LIMITED FUNCTIONALITY MODE FOR SECURE, REMOTE, DECOUPLED COMPUTER OWNERSHIP
摘要
<p>In one embodiment, a computer system (10) comprises one or more components (12A-12B; 16; 20; 22; 24; 26; 28; 30) and a secure computing environment (14) coupled to the components (12A-12B; 16; 20; 22; 24; 26; 28; 30). The secure computing environment (14) is configured to program at least one of the components (12A-12B; 16; 20; 22; 24; 26; 28; 30) to enter a limited functionality mode responsive to expiration of a use right to the computer system (10), wherein operation of the computer system (10) in the limited functionality mode is reduced compared to operation when the use right has not expired. The secure computing environment (14) is configured to monitor the components (12A-12B; 16; 20; 22; 24; 26; 28; 30) in the limited functionality mode to detect that a limited functionality mode configuration has been modified by an unauthorized entity and to cause the computer system (10) to enter a second mode in which operation of the computer system (10) is reduced compared to operation in the limited functionality mode in response. In another embodiment, the secure computing environment (14) detects a non- temporal event that indicates a violation of an owner-imposed restriction and enters a limited functionality mode.</p>