Abstract:
A system for measuring power-on parameters for data processing systems is disclosed. During periodic System Management BIOS states that interrupt operation of the data processing system, code is executed that estimates the amount of time a data processing system has been powered on. Also, code is executed that tracks the number of times a data processing system has been powered on. Variables related to power-on-time and number of times powered on are incremented and stored in PROM, for example an Asset ID EEPROM, during SMBIOS states. Incrementing and storing these variables during SMBIOS states minimizes latencies.
Abstract:
The present invention adds a procedure to the operating system file subsystem of a processing system that significantly reduces the amount of time necessary to verify the validity of executable files. Each executable is extended with a file signature containing a header containing validation data. This header may be added to an existing ELF header, added as a new section, or placed in a file's extended attribute store. The header contains results of all previous validation checks that have been performed. The file signature is inserted, with a date stamp, into the file attributes. On execution, the system checks the previously-created file signature against a current file signature, instead of creating the file signature for every file during the execution process. Checks to ensure that the file signature is secure, and is valid and up to date, are also implemented. Only if the file signature is not valid and up-to-date does the execution program create a new file signature at the time of execution.
Abstract:
A method and system for remotely isolating faults in computer network devices coupled to a computer network. A plurality of first computer units are coupled to the computer network. The plurality of first computer units are located on a user side of the computer network. A plurality of second computer units are coupled to the computer network. The plurality of second computer units are located on a service provider side of the network. One of the plurality of second computer units is designated to provide computing services to one of the plurality of first computer units. One of the plurality of first computer units experiencing a fault communicating with its designated second computer unit uses another of the plurality of first computer units as a proxy computer unit to remotely isolate the fault.
Abstract:
A method, computer program product and system for reducing the boot time of a client device in a client device/data center environment. A profile of the client device, which includes information regarding the usage characteristics of the client device, may be created. A confidence level indicating the likelihood that the client device is going to be booted may be determined based on the client device's profile. The confidence level and the utilization of the resources of the server blades in the data center may be examined in determining whether to have an appropriate server blade perform an action involved in booting the operating system of the client device. If the appropriate server blade performs such an action, e.g., pre-booting the client device's operating system, prior to the user of the client device attempting to boot its operating system, then the boot time may be reduced.
Abstract:
An apparatus, system, and method are disclosed for making a motion based business decision. A motion module senses a component of motion such as acceleration or a derivative of acceleration. A log module calculates a motion summary from the motion component and stores the motion summary in a memory module. An analysis module receives the motion summary and makes a business decision based on the motion summary.
Abstract:
Systems and methods to access password-protected stored data when a corresponding data password has been lost, forgotten, or is otherwise unavailable, and to recover the data password to facilitate access to the password-protected data from a digital memory device such as a hard disk drive associated with a user computer. In some embodiments the computer is communicatively coupled with a network and receives at least one encryption key from a secure computer via the network. In other embodiments the computer is a stand alone computer and receives at least one encryption key from a removable, non-volatile memory such as a CD ROM. The encryption key is used to encrypt the data password and both are stored on the hard disk drive. If the data password becomes lost, forgotten, or otherwise unavailable, the encrypted password is recovered from the hard disk drive and decrypted to recover the data password.
Abstract:
There are many files in the current generation of computers, especially on the hardfile, that are not used or used only infrequently during operation. For instance, the system may contain many help text files which may never be accessed. The same applies to the DLL's. Also, some files are accessed only during a boot cycle. The present invention provides a method and program to track the locations of files in a computer which have been accessed so that, when an error occurs, only the files that need to be tested are diagnostically tested for errors, thus saving time and resources.
Abstract:
Methods and arrangements for capturing information related to operational conditions are disclosed. Embodiments include volatile memory to quickly record operational parameters via, e.g., basic input output system (BIOS) code, system management interrupt (SMI) code and/or executing applications. Many embodiments provide an alternative power source and a voltage switch to protect against loss of the information between storage in the volatile memory and storage in the non-volatile memory. Some embodiments include a read controller that provides access to the volatile memory when primary power is available. The read controller may also offer direct access to the non-volatile memory in case of a catastrophic failure that renders the processing device substantially non-functional. Further embodiments include a second processing device to generate a usage model and/or to perform diagnostics with the operational parameters.
Abstract:
A secure computer system includes a central processing unit in which plural programs reside. The system includes means for verifying whether the at least one program is trusted or not trusted. That means can be an external key device that includes a verification program that can communicate with the programs residing within the central processing unit.
Abstract:
An apparatus, method, and system to seal a data repository to a trusted computing platform is described. The data repository may be sealed by encrypting the data on the repository and sealing a cryptographic key to a specific set of platform resources. With the data repository sealed to the platform, the system boot sequence will fail if the system configuration is compromised, for example by insertion of “snoopware” or a modified BIOS. Additionally, if the computer containing the data repository is lost or stolen, the encrypted data remains secure even if the repository is attached to a system modified to bypass normal safeguards.