Home

Data security method and device for computer modules

image

Contents

1. SO l 40 Computer Module Boy A 20 15 Insert Desktop 5 Peripheral E P 0 Attached Computer Module FIG I U S Patent Jan 26 2010 Sheet 2 of 8 US RE41 092 E Opening for Engaging Lock Fla 2 U S Patent Jan 26 2010 Sheet 3 of 8 US RE41 092 E 400 432 7 7 ci Oi GNECTOE E AMER I 19 eT m m I Host i ff t incl i t lnferfoce 1 Sys BIOS ond l i Controller Possword j Height i Ge V j 4mm i 401 Lock 405 i 723 403 Control l Width l CPU Module I 46 mm i a Oa NES er a a RI 3 i 302 ari i 435 i Drive 254mm E Depth i MUERE NEN 234 mm 9 213 i l Power i Regulator i H 437 tT Moin circuit I i i l l f l l i underneath i j l i5 Connection to lock contro 420 i REREN Security wer LIP ue B U S Patent Jan 26 2010 Sheet 4 of 8 US RE41 092 E ye 300 77301 313 Access Privilege Owner Owner Password None 303 E Business JST General St Business Password Company rA Company s shared console 317 C95 Restricted 311 General Company FIG 4 US RE41 092 E Sheet 5 of 8 Jan 26 2010 U S Patent S Sid su0 08UU00 Sg Oe spe clu ejdsiQ LSS jajoquo J8 QJUOS auau ISOH eoepejul jesoyduag jOHUOY BEG ge sng ebpug Add ess QI epo Mc bed yunoeg M UON sng I2d Use 3 ejosuo SOS 3qi sen sng SLS sng eAuq cos eg Ysid pJeH 4
2. FIG 3 is a simplified top view diagram of a computer module according to an embodiment of the present inven tion FIG 4 is a simplified illustration of security systems according to embodiments of the present invention FIG 5 is a simplified diagram of a computer module in a console according to an embodiment of the present inven tion FIG 6 is a simplified diagram of a security method for a module according to an embodiment of the present inven tion and FIG 7 is a simplified diagram of a method according to an embodiment of the present invention FIG 8 is a simplified diagram of a system 800 according to an alternative embodiment of the present application DESCRIPTION OF THE SPECIFIC EMBODIMENTS FIG 1 is a simplified diagram of a computer system 1 according to an embodiment of the present invention This diagram is merely an illustration and should not limit the scope of the claims herein One of ordinary skill in the art US RE41 092 E 5 would recognize other variations modifications and alterna tives The computer system 1 includes an attached computer module i e ACM 10 a desktop console 20 among other elements The computer system is modular and has a variety of components that are removable Some of these compo nents or modules can be used in different computers workstations computerized television sets and portable or laptop units In the present embodiment ACM 10 includes computer components
3. T ines Seat etal 2000 2004 lt lt http www crystalpc com products roserv 991 osrowpour 5 999 952 A 12 1999 Jenkins et al ers asp gt gt downloadeg from web on Jun 17 2004 8 pgs 6 002 442 A 12 1999 Li etal Crystal Advertisement for QuickConnect Cable Manage 6 011 546 A 1 2000 Bertram mant 2000 2004 lt lt http www crystalpc com prod 6 028 643 A 2 2000 Jordan et al ucts quickconnect asp gt gt downloaded from web on Jun 17 6 029 183 A 2 2000 Jenkins et al 2004 4 pgs 60381621A 3 2000 alice al Cubix Product Brochure entitled Density System 6 040 792 A 3 2000 Watson et al 6 052 513 A 4 2000 MacLaren 2000 lt lt http 64 173 211 7 support techinfo system 6 069 615 A 5 2000 Abraham et al density10 htm gt gt downloaded from web on Jun 22 2004 3 6 088 224 A 7 2000 Gallagher et al pgs 6 163 464 A 12 2000 Ishibashi et al Cubix Product Brochure entitled Density System Techni 6 202 169 B1 3 2001 Razzaghe Ashrafi et al cal Specification 2000 lt lt http 64 173 211 7 support 6 20822 Bli 23 200 Lt Manwelle cal techinfo system density info spec htm gt gt downloaded from 6 216 185 B1 4 2001 Chu b J 22 2004 2 6 304 895 Bl 10 2001 Schneider et al bisou ax XDE 6 311 268 B1 10 2001 Chu Cubix Product Manual entitled Density System Chapter 6 314 522 B1 11 2001 Chuetal l Introduction 2000 lt lt http 64 173 211 7 support 6 317 329 B1 11 2001 Dowdy etal techinfo manuals
4. can also be pro vided Although the functionality above has been generally described in terms of a specific sequence of steps other steps can also be used Here the steps can be implemented in a combination of hardware firmware and software Either of these can be further combined or even separated Depending upon the embodiment the functionality can be implemented in a number of different ways without departing from the spirit and scope of the claims herein One of ordinary skill in the art would recognize other variations modifications and alternatives While the above is a full description of the specific embodiments various modifications alternative construc tions and equivalents may be used Therefore the above description and illustrations should not be taken as limiting the scope of the present invention which is defined by the appended claims What is claimed is 1 A security protection method for a computer module said method comprising inserting the computer module into a console initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module wherein said step of initiating reads said security iden tification of said computer module from a flash memory device determining ofa predetermined security status based upon a relationship of said console identification and said computer module identification selecting sai
