CM7326/7327 Hardware Key Developer's Manual

Total Page:16

File Type:pdf, Size:1020Kb

CM7326/7327 Hardware Key Developer's Manual CM7326/7327 Hardware Key Developer‘s Manual BDM-610020027 Rev. A ISO9001 and AS9100 Certified RTD Embedded Technologies, Inc. 103 Innovation Blvd. State College, PA 16803-0906 Phone: +1-814-234-8087 FAX: +1-814-234-5218 E-mail [email protected] [email protected] web site http://www.rtd.com CM7326/7327 Hardware Key Developer’s Manual 2 Revision History Rev. A Initial Release Published by: RTD Embedded Technologies, Inc. 103 Innovation Blvd. State College, PA 16803-0906 Copyright 1999,2002,2003,2004 by RTD Embedded Technologies, Inc. All rights reserved Printed in U.S.A. The RTD Logo is a registered trademark of RTD Embedded Technologies. cpuModule and utilityModule are trademarks of RTD Embedded Technologies. PhoenixPICO and PhoenixPICO BIOS are trademarks of Phoenix Technologies Ltd. PS/2, PC/XT, PC/AT and IBM are trademarks of International Business Machines Inc. MS-DOS, Windows, Windows 95, Windows 98 and Windows NT are trademarks of Microsoft Corp. PC/104 is a registered trademark of PC/104 Consortium. All other trademarks appearing in this document are the property of their respective owners. CM7326/7327 Hardware Key Developer’s Manual 3 Contents 1 THE SERVICES OF THE HARDWARE KEY...............................5 2 THE STRUCTURE OF THE HARDWARE KEY ..........................6 2.1 INTERNAL ID .............................................................................................6 2.2 READABLE/WRITABLE DATA MEMORY (RAM)............................................6 2.3 NON-VOLATILE PROGRAMME AND DATA MEMORY (EEPROM)...................6 2.4 MEMORY MAP ............................................................................................8 2.5 INTERNAL ALGORITHM ...............................................................................9 CM7326/7327 Hardware Key Developer’s Manual 4 1 The services of the hardware key ♦ Set-in, unalterable identification code of 96 bit, of which 64 bit is public ♦ Identification code (key) of 832 + 192 bit, which can be programmed ♦ Memory protection against partial or full reading or overwriting ♦ Trying to give the access code is possible only three times, after that the code can be accepted only after resetting (switching off the computer) ♦ Watchdog function (with two separate time bases) with a programmable wide time range ♦ Software-led immediate cold restart (hardware RESET) ♦ Online documentation CM7326/7327 Hardware Key Developer’s Manual 5 2 The structure of the hardware key 2.1 Internal ID The use of the hardware key at the field of security techniques is served by the identification code in the device, which is of 96 bit, only readable, cannot be deleted or changed (address range: 040h-04Bh). The first 64 bit of the above mentioned 96 is public, that is it can be read without any limitations. It can be used for checking the authorised use with the help of a given software. The code can also serve as a parameter of a certain arithmetical operation, which is used for encoding – decoding by the computer programme. Knowing the other 32 bit left, you can delete the key memory previously made secret. As the key memory is released from secrecy with the help of the code (after deleting the whole memory), it is called as MAKEPUB (Make Public) in other parts of this manual and in the utilities. Note: You can have only three attempts to give the correct MAKEPUB code. After that, if the code is still wrong, the hardware key allows further attempts only after switching off (and restart). But:: even if unauthorised people get hold of the MAKEPUB code, it is not possible for them to read the programme memory in case it was made secret previously. The code allows access (reading/writing) only after deleting the programme memory. 2.2 Readable/writable data memory (RAM) The readable/writable memory at the beginning of the memory (range: 000h-01Fh) has an unlimited access (except the security register regarding memory security, for its description, see later). It is typically used for setting the parameters for coding/decoding, and transferring the results (return values). Its further use, transferring function parameters in case of some device functions, are described later. Attention! The content of RAM memory area changes or can even be deleted after switching off (or restart), and even in case of some device functions! 