3.
    发明专利
    未知

    公开(公告)号:DE69717232T2

    公开(公告)日:2003-05-08

    申请号:DE69717232

    申请日:1997-08-27

    Inventor: OLARIG SOMPONG P

    Abstract: A computer system having an interconnection apparatus for interconnecting processors, peripherals, and memories, including a bus structure with an extended-bus portion and a non-extended-bus portion, and the extended-bus-compliant devices having a status register. The extended-bus-compliant devices are operable in either extended-bus mode involving both the extended-bus portion and non-extended-bus portion of the bus structure, or non-extended-bus mode involving only the non-extended-bus portion. Upon detecting a transmission error or device-related fault, the contents of the status register are altered so as to render the extended-bus-compliant devices operable in the non-extended-bus mode using only the non-extended-bus portion.

    COMPUTER SYSTEM HAVING FAULT TOLERANT INTERCONNECTION DEVICE

    公开(公告)号:JPH10124407A

    公开(公告)日:1998-05-15

    申请号:JP26655397

    申请日:1997-09-30

    Inventor: OLARIG SOMPONG P

    Abstract: PROBLEM TO BE SOLVED: To perform the effective error fault management by managing a peripheral component interconnection(PCI) bus. SOLUTION: An interconnection device 300 of this system includes the electronic deices 200-2 and 200-3 of a 1st group which can operate in a 1st mode, and the electronic devices 200-1 and 200-6 of a 2nd group which can operate in a 1st or 2nd mode. Each of devices 200-1 and 200-6 includes an error detection means and a state register 320 which is energized in response to an error signal and stores the signal that varies the mode state related to every relevant electronic device. A bus 10 which secures the communication among those electronic devices includes the transmission lines of the 1st and 2nd groups.

    COMPUTER SYSTEM CAPABLE OF MOVING OVERFLOW DATA TO NETWORK STORAGE

    公开(公告)号:JP2001184239A

    公开(公告)日:2001-07-06

    申请号:JP2000302020

    申请日:2000-10-02

    Abstract: PROBLEM TO BE SOLVED: To make it unnecessary for each PC to provide any large capacity of storage, that is, storage capacity. SOLUTION: A PC 104 cyclically checks the use capacity of a network storage 108 for judging whether or not it is necessary to move one part of data stored on the PC to the network storage 108. When the storage space is approaching the full capacity, which data has the oldest use period is automatically judged, and the data are automatically moved to the storage 108 of a network server 102 while a user is not informed of it. For example, when the residual storage amounts are turned into less than 5%, the sufficient amounts of data on the PC are moved so that the 10% of the storage can be released. The data to be transferred are set in the order of the oldest storage period and the lowest frequency of use.

    REMOTE SECURITY SYSTEM
    6.
    发明专利

    公开(公告)号:JPH11134297A

    公开(公告)日:1999-05-21

    申请号:JP23700798

    申请日:1998-08-24

    Abstract: PROBLEM TO BE SOLVED: To provide a computer security system for controlling access by remotely attaining an operable state or an inoperative state. SOLUTION: This system is provided with at least one microprocessor 225 connected so as to detect input from an input device 235, a nonvolatile memory 270 provided with setting to management constitution, a memory 255 connected so as to be read/write accessed by the microprocessor, an input/output circuit 265 connected to the microprocessor and an RF receiver 295 connected so as to perform write to the nonvolatile memory for performing reception to a communication system. Then, at least one security function capable of being remotely energized by commanding the receiver through the communication system is provided and at least one of the setting in the nonvolatile memory is corrected.

    8.
    发明专利
    未知

    公开(公告)号:DE69725833T2

    公开(公告)日:2004-05-19

    申请号:DE69725833

    申请日:1997-12-30

    Abstract: A computer system according to the present invention utilizes a two-piece authentication procedure to securely provide user authentication over a network. In the disclosed embodiment of the invention, a user password is entered during a secure power-up procedure. The user password is encrypted by an external token or smart card that stores an encryption algorithm furnished with an encryption key that is unique or of limited production. A network password is thereby created. The network password is maintained in a secure memory space such as System Management Mode (SMM) memory. When the user desires to access a network resource such as a hard drive in a server, the network password is encrypted and communicated over the network. In the case of a server hard drive, the network password is encrypted using the server @ s public key (or another key that is known to the server). Optional node identification information is appended to the network password prior to communication over the network. The node identification information can be used for a variety of purposes, including limiting access to certain pieces of data to specified users on specified machines. Once received by the server, the encrypted network password is decrypted using the server @ s public key. A user verification process is then performed on the network password to determine which, if any, access privileges have been accorded the network user. Numerous other uses for the network password are disclosed, and permit the network resources to be securely compartmentalized with the option to have multiple user levels. The two-piece nature of the authentication process assures that if either the user password or the external token is stolen, it is of little value. Both pieces are required to access protected resources and uniquely identify a user to the network. Further, a network user @ s identity is maintained when working on different machines.

    9.
    发明专利
    未知

    公开(公告)号:DE69725833D1

    公开(公告)日:2003-12-04

    申请号:DE69725833

    申请日:1997-12-30

    Abstract: A computer system according to the present invention utilizes a two-piece authentication procedure to securely provide user authentication over a network. In the disclosed embodiment of the invention, a user password is entered during a secure power-up procedure. The user password is encrypted by an external token or smart card that stores an encryption algorithm furnished with an encryption key that is unique or of limited production. A network password is thereby created. The network password is maintained in a secure memory space such as System Management Mode (SMM) memory. When the user desires to access a network resource such as a hard drive in a server, the network password is encrypted and communicated over the network. In the case of a server hard drive, the network password is encrypted using the server @ s public key (or another key that is known to the server). Optional node identification information is appended to the network password prior to communication over the network. The node identification information can be used for a variety of purposes, including limiting access to certain pieces of data to specified users on specified machines. Once received by the server, the encrypted network password is decrypted using the server @ s public key. A user verification process is then performed on the network password to determine which, if any, access privileges have been accorded the network user. Numerous other uses for the network password are disclosed, and permit the network resources to be securely compartmentalized with the option to have multiple user levels. The two-piece nature of the authentication process assures that if either the user password or the external token is stolen, it is of little value. Both pieces are required to access protected resources and uniquely identify a user to the network. Further, a network user @ s identity is maintained when working on different machines.

Patent Agency Ranking