Abstract:
PROBLEM TO BE SOLVED: To provide a robust information processor which prevents a damage of an execution program of an OS (operating system) caused by a careless operation of a user. SOLUTION: The information processor is provided with an external storage device 100 having a normal partition 110 which can be referred from the user and a hidden partition 120 which stores the execution program of the operating system and is hidden from the user, a reading part 520 which reads the execution program of the operating system from the hidden partition 120 to a main storage device according to a reading instruction from the user and an execution part 530 which executes the operating system being read out to the main storage device 200. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To protect application stored in an area hidden from a user in a storage device such as an HDD from writing. SOLUTION: This computer system is provided with a BIOS 21 supporting boot of an HDD 11, which is divided into a user area 24 serving as an area working in a user environment and a host protected area 22 serving as an area protected from the user for holding data, from the host protected area 22 and supporting authentication for host certification to a PARTIES application 23 in the host protected area, and a PARTIES application access module 25 copying the PARTIES application 23 in an empty area of a memory 12 to create a pseudo-PARTIES application area 26. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To transfer information between different partitions between the environment of a predetermined OS in a storage device such as a hard disk drive(HDD) and an area shielded from the OS. SOLUTION: This computer system is provided with a hard disk drive(HDD) 11 fulfilling the specifications of PARTIES(Protected Area Run Time Interface Extension Services) with the access environment of an OS 22 and a PARTIES partition being an area shielded from the OS 22 and a CMOS/NVRAM 12 for providing a work area for performing communication between a user mode module 26 to be operated in the access environment of the OS 22 in a user data management application 25 and a management mode module 27 to be operated in an environment corresponding to the shielded area. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To dynamically set a plurality of introduced communication adapters effective or ineffective for a computer system such as a notebook-sized PC. SOLUTION: This computer system which introduces a plurality of the communication adapters 20 (20-1 to 20-4) and can communicate with the outside through those communication adapters 20, is equipped with utilities 11 which control the enabling (effective) and disabling (ineffective) of the communication adapters 20 and NDIS(network driver interface specification) 18 which exchanges data between the utilities 11 and communication adapters 20; and the utilities 11 inquire information on the number and kind of the communication adapters 20 of the NDIS 18 to obtain the information and sends an event of suspending to the NDIS 18 for a communication adapter 20 to be enabled is not enabled before and an event of resuming for a communication adapter 20 which is enabled, but requested to be disabled.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a device and a program capable of controlling and managing flexibly a using limit in an information processor for the portable recording medium. SOLUTION: The user side information processor confirms a using permission including a using time of a storage medium, during start processing. The storage medium is set to be usable as a result of the confirmation, with the proviso that the using permission is provided and that the current time is within the using time included in the using permission. The manager side information processor collects logging data including the using time for preparing the using permission to prepare a management report. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To securely perform a control to a device without impairing the availability of a system. SOLUTION: When a control for making the device 13 usable or unusable is requested from a hot key 11 or an AP 70, the AP 70 determines whether password authentication is necessary or not. When the password authentication is necessary, an ACPI BIOS 40 receives the effect through a device driver 50, suspends an OS 60. An SMI handler 30 displays a password prompt to a display 12 in this state, and if the input password is proper, the control of the device 13 is instructed to an embedded controller 20. At that time, the embedded controller 20 determines the control instruction from the SMI handler 30 by monitoring a signal for switching to SMM. COPYRIGHT: (C)2006,JPO&NCIPI