2.3 Non-volatile programme and data memory (EEPROM) The memory area at the address range 080h-0EFh contains a non-volatile, so called EEPROM memory (can be deleted and programmed electronically, only readable memory). Its advantage is that the data it contains do not change or disappear even when switched off. The bytes at the top of this memory area are used for configuration. The following tables show their specifications. Note: access to memory (RAM / EEPROM) can be set according to the content of the security register (configuring secrecy of memory). If the content of the register allows full access (for example 0FFh), then the access to the memories are unlimited. However, if this register configures any other memory secrecy, the EEPROM memory becomes protected against reading from certain places as well as against full writing on the entire area of EEPROM. It means that the otherwise public EEPROM area is not writable either; it is only readable. address (offset) length content 0E8h - 0EBh 4 reserved (068h - 06Bh) 0ECh - 0EDh 2 The second half (second 16 bits) of the (06Ch - 06Dh) CMDCODE of 32 bits necessary for calling PGOpen(…) 0EEh 1 WatchDog configuration register, for the meanings (06Eh) of its bits, see Table 2.3.2. 0EFh 1 security register (configuring memory secrecy), (06Fh) for the meanings of its bits, see Table 2.3.4. Table 2.3.1 Configuration registers bit(s) content b0 Not used (=0) b3-b1 First time constant of WD (after RESET) (8 possible time ranges) b4 Not used (=0) b7-b5 Second time constant of WD (after refresh) (8 possible time ranges) Table 2.3.2 WatchDog (0EEh) configuration register bit(s) content bit(s) content CM7326/7327 Hardware Key Developer’s Manual 6 000 1.5 s 100 48 s 001 4.5 s 101 100 s 010 10 s 110 208 s 011 23 s 111 420 s Table 2.3.3 Time constants of the WatchDog circuit (error rate: 5%) CM7326/7327 Hardware Key Developer’s Manual 7 bit(s) content b2-b0 EEPROM protection (Table 2.3.5.) b4-b3 Not used (=11) b7-b5 RAM protection (Table 2.3.5.) Table 2.3.4 Security (0EFh) configuration register bit(s) EEPROM protection RAM protection 000 First 1 byte public Number of protected bytes: 1 (address: 4) 001 First 2 bytes public Number of protected bytes: 2 (address: 4-5) 010 First 4 bytes public Number of protected bytes: 4 (address: 4-7) 011 First 8 bytes public Number of protected bytes: 8 (address: 4-11) 100 First 16 bytes public Number of protected bytes: 16 (address: 4- 19) 101 First 32 bytes public Not used 110 All bytes public Not used except configuration area 111 All bytes public No protected bytes (All bytes public) Table 2.3.5 Security (0EFh) configuration register 2.4 Memory map As described above, the internal memory of hwKey contains not only the addresses necessary to get access to RAM and EEPROM, but also other described areas. (Figure and Table 2.4.). Address start Address end Length Content 0x00 0x1F 32 memory (RAM) 0x20 0x3F 29 Used (0xFF) 0x40 0x4B 12 Internal ID 0x4C 0x7F 52 Used (0xFF) 0x80 0xEF 112 Key memory (EEPROM) 0xF0 0xFF 16 Used (0xFF) Table 2.4. The memory map of the hardware key x0 x1 x2 x3 x4 x5 x6 x7 x8 x9 xA xB xC xD xE xF 0x Data memory (RAM, readable/writable) 1x 2x Used (0FFh) 3x 4x Internal ID, only readable 5x 6x Used (0FFh) 7x 8x 9x Ax Non-volatile key and configuration memory Bx (EEPROM, readable/writable) Cx Dx Ex Fx Used (0FFh) Figure 2.4 The memory map of the hardware key CM7326/7327 Hardware Key Developer’s Manual 8 2.5 Internal algorithm The pgRun() function starts the internal algorithm. This internal algorithm encodes or decodes the first 32 bit of the RAM memory (0..3 addresses) using the prestored user key-data (RAM memory 8-31 and EEPROM memory 0-103). The RAM memory range 4..7 used by internal coding algorithm. This address range can be clear. CM7326/7327 Hardware Key Developer’s Manual 9 Limited Warranty RTD Embedded Technologies, Inc. warrants the hardware and software products it manufactures and produces to be free from defects in materials and workmanship for one year following the date of shipment from RTD Embedded Technologies, INC. This warranty is limited to the original purchaser of product and is not transferable. During the one year warranty period, RTD Embedded Technologies will repair or replace, at its option, any defective products or parts at no additional charge, provided that the product is returned, shipping prepaid, to RTD Embedded Technologies. All replaced parts and products become the property of RTD Embedded Technologies. Before returning any product for repair, customers are required to contact the factory for an RMA number. THIS LIMITED WARRANTY DOES NOT EXTEND TO ANY PRODUCTS WHICH HAVE BEEN DAMAGED AS A RESULT OF ACCIDENT, MISUSE, ABUSE (such as: use of incorrect input voltages, improper or insufficient ventilation, failure to follow the operating instructions that are provided by RTD Embedded Technologies, "acts of God" or other contingencies beyond the control of RTD Embedded Technologies), OR AS A RESULT OF SERVICE OR MODIFICATION BY ANYONE OTHER THAN RTD Embedded Technologies. EXCEPT AS EXPRESSLY SET FORTH ABOVE, NO OTHER WARRANTIES ARE EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND RTD Embedded Technologies EXPRESSLY DIS- CLAIMS ALL WARRANTIES NOT STATED HEREIN. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES FOR MECHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE LIMITED TO THE DURATION OF THIS WARRANTY.
