Abstract:
A method for supporting multiple distributed interrupt controllers, designated as bus agents, in a symmetric multiprocessing system, includes the steps of assigning a unique identification number to each bus agent, receiving bus requests from the bus agents over four data lines in groups of four, and granting bus ownership to a selected one of the requesting bus agents. Similarly, a computer system that supports multiple distributed interrupt controllers, designated as bus agents, in a symmetric multiprocessing system, includes structure for assigning a unique identification number to each bus agent, four data lines for receiving bus requests from the bus agents in groups of four, and structure for granting bus ownership to a selected one of the requesting bus agents.
Abstract:
A load balancing system and method for distributing a task between Input/Output subsystems of a computer system. The load balancing system includes a central processing unit for transmitting the task to a central controller. The central controller in response to the transmitted task generates and transmits a request command over a side-band bus to a plurality of peripheral components. Each of the peripheral components that are capable of servicing the request command will transmit a response signal over the side-band bus back to the central controller. Thereafter, the central controller by processing all the response signals dispatches a service command signal to one of the capable peripheral components. The service command signal will direct the one capable peripheral component to service the task.
Abstract:
A computer network system having a plurality of nodes, one of which is adapted as an administrator node, the administrator node for securely receiving code information from a code provider disposed external to the network system and for securely sending the code information to at least one of the nodes.
Abstract:
A computer (or other complex electronic equipment) security system is proposed whereby access is controlled by remote enablement or disablement of a security feature. The system can be coupled with third-party products to accommodate satellite transmissions for long-distance access control.
Abstract:
A distributed interrupt controller system for use in a multiprocessor environment, has at least two local programmable interrupt controllers (LOPICs) coupled to at least one central programmable interrupt controller (COPIC) via a dedicated bus. The COPIC functions as a master arbiter, while the LOPICs, each of which may be integrated with its corresponding processing unit, and any other non-master COPICs are treated as bus agents. Bus grant is achieved by a "round robin" arbitration protocol. For distributed delivery of interrupts, the master arbiter compares a current-task-priority-register value associated with each bus agent to determine the agent that is least busy for delivery of the interrupt thereto.
Abstract:
A computer system according to the present invention utilizes a two-piece authentication procedure to securely provide user authentication over a network. In the disclosed embodiment of the invention, a user password is entered during a secure power-up procedure. The user password is encrypted by an external token or smart card that stores an encryption algorithm furnished with an encryption key that is unique or of limited production. A network password is thereby created. The network password is maintained in a secure memory space such as System Management Mode (SMM) memory. When the user desires to access a network resource such as a hard drive in a server, the network password is encrypted and communicated over the network. In the case of a server hard drive, the network password is encrypted using the server s public key (or another key that is known to the server). Optional node identification information is appended to the network password prior to communication over the network. The node identification information can be used for a variety of purposes, including limiting access to certain pieces of data to specified users on specified machines. Once received by the server, the encrypted network password is decrypted using the server s public key. A user verification process is then performed on the network password to determine which, if any, access privileges have been accorded the network user. Numerous other uses for the network password are disclosed, and permit the network resources to be securely compartmentalized with the option to have multiple user levels. The two-piece nature of the authentication process assures that if either the user password or the external token is stolen, it is of little value. Both pieces are required to access protected resources and uniquely identify a user to the network. Further, a network user s identity is maintained when working on different machines.
Abstract:
A computer system and method of operating a network in which data overflow from workstation or PC hard drives is automatically transferred over to a network server hard drive allowing the workstation user to continue working without interruption. Furthermore, this system minimizes the amount of time a network administrator spends on attending to users who have no remaining hard drive space on their computers.
Abstract:
A computer (or other complex electronic equipment) security system is proposed whereby access is controlled by remote enablement or disablement of a security feature. The system can be coupled with third-party products to accommodate satellite transmissions for long-distance access control.