DE69528663D1 - Verfahren zum überprüfen der betriebsanordnung eines rechnersystems - Google Patents

Verfahren zum überprüfen der betriebsanordnung eines rechnersystems

Info

Publication number
DE69528663D1
DE69528663D1 DE69528663T DE69528663T DE69528663D1 DE 69528663 D1 DE69528663 D1 DE 69528663D1 DE 69528663 T DE69528663 T DE 69528663T DE 69528663 T DE69528663 T DE 69528663T DE 69528663 D1 DE69528663 D1 DE 69528663D1
Authority
DE
Germany
Prior art keywords
checking
computer system
operating arrangement
arrangement
operating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE69528663T
Other languages
English (en)
Other versions
DE69528663T2 (de
Inventor
Juergen Probst
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Application granted granted Critical
Publication of DE69528663D1 publication Critical patent/DE69528663D1/de
Publication of DE69528663T2 publication Critical patent/DE69528663T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
DE69528663T 1995-08-11 1995-08-11 Verfahren zum überprüfen der betriebsanordnung eines rechnersystems Expired - Lifetime DE69528663T2 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP1995/003186 WO1997007463A1 (en) 1995-08-11 1995-08-11 Method for verifying the configuration of a computer system

Publications (2)

Publication Number Publication Date
DE69528663D1 true DE69528663D1 (de) 2002-11-28
DE69528663T2 DE69528663T2 (de) 2003-06-26

Family

ID=8166077

Family Applications (1)

Application Number Title Priority Date Filing Date
DE69528663T Expired - Lifetime DE69528663T2 (de) 1995-08-11 1995-08-11 Verfahren zum überprüfen der betriebsanordnung eines rechnersystems

Country Status (4)

Country Link
US (1) US5982899A (de)
EP (1) EP0787328B1 (de)
DE (1) DE69528663T2 (de)
WO (1) WO1997007463A1 (de)