Recommended publications
  • IBM PC, PC XT, PC at and Compatible Computers
    No. 42 July/ August 1988 $3.95 T H E M J 0 U R N A L Maintaining PCs Keeping Your Hard Drives Running page B Lose your hard drive and you're losing a lot more than $500. You're losing data. Troubleshooting PCs page 14 Finding the defective IC is usually easy if you know what you're looking for. XT Theory Of Operation page 24 It's a lot easier to make sense out of a problem if you know how the circuit works. Simulating A Bus page 32 Once we have the system running we may as well observe something with it. Plus: Ray Tracing (Part 2) page 18 West Coast Computer Faire page 40 Inside PCX Graphics Files page 42 Testing Your Product Idea page 67 And Much, Much, More 1111111 0 . I - . 7~ II , I l,19 Al 31 _. '. CASES & KEYBOARDS POWER SUPPLY 5339 Professional XT-AT 150 Watt Power Supply (XT). 50.00 w I 12 function key 69.00 200 Watt Power Supply (AT). 80.00 5060 Keyboard AT Style .. 55.00 XT Slide Case . 34.00 KB101 Keytronic. 67.00 XT Flip Top or XT Slide with Lock & LED . 38.00 AT with Lock & LED. 65.00 Free Instructions with Each System MONITORS EGA/CGA (Auto Switch) . .. .. 452.00 HARD DRIVES VGA/EGA/CGA Color .. ..... 600.00 & CONTROLLERS CGA Color. .. 295.00 AT 40 MB Seagate #251-1. ..445.00 Amber 12" TTL . 89.00 AT ST 4053 HD. .545.00 Green 12" TTL .. 89.00 AT (MFM) Hard Drive & VIDEO CARDS floppy controller (WO).
