COMPUTER APPARATUS, METHOD FOR CONTROL OF AUGMENTED DEVICE AND COMPUTER PROGRAM

    公开(公告)号:JP2003108274A

    公开(公告)日:2003-04-11

    申请号:JP2001281337

    申请日:2001-09-17

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide a computer apparatus, etc., capable of preventing an augmented device from a careless removal and enhancing ease of use of a PC (Personal Computer). SOLUTION: The computer apparatus is configured to make a user specify in advance an augmented device not to be removed among removable augmented devices. When the user displays a list to execute removal processing of the augmented devices, the specified augmented device is not displayed in the list. The computer apparatus is configured to execute a setting whether the specified device should be displayed in the list or not at a side of a BIOS (Basic Input Output System) and store the setting into an NVRAM (Non Volatile Random Access Memory) storing information referred by the BIOS.

    EXTENDED UNIT FOR INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING SYSTEM MOUNTED ON EXTENDED UNIT, AND CONTROL METHOD FOR INFORMATION PROCESSING SYSTEM

    公开(公告)号:JPH1185326A

    公开(公告)日:1999-03-30

    申请号:JP23997797

    申请日:1997-09-04

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide an inexpensive extended unit having a security function against WOL under a multi-user environment where one extended unit is shared by many and unspecified notebook PCs. SOLUTION: This extended unit 200 is provided with an LAN adapter with WOL function for LAN connection. Power is always fed to the LAN adapter 300 by an auxiliary power source 370 and it asserts a WOL signal in response to the reception of a wake-up packet via LAN. The extended unit 200 is provided with a WOL state register and a logic circuit. Thus, network security is provided for an information processing system. An information processing system-side can give an instruction for permitting or inhibiting WOL by writing a prescribed value in the WOL state register. When the logic circuit receives the WOL signal from the LAN adapter, it refers to the WOL state register. When wake-up is permitted, power supply is instructed to the notebook PC 100, and the WOL signal is ignored and WOL is not executed when wake-up is inhibited.

    APPARATUS AND METHOD FOR CONTROL OF MEMORY ACCESS AS WELL ASCOMPUTER SYSTEM

    公开(公告)号:JPH08305629A

    公开(公告)日:1996-11-22

    申请号:JP10105995

    申请日:1995-04-25

    Applicant: IBM

    Abstract: PURPOSE: To dynamically compensate the signal waveform or timing of each output signal line (RAS, CAS, WE, MA) of a memory controller even when many kinds of extended memories (DIMM card) whose storage capacities or memory chip arrays are different are mounted. CONSTITUTION: This is a memory access controller used for a computer system on which an extended memory 17 can be mounted in addition to a standard memory 13, which controls access to the memories 13 and 17 by more than one signal lines. This memory access controller is provided with an identifying means which reads the identification data of the mounted extended memory 17, discriminating means which discriminates the optimal output current value of each signal line based on the identification data, and means which adjusts the output currents of each signal line based on the discriminated result.

    COMPUTER WITH SECURITY FUNCTION AND METHOD

    公开(公告)号:JP2000214942A

    公开(公告)日:2000-08-04

    申请号:JP1321599

    申请日:1999-01-21

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide technique inhibiting access to a computer when the security device of the computer with a security function is illegally removed. SOLUTION: A security device is hardware taking responsibility for a part of the security function of a computer and inhibits access with the following procedures when illegally removed. Data indicating that the security device is mounted on the computer is stored and held in a nonvolatile memory. After that, a procedure to inhibit access to the computer is started with some event such as power-on as a start. Next, it is detected on the basis of the data in memory that the security device has been mounted. It is further detected that the security device is now removed from the computer. When the security device is now removed even through it has been mounted, access to the computer is inhibited.

    PROGRAM, CONTROLLER, AND CONTROL METHOD
    6.
    发明专利

    公开(公告)号:JP2004007316A

    公开(公告)日:2004-01-08

    申请号:JP2002161179

    申请日:2002-06-03

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To cause a DHCP server to suitably control IP addresses. SOLUTION: A device driver program 430 for controlling a computer which communicates with a device on a network using terminal identification information acquired from the server includes a means 432 for stopping operation of the computer, a means 436 for judging whether or not the stopping operation was started by the operation stopping means, and a means 438 for transmitting information indicative of end of use of the terminal identification information to the server when the judging means judges that the stopping operation was started. COPYRIGHT: (C)2004,JPO

Patent Agency Ranking