scispace - formally typeset
Patent

Method and apparatus for secure execution of software prior to a computer system being powered down or entering a low energy consumption mode

Reads0
Chats0
TLDR
In this paper, the authors present a system that automatically and securely executes registered programs immediately prior to a transition to a reduced energy consumption state using a registry table specifying registered programs and a secure modification detection value for each registered program.
Abstract
A computer system that automatically and securely executes registered programs immediately prior to a transition to a reduced energy consumption state. A registrar table specifying registered programs and a secure modification detection value for each registered program are maintained in system management mode memory or other secure memory space in the computer system. A system management interrupt is generated following a request to remove power from the computer system or the occurrence of an event that triggers an energy saving mode. The system management interrupt handler routine then generates a current modification detection value for each registered program. The current modification detection values are compared with the secure modification detection values. Execution of a registered program is permitted if the values match. After all registered programs have been executed, the computer system automatically powers down or enters an energy saving mode. The computer system thereby allows secure and convenient execution of programs or commands that would typically interfere with normal computer use.

read more

Citations
More filters
Patent

System and method for protecting a computer and a network from hostile downloadables

TL;DR: In this article, a system consisting of a security policy, an interface for receiving a downloadable, and a comparator for applying the security policy to the downloadable to determine if the policy has been violated.
Patent

System and method for attaching a downloadable security profile to a downloadable

TL;DR: In this article, the authors propose a system consisting of an inspector and a protection engine, which includes a content inspection engine that uses a set of rules to generate a Downloadable security profile corresponding to a downloadable, e.g., Java applets, ActiveX controls, JavaScript scripts, or Visual Basic scripts.
Patent

Malicious mobile code runtime monitoring system and methods

TL;DR: In this paper, a mobile protection code (MPC) is used to prevent malicious downloadable operation attempts to be received by the MPC and causing corresponding corresponding corresponding operations to be executed in response to the attempts.
Patent

Systems and methods for secure data sharing

TL;DR: In this paper, a sharable file-level key is generated based on a workgroup key associated with the data file, as well as unique information associated with a data file.
Patent

Accelerator system for use with secure data storage

TL;DR: In this article, a bus and an accelerator are coupled to one another, where the accelerator has an application function block and a network interface is coupled to obtain the processed data from the storage for transmission.
References
More filters
Patent

Method and apparatus for assessing integrity of computer system software

TL;DR: In this paper, a hardware latch is used to protect the codes in non-volatile memory from being overwritten by subsequent untrusted programs, and the latch is only reset at system restart, when control returns to the bootstrap program.
Patent

Transparent, secure computer virus detection method and apparatus

TL;DR: In this article, a reserved non-DOS hard disk partition is used to store routines which pre-boot the computer system and provide a secure environment from which to verify files, starting with a self-check on the nonDOS partition routines, then checking the master boot record and boot sectors of the hard disk.