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4637974B2 (ja) * 1997-03-27 2011-02-23 ブリティッシュ・テレコミュニケーションズ・パブリック・リミテッド・カンパニー データのコピイ保護
US7743262B2 (en) * 1997-07-15 2010-06-22 Silverbrook Research Pty Ltd Integrated circuit incorporating protection from power supply attacks
US7346586B1 (en) * 1997-07-15 2008-03-18 Silverbrook Research Pty Ltd Validation protocol and system
US6732274B1 (en) * 1997-12-15 2004-05-04 Koninklijke Philips Electronics N.V. Electronic apparatus comprising a memory protection device and method of protecting data in a memory
DE19824814C2 (de) * 1998-06-03 2000-06-21 Siemens Ag Einrichtung zur Ermittlung von freizugebenden Funktionen in einer Telekommunikationsanlage
US6230265B1 (en) * 1998-09-30 2001-05-08 International Business Machines Corporation Method and system for configuring resources in a data processing system utilizing system power control information
WO2000048063A1 (en) 1999-02-15 2000-08-17 Hewlett-Packard Company Trusted computing platform
EP1161714A1 (de) 1999-02-15 2001-12-12 Hewlett-Packard Company, A Delaware Corporation Schutz der konfiguration der module in einem rechengerät
EP1161715B1 (de) 1999-02-15 2010-08-18 Hewlett-Packard Company (a Delaware Corporation) Kommunikation zwischen modulen in einer rechenvorrichtung
US6367007B1 (en) * 1999-02-22 2002-04-02 Intel Corporation Using system configuration data to customize bios during the boot-up process
GB2351380B (en) * 1999-06-23 2003-10-08 Ncr Int Inc Self-service terminal
US6289455B1 (en) * 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
US7310735B1 (en) * 1999-10-01 2007-12-18 International Business Machines Corporation Method, system, and program for distributing software between computer systems
US7110929B1 (en) 1999-11-12 2006-09-19 Intusoft System and method of providing additional circuit analysis using simulation templates
US6904527B1 (en) * 2000-03-14 2005-06-07 Xilinx, Inc. Intellectual property protection in a programmable logic device
US20010054147A1 (en) * 2000-04-04 2001-12-20 Richards Ernest S. Electronic identifier
US6557077B1 (en) 2000-07-07 2003-04-29 Lsi Logic Corporation Transportable memory apparatus and associated methods of initializing a computer system having the same
US6978374B1 (en) * 2000-09-29 2005-12-20 Unisys Corporation Authorization key system for selectively controlling the performance of a data processing system
US7703092B1 (en) 2000-10-12 2010-04-20 International Business Machines Corporation Method, system, computer program product, and article of manufacture for installation and configuration of a computer program according to a stored configuration
US6944857B1 (en) 2000-10-12 2005-09-13 International Business Machines Corporation Method, system, computer program product, and article of manufacture for updating a computer program according to a stored configuration
US7089553B1 (en) 2000-10-12 2006-08-08 International Business Machines Corporation Method, system, computer program product, and article of manufacture for downloading a remote computer program according to a stored configuration
JP2002319230A (ja) * 2001-01-25 2002-10-31 Sony Computer Entertainment Inc 記録媒体、情報処理装置、コンテンツ配信サーバ、方法、プログラム、その記録媒体
GB0114317D0 (en) * 2001-06-13 2001-08-01 Kean Thomas A Method of protecting intellectual property cores on field programmable gate array
DE10131577A1 (de) * 2001-07-02 2003-01-16 Bosch Gmbh Robert Verfahren zum Schutz eines Mikrorechner-Systems gegen Manipulation seines Programms
US7281125B2 (en) * 2001-08-24 2007-10-09 Lenovo (Singapore) Pte. Ltd. Securing sensitive configuration data remotely
US20030188275A1 (en) * 2002-03-27 2003-10-02 Meares Lawrence G. System and method of preventing the simulation of a circuit if a change to the circuit topology is detected
US7162644B1 (en) 2002-03-29 2007-01-09 Xilinx, Inc. Methods and circuits for protecting proprietary configuration data for programmable logic devices
US7840803B2 (en) 2002-04-16 2010-11-23 Massachusetts Institute Of Technology Authentication of integrated circuits
US7395434B2 (en) * 2002-05-01 2008-07-01 Hewlett-Packard Development Company, L.P. Method for secure storage and verification of the administrator, power-on password and configuration information
US7174465B2 (en) * 2002-06-26 2007-02-06 Lenovo Singapore Pte, Ltd Secure method for system attribute modification
US7367063B1 (en) * 2002-09-17 2008-04-29 Cisco Technology, Inc. Methods and apparatus for providing security to a computerized device
WO2004057477A1 (en) 2002-12-20 2004-07-08 International Business Machines Corporation Method and system for alternatively activating a replaceable hardware unit
WO2004081686A2 (en) 2003-03-06 2004-09-23 Fisher-Rosemount Systems, Inc. Heat flow regulating cover for an electrical storage cell
US7512521B2 (en) 2003-04-30 2009-03-31 Fisher-Rosemount Systems, Inc. Intrinsically safe field maintenance tool with power islands
US7526802B2 (en) * 2003-05-16 2009-04-28 Fisher-Rosemount Systems, Inc. Memory authentication for intrinsically safe field maintenance tools
US7117348B2 (en) 2003-06-27 2006-10-03 American Megatrends, Inc. Method and system for detecting the validity of configuration data
US20050137973A1 (en) * 2003-12-23 2005-06-23 Hoffman Philip M. Method for economic valuation in partitioned computer systems
US7421691B1 (en) * 2003-12-23 2008-09-02 Unisys Corporation System and method for scaling performance of a data processing system
US20060048222A1 (en) * 2004-08-27 2006-03-02 O'connor Clint H Secure electronic delivery seal for information handling system
US7516480B2 (en) * 2004-10-22 2009-04-07 Microsoft Corporation Secure remote configuration of targeted devices using a standard message transport protocol
US8607328B1 (en) 2005-03-04 2013-12-10 David Hodges Methods and systems for automated system support
CN101223508B (zh) * 2005-07-12 2010-05-26 国际商业机器公司 数据处理系统中重新配置功能性能力的方法和系统
US8769295B2 (en) * 2005-08-01 2014-07-01 Intel Corporation Computing system feature activation mechanism
US8645712B1 (en) * 2005-10-27 2014-02-04 Altera Corporation Electronic circuit design copy protection
US7571368B1 (en) 2006-01-26 2009-08-04 Promethean Storage Llc Digital content protection systems and methods
US7996899B1 (en) 2006-02-24 2011-08-09 Hitachi Global Storage Technologies Netherlands B.V. Communication systems and methods for digital content modification and protection
US8243922B1 (en) 2006-02-24 2012-08-14 Hitachi Global Storage Technologies Netherlands B.V. Digital content modification for content protection
US8185960B1 (en) * 2006-07-27 2012-05-22 Qlogic, Corporation System and method for managing access to adapter features
US7650437B2 (en) 2006-08-01 2010-01-19 Research In Motion Limited System and method for managing hardware configuration parameters
EP1909172A1 (de) * 2006-08-01 2008-04-09 Research In Motion Limited System und Verfahren zur Verwaltung von Hardwarekonfigurationsparametern
US8185731B2 (en) * 2007-09-25 2012-05-22 International Business Machines Corporation Device for configuring functional capabilities in a data processing system
US8775787B2 (en) * 2008-01-23 2014-07-08 International Business Machines Corporation Method and device for configuring functional capabilities in a data processing system
CN101533432A (zh) * 2008-03-14 2009-09-16 鸿富锦精密工业(深圳)有限公司 密码保护系统及方法
US10620927B2 (en) * 2008-06-06 2020-04-14 International Business Machines Corporation Method, arrangement, computer program product and data processing program for deploying a software service
US8253552B2 (en) * 2008-06-09 2012-08-28 International Business Machines Corporation Method and device for configuring functional capabilities in a data processing system
WO2010001434A1 (ja) * 2008-06-30 2010-01-07 富士通株式会社 情報処理装置の性能調整装置及び方法
US8171547B2 (en) * 2008-12-03 2012-05-01 Trend Micro Incorporated Method and system for real time classification of events in computer integrity system
US8849717B2 (en) * 2009-07-09 2014-09-30 Simon Cooper Methods and systems for upgrade and synchronization of securely installed applications on a computing device
US20110010759A1 (en) * 2009-07-09 2011-01-13 Apple Inc. Providing a customized interface for an application store
US8417965B1 (en) * 2010-04-07 2013-04-09 Xilinx, Inc. Method and circuit for secure definition and integration of cores
US9038133B2 (en) 2012-12-07 2015-05-19 International Business Machines Corporation Self-authenticating of chip based on intrinsic features
US9965347B1 (en) * 2013-12-18 2018-05-08 Western Digital Technology, Inc. Manufacturing data logging without a network
US11954004B2 (en) * 2021-10-20 2024-04-09 Dell Products L.P. Detection of modification to system configuration