    [Show full text]
  • Chip4e+ Compact High-Integration 5X86 Platform with Ethernet
    CHIP4e+ Compact High-Integration 5x86 Platform with Ethernet P/N 128767-001A 2002 XYCOM, INC. Printed in the United States of America 1 CHIP4e+ Manual Revision Description Date A Manual Released 3/98 B Touchscreen Updates 7/02 Trademark Information Brand or product names are registered trademarks of their respective owners. AMD is a registered trademark and 5x86 is a trademark of Advanced Micro Devices Inc. Copyright Information This document is copyrighted by Xycom Incorporated (Xycom) and shall not be reproduced or copied without expressed written authorization from Xycom. The information contained within this document is subject to change without notice. xycom Technical Publications Department 750 North Maple Road Saline, MI 48176–1292 734-429-4971 (phone) 734-429-1010 (fax) 2 Table of Contents Chapter 1 – Module Overview.................................................................................................................... 5 Module Features........................................................................................................................................................5 Architecture...............................................................................................................................................................6 CPU ........................................................................................................................................................................7 PCI Bus Interface ...................................................................................................................................................7
    [Show full text]
  • BIOS Boot Specification
    Compaq Computer Corporation Phoenix Technologies Ltd. Intel Corporation BIOS Boot Specification Version 1.01 January 11, 1996 This specification has been made available to the public. You are hereby granted the right to use, implement, reproduce, and distribute this specification with the foregoing rights at no charge. This specification is, and shall remain, the property of Compaq Computer Corporation (“Compaq”), Phoenix Technologies Ltd (“Phoenix”), and Intel Corporation (“Intel”). NEITHER COMPAQ, PHOENIX NOR INTEL MAKE ANY REPRESENTATION OR WARRANTY REGARDING THIS SPECIFICATION OR ANY PRODUCT OR ITEM DEVELOPED BASED ON THIS SPECIFICATION. USE OF THIS SPECIFICATION FOR ANY PURPOSE IS AT THE RISK OF THE PERSON OR ENTITY USING IT. COMPAQ, PHOENIX AND INTEL DISCLAIM ALL EXPRESS AND IMPLIED WARRANTIES, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT. WITHOUT LIMITING THE GENERALITY OF THE FOREGOING, NEITHER COMPAQ, PHOENIX NOR INTEL MAKE ANY WARRANTY OF ANY KIND THAT ANY ITEM DEVELOPED BASED ON THIS SPECIFICATION, OR ANY PORTION OF IT, WILL NOT INFRINGE ANY COPYRIGHT, PATENT, TRADE SECRET OR OTHER INTELLECTUAL PROPERTY RIGHT OF ANY PERSON OR ENTITY IN ANY COUNTRY. Table of Contents 1.0 INTRODUCTION 5 1.1 REVISION HISTORY 5 1.2 RELATED DOCUMENTS 5 1.3 PURPOSE 5 1.4 TERMS 6 2.0 OVERVIEW 9 2.1 DESCRIPTION 9 3.0 IPL DEVICES 10 3.1 REQUIREMENTS FOR IPL DEVICES 10 3.1.1 IPL TABLE 10 3.1.2 PRODUCT NAME STRING 11 3.2 BAIDS 11 3.3 DEVICES WITH PNP EXPANSION HEADERS
    [Show full text]
  • HP Notebook PC              
