or to remotely configure a security setting, a file containing a “signed” ROM image to be flashed to the ROM, a security settings file which preferably is encrypted, and a remote flash and security control container for containing the flash ROM and security code, the ROM image, and the security settings file. The remote flash and security driver may be included in the remote flash ROM and security package or may be resident to the target computer system. In the preferred embodiment, the computer system includes a secure memory device containing an administrator password for locking and unlocking the ROM. The remote flash ROM and security package preferably includes an administrator password matching the administrator password stored in the secure memory device to place the computer system in an administrator mode. A system ROM thereby may be flashed or a security setting changed remotely without the need for a user to enter an administrator password. Further, flashing the ROM or changing a security setting occurs as an “inband” process. Flashing a ROM or changing a security setting by remotely providing an administrator password to a secure memory device eliminates the need to reboot a computer system after downloading the ROM and security package.
摘要:
A secure system and method is provided for remotely waking a computer from a power down state. In one embodiment, a network interface card receives incoming data packets via a network connector. A control module is coupled to the network connector and is configured to search the incoming packets for a wake-up pattern. The control module also verifies that the packet's destination address matches the destination address of the network interface card. If the destination addresses match and a wake-up pattern is found, the control module decrypts an encrypted value from the incoming packet and compares the result to an expected value. A successful comparison causes the control module to assert a signal to wake up the host computer. Preferably, a standard public/private key pair encryption scheme is used, and the source of the data packet encrypts the expected value with a private key. All computers which may receive wake-up packets are provided with a public key with which to decrypt values contained in a security field of any wake-up packets. A successful decryption serves to certify that the wake-up packet was transmitted from an authorized source. For added security, the expected value and public/private keys may be changed on a regular basis, or even every time a valid wake-up packet is received. The new value may be provided in the wake-up packet, to be stored by the network card for the next use.
摘要:
A computer network includes at least one client computer coupled to a server computer that dynamically changes a user's password each time the user logs on to the computer network. By changing the password during the log on process, network security is increased. The server computer includes a users databases that contains a password, a username (if desired) and a biometrics template value associated with each user registered to access the computer network. A biometrics sensing device, such as a fingerprint sensor, is connected to each client computer. The user attempts to log on the server by entering a username which is optional and activating the biometrics sensing device. Appropriate software and/or hardware in the client and server computers capture a sample from the biometrics sensing device and create a template value from the captured sample. The template value thus is representative of a bodily characteristic of the user who activated the biometrics sensing device in an attempt to log on to the server computer. The client computer then transmits the template value to the server which compares the template value received from the client computer with template values previously stored in the users database. If a match is found, the log on process completes. At some point during or after the log on process, the biometrics account manager changes the current password associated with the user to a new password and overwrites the previous password with the new password.
摘要:
A method for touchpad edge gesture detection comprising detecting touch input on a touchpad, determining if the touch input originates externally to the touchpad, determining if the touch input ends internally to the touchpad and performing a command on a computer corresponding to the touch input.
摘要:
A content management user interface (UI) provides a consistent appearance and operation across multiple devices of a user. Thumbnails representing content that is located on the user's devices are presented along with layered filtering operators which enable a user to filter the thumbnails by both content source and content type.
摘要:
Images are offloaded from a portable camera automatically to a network server at the time the images are taken, transparently to a user of the camera. The server executes processing functions on the images and returns the output of the processing over the network to the camera and/or other user-defined destination device to thereby relieve the camera processor of potentially complex processing chores.
摘要:
A method for data synchronization across multiple target destinations in a computer network includes acquiring information about the target destinations, wherein: the target destinations comprises at least one of a network account in the computer network, or a target device coupled to the computer network or associated with the network account; and the acquired information includes identification information associated with the target destinations. The method may also include receiving, at a user device, data from a data source; filtering the received data based on information included in the received data and in the identification information; identifying, based on the filtering, a selected target destination for receiving the filtered data; and transmitting the filtered data to the identified selected target destination.
摘要:
A keyboard power generator provides a plurality of keys with one or more magnets mounted thereon. Additionally, a plurality of coils are mounted on both ends of the magnet such that, when the user is typing, the magnet traverses the coils. The movement of the magnet over the coils causes a current to be generated. In one embodiment, one magnet is mounted per key on the keyboard. In a second embodiment, a plurality of magnets are mounted per key to enhance the power generation capability of the keyboard. The currents generated collectively by the keys are provided to a charge pump which multiplies the voltage to achieve a level greater than the voltage level of the battery to be charged. The multiplied voltage is provided to a charging circuitry such as a trickle charger to recharge the battery. In this manner, the more information entered by the user, the more electricity is generated by the keyboard power generator. The energy provided by the keyboard of the present invention can be used to lengthen the operating period of the portable computer, or alternative, can be used to reduce the size of the primary battery so as to result in a lighter portable computer.
摘要:
Internet connection may come through a single host computer and sent to appliance computers, as in a laptop or camera. This application intends to automatically connect the appliances to the Internet established by the host computer by means of either electronic communication or preprogramming both computers with the same network access information.
摘要:
User-specific information such as the social networking cloud of relevant metadata is used to find real-time information and provide visual feedback to users regarding the presence of other users at particular locations. In one example, the information is displayed on localized map images, with visual indicators such as dots indicating the presence of other users having desired characteristics.