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4796220A (en) * 1986-12-15 1989-01-03 Pride Software Development Corp. Method of controlling the copying of software
US5077660A (en) * 1989-03-23 1991-12-31 F.M.E. Corporation Remote meter configuration
US5182770A (en) * 1991-04-19 1993-01-26 Geza Medveczky System and apparatus for protecting computer software
GB9121591D0 (en) * 1991-10-11 1991-11-27 Pilkington Micro Electronics Data security arrangement for semiconductor programmable logic devices
US5365587A (en) * 1993-03-11 1994-11-15 International Business Machines Corporation Self modifying access code for altering capabilities
US5553144A (en) * 1993-03-11 1996-09-03 International Business Machines Corporation Method and system for selectively altering data processing system functional characteristics without mechanical manipulation
US5499295A (en) * 1993-08-31 1996-03-12 Ericsson Inc. Method and apparatus for feature authorization and software copy protection in RF communications devices
US5757907A (en) * 1994-04-25 1998-05-26 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification

Also Published As

Publication number Publication date
EP0787328A1 (de) 1997-08-06
DE69528663T2 (de) 2003-06-26
EP0787328B1 (de) 2002-10-23
WO1997007463A1 (en) 1997-02-27
US5982899A (en) 1999-11-09

Similar Documents

Publication Publication Date Title
DE69528663D1 (de) Verfahren zum überprüfen der betriebsanordnung eines rechnersystems
DE69525130T2 (de) Verfahren zum Verbessern der Auflösung eines Anzeigesystems
DE69415593T2 (de) Verfahren zur Überprüfung eines nachrichtengesteuerten Betriebssystems
DE69634326D1 (de) Verfahren zum Authentifizieren eines Anwendungsprogramms
DE69709753D1 (de) Verfahren zum verrohren eines bohrlochs
DE69330906D1 (de) Verfahren zum betreiben eines plattenspeichersystem
DE69509773T2 (de) Verfahren zum einbau eines absolutdrucksensors
DE69627814D1 (de) System zum bereitstellen eines bios für den hauptrechner
DE69431306D1 (de) Datennetzgestütztes zahlungssystem und verfahren zum gebrauch eines derartigen systems
DE59607837D1 (de) Verfahren zum kontinuierlichen ersintern eines granulats
DE69837278D1 (de) Verfahren zum schätzen der vorspannung eines zielverffolgungssystems
DE69420802D1 (de) Verfahren zum Prüfen eines Teilnehmersystems
DE59400559D1 (de) Verfahren zur überprüfung der konvertierungsfähigkeit eines katalysators
DE69218682T2 (de) Verfahren zum austesten eines softwareprogramms
DE59404052D1 (de) Verfahren zur überprüfung der konvertierungsfähigkeit eines katalysators
DE59804749D1 (de) Verfahren zum umsetzen eines systemaufrufs
DE59402318D1 (de) Verfahren zum erzeugen eines anregesignals
DE59801054D1 (de) Verfahren zum überwachen eines einspritzsystems
DE59205110D1 (de) Verfahren zum Montieren eines Anschlusselementes
DE69515223D1 (de) System zum aktualisieren der Daten eines ausgebreiteten Datendiensts
DE69904317T2 (de) Verfahren und system zum konfigurieren eines rechners
DE59604614D1 (de) Verfahren zum ausbessern von beschichtungsfehlern
DE58902530D1 (de) Verfahren zum betreiben eines einklemmschutz-sensors.
DE69609719T2 (de) Verfahren zur überwachung eines rechnersystems
DE59601156D1 (de) Verfahren zum orten eines objektes

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8320 Willingness to grant licences declared (paragraph 23)