5. ule identification a predetermined security status is deter mined from for example a look up table or the like The method then selects the predetermined security status which can be one of many The method then operates the computer module based upon the security status In a further alternative embodiment the present invention provides a method for identifying a user for a computer module The method includes inserting a computer module into a console and initiating a security program in memory of the computer module The method prompts a plurality of input fields corresponding to respective input information on an 5 20 25 40 45 50 65 4 a user interface to be provided by a user of the computer module Next the method inputs the input information into the user interface of the computer module The input infor mation includes a user e g owner name a user e g owner password a business name a business password and a location Still further the present invention provides a system for secured information transactions e g data security elec tronic commerce private communications The system includes a console comprising a peripheral controller housed in the console A user identification input device e g keyboard retinal reader finger print reader voice recogni tion unit is coupled to the peripheral controller The user identification input device is provided for user identification data
6. 4 Communication device e g LAN or modem 5 Computer Module Bay interface device and connectors to ACM 6 Flash memory with security ID 7 Power supply or battery system and other devices The Computer Module Bay CMB is an opening in a peripheral console that receives ACM CMB provides mechanical protection and electrical connection to ACM The Computer Module Interface bus is made up of 3 bus components video bus peripheral data bus and power bus Video Bus consists of video output of graphics devices i e analog RGB and control signals for monitor or digital video signals to drive flat panel displays Power bus supplies the power for ACM Peripheral data bus is a high speed compressed peripheral bridge bus managed by a Host Inter face Controller in ACM and a peripheral Interface Controller in peripheral console In some embodiments all peripheral data transaction passes through the interface controllers The implementation of the secured ACM generally includes the following elements 1 A programmable Flash memory controlled by the Peripheral Interface Controller containing the security ID for the peripheral console 2 A programmable Flash memory controlled by the Host Interface Controller containing hardware specific secu rity code and ID for the computer module 5 0 25 30 35 40 45 50 55 60 65 8 3 A data detection and control circuitry within Host Inter face Controller to detect an
7. al Feb 17 1997 lt lt http Awww lantimes com testing 97feb 5 673 174 A 9 1997 Hamirani 702b064a html gt gt downloaded from web on Jun 23 2004 2 5 680 126 A 10 1997 Kikinis pgs Sed a pu Sey Williams Dennis Top Scores for Useability and Open 721 ikinis 3 h 5 721 842 A 2 1998 Beasley et al ness Feb 17 1997 http www lantimes com testing 5 745 733 A 4 1998 Robinson 97feb 702b064a html gt gt downloaded from web on Jun 23 5 752 080 A 5 1998 Ryan 2004 2 pgs 5 774 704 A 6 1998 Williams Williams Dennis ChatCom Inc Chatterbox Feb 17 EN A gt ae Ve 1997 http www lantimes com testing 97feb 809 ollmann 5815681 A 3 1098 Kiihis 702b066a html gt gt downloaded from web on Jun 23 2004 3 5 819 050 A 10 1998 Boehling et al pgs 5 826 048 A 10 1998 Dempsey et al Williams Dennis EVERSYS Corp System 8000 Feb 5 848 249 A 12 1998 Garbus 17 1997 http www lantimes com testing 97feb 5 859 660 A 1 1999 Prentice 702b070b html gt gt downloaded from web on Jun 22 2004 4 5 907 566 A 5 1999 Benson et al pgs D MU E Williams Dennis Cubix Corp ERS FT II Feb 17 1997 948 enkins et al 5 960 213 A 9 1999 Wilson http www lantimes com testing 97feb 5 968 144 A 10 1999 Walker et al 702b068b html downloaded from web on Jun 23 2004 4 5 977 989 A 11 1999 Lee et al pgs 5 982 363 A 11 1999 Naiff Crystal Advertisement for Rackmount Computers Len