    HP NoteBook PC ª±´¤£²¨ 1 ¤°·º¤ª©¸£® ¬ ´²¡³²¨¬¦¦§££ª£³¦§£ª´ª §³£®¥ §£±®«¨´¬£®¨´¨ ¤£²¨ ´£²¡¦¦¨¦¤¦¦¥ ¤£²¨§¬²³±£³¦¥²°´£²¡ª£Hewlett-Packard £¦´£²¡³£´¦Hewlett-Packard´²¡´¨£«¨²¢¨¦¨´´²£¡«¦²³¦¦¥¨ ¤£²¨³¨£³¦§£¬°£¦±®«¦§£²³±§££´°´§££²±¨§£± ª´£³ ´¦¦¥´¨¦ ´£²¡¨´²¬ª´£¢²®´¦¦¡£¦£ª¢£²£¦²¢«§£ª¥²°§¬´±«¬ ¦³§£´£¥ ¦¬¬£®³£¦£ª¢£²£¦²¢«§£ª¥²°§¬´±«¬¦¬¦£¬¦§£¬£®¨ ©££®¦¬§£ª¥²° ¤¨«¨¦³§²´¨´±´¬£³´²¨³´£¥ ¦¥Hewlett-Packard 2002´²¡ £±¡£®¦¬²´¨²§¦Hewlett-Packard´²¡¦³´¥³²¨²³£¦¦§£²« §£²°£´£¥ ¨´±´¬£³´²¨³´£¥ ¦¥§£²°£´£¥ ´ª¨ ²°¨´¢¦³³´£ª¥´ Hewlett-Packard´²¡¦³´¥³²¨²³£¦¦§§§£²«¦´£ª¥´¦³§²´ ´²¡¦³§£²°£´£¥ £ª´¦§£®®¥´£¦§££³¬ ²°¨´¢¦³´£ª¥´¨§£±¦¡ S3 Graphics IncorporatedATI Technologies Inc.Phoenix Technologies Ltd.Microsoft ¦¥¦´¦ª§£²°£´£¥ ¦¬´®«ª´¬Adobe Systems IncorporatedIntel Corporation ²®ª´£ª¥´ §£¢ª¢®´²«¨¢£³´¬£´­±´¨´ª¨§£²°£´£¥ ¦¬ª¦£¦ª¥¢¦¦¥ ²°¨ §£²¡´£¥ £¦¬Macrovision´²¡´¦¬´²¡£ª¡²©££ª±´£¥ ²¦³§£¨£«¨ ´£´£´²«¨¦¬®¦¬£¨Macrovision´²¡²³£££¡ £¦ª¥¢³¨£³ ±²£®Macrovision´²¡¨²¡²³£¦±´§¦¦§£²¡§£¦¨°´£³¨£³ §£²««ª¤®£´¦¬®²°¨ Microsoft Corporation¦³§£¨³²²¡«¨£ª¨£«§WindowsMSDOSMicrosoft Celeron²§£¨³²²¡«¨£ª¨£«§Intel Inside¦Pentium² ¦³²¡«¨£ª¨£«§AcrobatAdobe¦¢ª£´²¡¦³²¡«¨£ª¨£«§SpeedStep Adobe Systems Incorporated Hewlett-Packard Company HP Notebook Customer Care 1000 NE Circle Blvd., MS 425E Corvallis, OR 97330 USA ¤°·º¤ª©¸£® ´¡£¢¦¬³¡¬£¨ ¦²£±©®¦¢¬±³¦§¨´²¡´¦®£²³´°£²®¦©¥£«´©£¢±¦£¥ º¥¸©¤¦ ³¡¨´²¡¦³££¦²¢«²´£¦26 AWG²®«¨´²³±´¦¥´¬°¨ TS008ACA¦³´£¢²ª¢«´£ª¥¢´³£²¨¬¦¥´¬°¨´²³±´´³²¦ ©¥£«´´£¡®¦£¥§££«£«´²£ £¬°¨¢±ª¦®±©®¦¢±¦²£¡§¬³¡¨³¨£³ ­´¬£®¦£¦¨³¡§¦´¬£®¦®£²³´°£²®¦ £¦¨¦ §£¨´²±¬¤¦¨©®¦¢±¦²¡¨²³¥ ²°¨³¨´³´¦
    [Show full text]
  • Advanced Configuration and Power Interface Specification
    Advanced Configuration and Power Interface Specification Compaq Computer Corporation Intel Corporation Microsoft Corporation Phoenix Technologies Ltd. Toshiba Corporation Revision 2.0 July 27, 2000 ii Copyright © 1996, 1997, 1998, 1999, 2000 Compaq Computer Corporation, Intel Corporation, Microsoft Corporation, Phoenix Technologies Ltd., Toshiba Corporation All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER THIS SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER INCLUDING ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED OR INTENDED HEREBY. COMPAQ, INTEL, MICROSOFT, PHOENIX, AND TOSHIBA DISCLAIM ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF PROPRIETARY RIGHTS, RELATING TO IMPLEMENTATION OF INFORMATION IN THIS SPECIFICATION. COMPAQ, INTEL, MICROSOFT, PHOENIX, AND TOSHIBA DO NOT WARRANT OR REPRESENT THAT SUCH IMPLEMENTATION(S) WILL NOT INFRINGE SUCH RIGHTS. Microsoft, Win32, Windows, and Windows NT are registered trademarks of Microsoft Corporation. All other product names are trademarks, registered trademarks, or service marks of their respective owners. iii Affected Revision Change Description Sections Aug. 2000 Major specification revision. 64-bit addressing support added. Processor and device performance state support added. Numerous multiprocessor workstation 2.0 and server-related enhancements. Consistency and readability enhancements throughout. Feb. 1999 Fixed previous errata that deleted wrong paragraph in the RTC_EN description. 4.7.3.1.2 1.0b Clarified P_BLK requirements on multiprocessor systems. 4.7.2.6.3 Changed definition of SCI_INT pin in Table 5-5. 5.2.5 Replaced section 5.2.8, adding new structures and clarifications to support 5.2.8 multiprocessor configurations.
