DATA PROCESSING SYSTEM AND METHOD FOR REMOTELY DISABLING NETWORK ACTIVITY IN A CLIENT COMPUTER SYSTEM
    1.
    发明申请
    DATA PROCESSING SYSTEM AND METHOD FOR REMOTELY DISABLING NETWORK ACTIVITY IN A CLIENT COMPUTER SYSTEM 审中-公开
    数据处理系统和远程停用客户端计算机系统网络活动的方法

    公开(公告)号:WO0033510A3

    公开(公告)日:2000-10-05

    申请号:PCT/GB9903982

    申请日:1999-11-30

    Applicant: IBM IBM UK

    Abstract: A data processing system and method are described for permitting a server computer system to remotely disable an ability of a client computer system to access a network which couples the client computer system to the server computer system. The server computer system transmits an indication to the client computer system utilizing the network that the ability of the client computer system to access said network be at least temporarily disabled. In response to a receipt of the indication by the client computer system, the ability of the client computer system to access the network is at least temporarily disabled. The client computer system is unable to transmit information utilizing the network while the client computer system is temporarily disabled.

    Abstract translation: 描述了一种数据处理系统和方法,用于允许服务器计算机系统远程禁用客户端计算机系统访问将客户端计算机系统耦合到服务器计算机系统的网络的能力。 服务器计算机系统使用网络向客户端计算机系统发送指示,使得客户端计算机系统访问所述网络的能力至少被暂时禁用。 响应于客户端计算机系统接收到指示,客户端计算机系统访问网络的能力至少被暂时禁用。 当客户端计算机系统暂时禁用时,客户端计算机系统无法使用网络传输信息。

    3.
    发明专利
    未知

    公开(公告)号:DE69908245T2

    公开(公告)日:2004-04-08

    申请号:DE69908245

    申请日:1999-06-24

    Applicant: IBM

    Abstract: A system for monitoring tamper events in a computer system 10 is disclosed. The computer system is on a network. The system comprises a tamper realtime clock (RTC) means 140 which receives at least one tamper event signal from the computer system. The tamper RTC includes a timer 178 for indicating the time of a tamper event and a management device 160 for receiving the at least one tamper event signal. The management device issues a command to the tamper RTC means to obtain the time of the at least one tamper event. The management device also generates a network packet 200 which includes the time of the tamper event to a system administrator of the network. Preferably the computer system has the ability to functionally detect and store the time of a tamper event. A tamper real time clock (RTC) circuit is operatively connected with logic to store the date and time of an event as it occurs. In a preferred embodiment, the tamper event could be as simple as a toggle switch being activated when a cover on the computer system is removed. The computer system also sends network alerts when the cover is removed.

    SYSTEM FOR DETECTING TAMPER EVENTS AND CAPTURING THE TIME FOR THEIR OCCURENCE

    公开(公告)号:CA2271534A1

    公开(公告)日:2000-01-01

    申请号:CA2271534

    申请日:1999-05-12

    Applicant: IBM

    Abstract: A system for monitoring tamper events in a computer system is disclosed. The computer system is on a network. The system comprises a tamper realtime clock (RTC) means which receives at least one tamper event signal from the computer system. The tamper RTC includes a timer for indicating the time of a tamper event and a management device for receiving the at least one tamper event signal. The management device issues a command to the tamper RTC means to obtain the time of the at least one tamper event. The management device also generates a network packet which includes the time of the tamper event to a system administrator of the network. The present invention in a preferred embodiment is directed to a computer system which has the ability to functionally detect and store the time of a tamper event. A tamper real time clock (RTC) circuit is operatively connected with logic to store the date and time of an event as it occurs. In a preferred embodiment, the tamper event could be as simple as a toggle switch being activated when a cover on the computer system is removed. The computer system could also send network alerts when the cover is removed.

    7.
    发明专利
    未知

    公开(公告)号:AT522042T

    公开(公告)日:2011-09-15

    申请号:AT03735837

    申请日:2003-06-25

    Applicant: IBM

    Abstract: Apparatus and method provides dynamic load balancing of network bandwidth between access points in an 802.11 wireless LAN. The access point generates and monitors average bandwidth utilization of client devices connected to said access point. The average bandwidth utilization for each client device is aggregated and selected clients are forced to roam to other access points if the aggregate bandwidth is equal or exceeds a threshold.

    Remote server access to a powered-off client computer system's asset information

    公开(公告)号:GB2354610A

    公开(公告)日:2001-03-28

    申请号:GB0005417

    申请日:2000-03-08

    Applicant: IBM

    Abstract: A data processing system and method are described for permitting a server computer system to remotely access asset information stored within one of a plurality of client computer systems. The client computer systems are coupled to the server computer system utilising a network. Asset information is stored in a storage device within the particular client computer system. The asset information includes information identifying a plurality of components of the client computer system. The server computer system transmits a message to the client computer system while the client computer system is powered-off. A network adapter is included within the client computer system. The network adapter accesses the storage device to obtain the asset information while the client computer system is powered-off.

    10.
    发明专利
    未知

    公开(公告)号:DE60308503D1

    公开(公告)日:2006-11-02

    申请号:DE60308503

    申请日:2003-05-06

    Applicant: IBM

    Abstract: In accordance with the preferred embodiment, an access point provides dynamic load balancing of network bandwidth between access points within the 802.11 wireless LAN. The access point uses the RTS/CTS protocol to reduce the bandwidth available to a single device using an excessive amount of network bandwidth. The access point places a device that has been monopolizing a network channel on a Restricted List, and regulates bandwidth on the network by not returning a CTS to any client on the Restricted List. When the client's network usage drops below a policy driven threshold set by the number of network users, the client is removed from the list and the access point will respond to a RTS from the client with a CTS.

Patent Agency Ranking