Number | Name | Date | Kind |
---|---|---|---|
5349643 | Cox et al. | Sep 1994 | A |
5367686 | Fisher et al. | Nov 1994 | A |
5454110 | Kannan et al. | Sep 1995 | A |
5519870 | Kannan et al. | May 1996 | A |
5668992 | Hammer et al. | Sep 1997 | A |
5680547 | Chang | Oct 1997 | A |
5684952 | Stein | Nov 1997 | A |
5828888 | Kozaki et al. | Oct 1998 | A |
5870554 | Grossman et al. | Feb 1999 | A |
5960175 | Grossman et al. | Sep 1999 | A |
6066182 | Wilde et al. | May 2000 | A |
6301612 | Selitrennikoff et al. | Oct 2001 | B1 |
6421777 | Pierre-Louis et al. | Jul 2002 | B1 |
6490677 | Aguilar et al. | Dec 2002 | B1 |
6532537 | Chen et al. | Mar 2003 | B1 |
6535976 | Hoggarth et al. | Mar 2003 | B1 |
6601096 | Lassiter, Jr. | Jul 2003 | B1 |
6601166 | Ayyar et al. | Jul 2003 | B1 |
Number | Date | Country |
---|---|---|
2000-112720 | Apr 2000 | JP |
Entry |
---|
“Secure Remote Configuration for Networked Computer Systems”, IBM Technical Disclosure Bulletin, Jan. 1998, vol. 41, p 653-656.* |
Lomas et al., “Remote Booting in a Hostile World: To Whom am I Speaking?”, Computing Practices, vol. 28 Issue: 1, Jan. 1995, pp 50-54. |