Securing leased resources on a computer
First Claim
1. A method for securing leased resources on a computer, comprising:
- receiving a request from a requestor for configuration data of a resource of the computer;
determining whether the resource is leased and whether the resource is enabled;
reading un-encoded configuration data from the resource and sending the un-encoded configuration data to the requestor, if the resource is not leased; and
reading encoded configuration data from the resource, decoding the encoded configuration data, sending the decoded configuration data to the requestor and logging use of the resource by the requestor, if the resource is leased and enabled.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide a novel and non-obvious method, system and computer program product for securing of leased resources on a computer. In one embodiment of the invention, a computer for securing resources may comprise at least one processor, a plurality of resources, wherein each resource is associated with configuration data and a programmable logic device connected to each of the plurality of resources. The programmable logic device may be configured for determining whether a resource is leased, reading un-encoded configuration data from a resource, and sending the configuration data to a first unit, if the resource is not leased. The programmable logic device may further be configured for reading encoded configuration data from a resource, decoding the configuration data, sending the configuration data that was decoded to a first unit, and logging use of the resource by the first unit, if the resource is leased.
-
Citations
14 Claims
-
1. A method for securing leased resources on a computer, comprising:
-
receiving a request from a requestor for configuration data of a resource of the computer; determining whether the resource is leased and whether the resource is enabled; reading un-encoded configuration data from the resource and sending the un-encoded configuration data to the requestor, if the resource is not leased; and reading encoded configuration data from the resource, decoding the encoded configuration data, sending the decoded configuration data to the requestor and logging use of the resource by the requestor, if the resource is leased and enabled. - View Dependent Claims (2, 3, 4)
-
-
5. A computer for securing resources, comprising:
-
at least one processor; a plurality of resources, wherein each resource is associated with configuration data; a programmable logic device connected to each of the plurality of resources, the programmable logic device configured for; determining whether a resource is leased and enabled; reading un-encoded configuration data from the resource and sending the un-encoded configuration data to a requestor, if the resource is not leased; and reading encoded configuration data from the resource, decoding the encoded configuration data, sending the decoded configuration data to the requestor and logging use of the resource by the requestor, if the resource is leased and enabled. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product comprising a computer usable medium embodying computer usable program code for securing resources of a computer, the computer program product comprising:
-
computer usable program code for receiving a request from a requestor for configuration data of a resource of the computer; computer usable program code for determining whether the resource is leased and enabled; computer usable program code for reading un-encoded configuration data from the resource and sending the un-encoded configuration data to the requestor, if the resource is not leased; and computer usable program code for reading encoded configuration data from the resources, decoding the encoded configuration data, sending the decoded configuration data to the requestor and logging use of the resource by the requestor, if the resource is leased and enabled.
-
Specification