Abstract:
PROBLEM TO BE SOLVED: To appropriately set a device controller having two operation modes corresponding to the installation state of a device driver. SOLUTION: The device controller is operated in the two operation modes of an old operation mode in which it is operated by an old device driver and a new operation mode in which it is operated by a new device driver. For an OS, there is the case that the old device driver is introduced but the new device driver is not introduced. A BIOS sets the device controller to the old operation mode and activates a computer. In the operation environment of the OS, the presence/absence of the new device driver is inspected. When the new device driver is detected, control is shifted to the BIOS and the device controller is set to a new operation mode. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an information transmission method and an information transmission device, capable of responding to increase in information for CRTM to be updated, for providing a method for updating CRTM, without needing addition of special hardware for realizing the method. SOLUTION: The information update method for updating CRTM that is a base of chain authentication by use of an information processor adapting the system of ensuring the validity of the whole information processor by performing the chain authentication comprises steps of extracting update CRTM that is information of the CRTM of information to be updated; storing the update CRTM in a main memory of the information processor; authenticating the update CRTM stored in the main memory; and updating the CRTM with the authenticated CRTM. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To easily perform a specific process for an extension unit connected to a PC while an operating system runs on the PC. SOLUTION: When the connection between the PC and a docking station is detected and a BIOS (SMI handler) is actuated, the allocation of an I/O space to a gate array connected to an ISA bus is disabled (108), the I/O space is specified (110) for an I/O window of a PCI-PCI bridge of the docking station, and the I/O space is allocated (112) to a command block register of a PCI IDE controller. Then an ATA command is sent to the register to performs processes (114 to 1260 for initializing devices mounted on the docking station, programming data transfer speeds, and resetting a password, the allocation of the I/O space is reset, and the completion of the connection with the docking station is reported to the OS.
Abstract:
PROBLEM TO BE SOLVED: To prevent a situation in which an authenticator is read out by a malicious code and unauthorized authentication is gained by using the authenticator read out. SOLUTION: An authenticator acceptance period detection means 96 detects a period over which any yet-to-be authenticated program is guaranteed as inoperative as an authentication acceptance period. A program execution means 97 defines a period for sending the authenticator to be within the authentication acceptance period. An authentication means 98, after it is authenticated as bona fide during the authentication acceptance period, computes a unidirectional function value for the authenticator from the program execution means 97, and compares the computed value X with data Y stored previously concerning the program execution means 97. The authentication means 98, if X equals Y, authenticates the program execution means 97. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a device and a program capable of controlling and managing flexibly a using limit in an information processor for the portable recording medium. SOLUTION: The user side information processor confirms a using permission including a using time of a storage medium, during start processing. The storage medium is set to be usable as a result of the confirmation, with the proviso that the using permission is provided and that the current time is within the using time included in the using permission. The manager side information processor collects logging data including the using time for preparing the using permission to prepare a management report. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To overcome nonefficiency in undocking a notebook-sized PC (notebook-sized personal computer) 10 from a docking station 14. SOLUTION: A user selects a power supply state in undocking the PC 10 from the docking station 14 in advance. The OS (operating system) of the PC 10 shifts the power supply state of the PC 10 to a selection state in actually undocking the PC 10. For example, if standby is selected in the power supply state, the PC 10 becomes a standby state in accordance with undocking, a hard drive device of the PC 10 stops to reinforce protection when the PC 10 is carried. COPYRIGHT: (C)2003,JPO