    [Show full text]
  • Hardware Selection: a Nontechnical Approach. INSTITUTION Indiana Univ., Bloomington
    DOCUMENT RESUME ED 289 475 IR 012 941 AUTHOR Kiteka, Sebastian F. TITLE Hardware Selection: A Nontechnical Approach. INSTITUTION Indiana Univ., Bloomington. Vocational Education Services. PUB DATE May 87 NOTE 23p.; For other guides in this series, see IR 012 939-940. PUB TYPE Guides General (050) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS *Computer Printers; *Evaluation Criteria; Guidelines; *Microcomputers; *Screens (Displays); Selection IDENTIFIERS *Computer Selection ABSTRACT Presented in nontechnical language, this guide suggests criteria for the selection of three computer hardware essentials--a microcomputer, a monitor, and a printer. Factors to be considered in selecting the microcomputer are identified and discusscd, including what the computer is to be used for, dealer support, software availability, modem access, add-on capability, the manufacturer, competing brands, and the speed, memory, and power capabilities of the central-processing unit. Key elements to consider when choosing a monitor, which is also called a cathode-ray-tube (crt) display unit, are also explained, including number of screen pixels, number of characters per screen, maximum number of colors, bandwidth, dot pitch, convergence, phcsphor persistence, and provisions for prevention of glare from the screen. Various features of the major types of printers--dot matrix, daisy wheel, thimble, thermal, ink jet, and laser--are also discussed, including quality of characters, print pitch, proportional spacing, carriage width, speed, buffer, support, and cost. The importance of defining what the computer is be used for is emphasized, and the rapidity of new technological developments is noted. A glossary of computer terms is included as well as a list of 15 journal articles for further reading.
    [Show full text]
  • UEFI Firmware Security Concerns and Best Practices UEFI Security Resources - July 2018 Jim Mortensen & Dick Wilkins, Phd Phoenix Technologies, Ltd
    presented by UEFI Firmware Security Concerns and Best Practices UEFI Security Resources - July 2018 Jim Mortensen & Dick Wilkins, PhD Phoenix Technologies, Ltd. UEFI Security Resources – July 2018 Copyright © 2017-2018 Phoenix Technologies Ltd. 1 Legal Stuff Copyright © 2017-2018 Phoenix Technologies Ltd. All rights reserved. PHOENIX TECHNOLOGIES LTD. MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION HEREIN DESCRIBED AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE OR NON- INFRINGEMENT. FURTHER, PHOENIX TECHNOLOGIES LTD. RESERVES THE RIGHT TO REVISE THIS DOCUMENTATION AND TO MAKE CHANGES FROM TIME TO TIME IN THE CONTENT WITHOUT OBLIGATION OF PHOENIX TECHNOLOGIES LTD. TO NOTIFY ANY PERSON OF SUCH REVISIONS OR CHANGES. UEFI Security Resources – July 2018 Copyright © 2017-2018 Phoenix Technologies Ltd. 2 Contents • Introduction • Security Landscape • Threats and Mitigation Guidelines • Additional Concerns • Validation Guidelines • Next Steps • Questions UEFI Security Resources – July 2018 Copyright © 2017-2018 Phoenix Technologies Ltd. 3 Introduction UEFI Security Resources – July 2018 Copyright © 2017-2018 Phoenix Technologies Ltd. 4 This Content • The material provided here is at the request of the UEFI Forum • It is an update of presentations at the 2014 and 2015 Spring UEFI plugfest events • A further update of this material was presented at the October 2017 plugfest UEFI Security Resources – July 2018 Copyright © 2017-2018 Phoenix Technologies Ltd.
    [Show full text]
  • A History of the Personal Computer Index/11
    A History of the Personal Computer 6100 CPU. See Intersil Index 6501 and 6502 microprocessor. See MOS Legend: Chap.#/Page# of Chap. 6502 BASIC. See Microsoft/Prog. Languages -- Numerals -- 7000 copier. See Xerox/Misc. 3 E-Z Pieces software, 13/20 8000 microprocessors. See 3-Plus-1 software. See Intel/Microprocessors Commodore 8010 “Star” Information 3Com Corporation, 12/15, System. See Xerox/Comp. 12/27, 16/17, 17/18, 17/20 8080 and 8086 BASIC. See 3M company, 17/5, 17/22 Microsoft/Prog. Languages 3P+S board. See Processor 8514/A standard, 20/6 Technology 9700 laser printing system. 4K BASIC. See Microsoft/Prog. See Xerox/Misc. Languages 16032 and 32032 micro/p. See 4th Dimension. See ACI National Semiconductor 8/16 magazine, 18/5 65802 and 65816 micro/p. See 8/16-Central, 18/5 Western Design Center 8K BASIC. See Microsoft/Prog. 68000 series of micro/p. See Languages Motorola 20SC hard drive. See Apple 80000 series of micro/p. See Computer/Accessories Intel/Microprocessors 64 computer. See Commodore 88000 micro/p. See Motorola 80 Microcomputing magazine, 18/4 --A-- 80-103A modem. See Hayes A Programming lang. See APL 86-DOS. See Seattle Computer A+ magazine, 18/5 128EX/2 computer. See Video A.P.P.L.E. (Apple Pugetsound Technology Program Library Exchange) 386i personal computer. See user group, 18/4, 19/17 Sun Microsystems Call-A.P.P.L.E. magazine, 432 microprocessor. See 18/4 Intel/Microprocessors A2-Central newsletter, 18/5 603/4 Electronic Multiplier. Abacus magazine, 18/8 See IBM/Computer (mainframe) ABC (Atanasoff-Berry 660 computer.
    [Show full text]
  • Phoenixbios 4.0 Revision 6
    Phoenix Technologies Ltd. PhoenixBIOS 4.0 Revision 6 User's Manual Phoenix Technologies Ltd., 411 E. Plumeria, San Jose, CA 95134 Copyright PhoenixBIOS 4.0 User's Manual 22 June 2000 2000 Phoenix Technologies Ltd. All Rights Reserved. Disclaimer The programs are provided "as is" without warranty of any kind either expressed or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose. This publication could contain technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of this publication. Phoenix Technologies Ltd. is without obligation to notify any person of such revisions or changes. Purpose of Document This guide explains how to configure your PC and optimize its performance using the Setup program. It also explains how to use the BIOS function calls in writing computer programs. PB4.0 UM 06.22.00 Page ii Phoenix Technologies Ltd. Contents About This Manual ...................................................................................... 1 Chapter 1The Setup Guide ......................................................................... 2 The Main Menu ................................................................................... 2 The Menu Bar............................................................................. 3 The Legend Bar.......................................................................... 3 The Field Help Window .............................................................
    [Show full text]
  • Company Vendor ID (Decimal Format) (AVL) Ditest Fahrzeugdiagnose Gmbh 4621 @Pos.Com 3765 0XF8 Limited 10737 1MORE INC
    Vendor ID Company (Decimal Format) (AVL) DiTEST Fahrzeugdiagnose GmbH 4621 @pos.com 3765 0XF8 Limited 10737 1MORE INC. 12048 360fly, Inc. 11161 3C TEK CORP. 9397 3D Imaging & Simulations Corp. (3DISC) 11190 3D Systems Corporation 10632 3DRUDDER 11770 3eYamaichi Electronics Co., Ltd. 8709 3M Cogent, Inc. 7717 3M Scott 8463 3T B.V. 11721 4iiii Innovations Inc. 10009 4Links Limited 10728 4MOD Technology 10244 64seconds, Inc. 12215 77 Elektronika Kft. 11175 89 North, Inc. 12070 Shenzhen 8Bitdo Tech Co., Ltd. 11720 90meter Solutions, Inc. 12086 A‐FOUR TECH CO., LTD. 2522 A‐One Co., Ltd. 10116 A‐Tec Subsystem, Inc. 2164 A‐VEKT K.K. 11459 A. Eberle GmbH & Co. KG 6910 a.tron3d GmbH 9965 A&T Corporation 11849 Aaronia AG 12146 abatec group AG 10371 ABB India Limited 11250 ABILITY ENTERPRISE CO., LTD. 5145 Abionic SA 12412 AbleNet Inc. 8262 Ableton AG 10626 ABOV Semiconductor Co., Ltd. 6697 Absolute USA 10972 AcBel Polytech Inc. 12335 Access Network Technology Limited 10568 ACCUCOMM, INC. 10219 Accumetrics Associates, Inc. 10392 Accusys, Inc. 5055 Ace Karaoke Corp. 8799 ACELLA 8758 Acer, Inc. 1282 Aces Electronics Co., Ltd. 7347 Aclima Inc. 10273 ACON, Advanced‐Connectek, Inc. 1314 Acoustic Arc Technology Holding Limited 12353 ACR Braendli & Voegeli AG 11152 Acromag Inc. 9855 Acroname Inc. 9471 Action Industries (M) SDN BHD 11715 Action Star Technology Co., Ltd. 2101 Actions Microelectronics Co., Ltd. 7649 Actions Semiconductor Co., Ltd. 4310 Active Mind Technology 10505 Qorvo, Inc 11744 Activision 5168 Acute Technology Inc. 10876 Adam Tech 5437 Adapt‐IP Company 10990 Adaptertek Technology Co., Ltd. 11329 ADATA Technology Co., Ltd.
    [Show full text]
  • Introduction to Computer Technology, Network Economics
    _______ _______ _______ _______ _______ _______ _______ _______ _______ _______ Introduction to _______ _______ _______ _______ Computer Technology, _______ _______ _______ _______ Network Economics, _______ _______ _______ _______ and Intellectual _______ _______ Property Law Computer software and Internet commerce are among the fastest growing and most promising industries in the United States. A recent government report notes that more than half of U.S. nonfarm industries either produce information technology (IT) directly or invest in and use information technology products and services. U.S. Commerce Department, The Emerging Digital Economy II (1999). The information technology sector of the U.S. economy represented 8 percent of gross domestic product (GDP) in 1999, accounting for more than $700 billion. Computer software accounted for $200 billion of this total. The IT sector of the U.S. economy has steadily increased its share of the GDP in the 1990s and shows no sign of slowing down. These patterns can be seen throughout the global economy. A World Gone Soft: A Survey of the Software Industry, The Economist (May 25, 1996). While firms such as Intel, Microsoft, Compaq, IBM, Cisco, AOL, and Amazon.com attract much of the attention in the IT marketplace, the IT industries touch almost all aspects of the modern economy. For example, traditional manufacturing firms, such as General Motors, make significant use of computers, computer software, and computer networks in their businesses. Automobile manufacturers use CAD (computer-aided design) software to design new vehicles, CAM (computer-aided manufacturing) software to as- semble these designs, and digital networks to purchase component parts and to distribute vehicles to customers.
    [Show full text]
  • Phoenix Securewipe Datasheet
    Phoenix SecureWipe™ WHAT IS PHOENIX SECUREWIPE? Phoenix SecureWipe™ is a BIOS firmware product that securely erases SSD, HDD and other mass storage devices. It erases all data and partitions independent of the operating system and can be invoked locally via hotkey, or via remote control using OEM developed management solutions. WHY USE PHOENIX SECUREWIPE? Features Protects sensitive data when recycling or disposing of a computing device Selectable Erase Methods Consumers – identity theft, financial information, family photos 〉 ATA and NVMe Secure Erase Enterprise – intellectual property and financial information 〉 OPAL Password/PSID Revert Simple and easy to use without the need of any third party tools 〉 US DoD 5220.22-M, [3 passes + verify] No extra boot devices required to run specialized software 〉 Single Pass Zeros, [1 pass] 〉 US Navy & Air Force, [3 passes + verify] Works on any x86 PC that uses Phoenix UEFI firmware 〉 British HMG Infosec Standard 5, Enhanced, No dependencies on OS-specific software solutions [3 passes + verify] 〉 German VSITR, [7 passes] Cost effective and built into the product before shipping to users 〉 Russian GOST P50739-95 Level 1, [1 pass] Resides in the firmware and cannot be accidentally removed by users 〉 Russian GOST P50739-95 Level 4, [1 pass] WHAT MAKES PHOENIX SECUREWIPE A GREAT SOLUTION? 〉 RCMP TSSIT OPS-II, [7 passes] 〉 CSE Canada ITSG-06 (Unclassified), [3 passes] Completely and securely erase the entire HDD/SSD Built-in Windows/Linux OS features cannot erase the entire HDD/SSD Packaging Options Phoenix SecureWipe™ built into the firmware has full access to the entire HDD/SSD 〉 Standalone: run from UEFI Shell or a Utility Toolset with the default text-based Phoenix SecureWipe UI.
    [Show full text]