8. console used by the user the security system can provide partial or full access to information on servers via network as well as an attached computer module Information can also be limited to read only for certain information sources such as a server a hard drive a floppy drive and others In a specific embodiment the present invention also pro vides a security feature for the ACM 307 Here the user of the ACM can be granted access to information in the ACM if the correct security identification information 319 is pro vided to the combination of ACM and console Once the correct information is provided the user can access the information on the hard drive of the ACM which can be for private use Other levels of access and security can also be provided depending upon the application FIG 5 is a simplified diagram 500 of a computer module in a console according to an embodiment of the present invention This diagram is merely an illustration which should not limit the scope of the claims herein One of ordi nary skill in the art would recognize other variations modifications and alternatives The block diagram 500 includes an attached computer module 501 and a peripheral console 503 as well as other elements as desired These 20 25 30 35 40 45 50 55 60 65 10 elements have a variety of features such as those noted above as well as others In the present diagram different reference numerals are used t
9. density info Chap 1 htm downloaded 6 321 335 B1 11 2001 Chu from web on Jun 22 2004 5 pgs 6 332 180 BI 12 2001 Kauffman et al RM 6 345330 B2 2 2002 Chu Cubix Click on the front panel that matches your system 6 366 951 Bl 4 2002 Schmidt 2000 lt lt http 64 173 211 7 support techinfo system 6 378 009 BL 4 2002 Pinkston II et al density density htm gt gt downloaded from web on Jun 22 6 381 602 Bl 4 2002 Shoroff et al 2004 1 pg US RE41 092 E Page 3 Cubix Product Manual entitled Density System Chapter 2 Installation 2000 lt lt http 64 173 211 7 support techinfo manuals density Chap 2 htm downloaded from web on Jun 22 2004 9 pgs Cubix Product Manual entitled Density System Chapter 3 Operation 2000 lt lt http 64 173 211 7 support techinfo manuals density Chap 3 htm downloaded from web on Jun 22 2004 4 pgs Cubix Product Manual entitled Density System Chapter 4 Maintenance and Repair 2000 http 64 173 211 7 support techinfo manuals density Chap 4 htm gt gt down loaded from web on Jun 22 2004 5 pgs Cubix What are Groups 2000 lt lt http 64 173 211 7 support techinfo system density info groups htm gt gt downloaded from web on Jun 22 2004 3 pgs Cubix SP 5200XS Series Plug in Computers 2000 http 64 173 211 7 support techinfo bc sp5200xs in tro htm gt gt downloaded from web on Jun
10. interface controller coupled to an interface connector coupling the computer module to a computer console the computer console comprising a second interface con troller compatible to the first interface controller and a LAN communication controller coupled to an external network establishing communication between the two interface controllers receiving the user password from the console activating the security program to match the user pass word and establishing the console access to the com puter module the method further comprising providing password protection for said computer module from codes contained in a flash memory device of the com puter module 61 The method of claim 60 wherein the attached com puter module receives power from the console to form a functional computer 62 The method of claim 60 wherein all data transaction 25 of the attached computer module passes through said inter face controllers
11. of the user The system has an attached computer mod ule coupled to the console The attached computer module has a security memory device e g flash memory device stored with the user identification data Numerous benefits are achieved using the present inven tion over previously existing techniques The present inven tion provides mechanical and electrical security systems to prevent theft or unauthorized use of the computer system in a specific embodiment Additionally the present invention substantially prevents accidental removal of the ACM from the console In some embodiments the present invention prevents illegal or unauthorized use during transit The present invention is also implemented using conventional technologies that can be provided in the present computer system in an easy and efficient manner Depending upon the embodiment one or more of these benefits can be available These and other advantages or benefits are described throughout the present specification and are described more particularly below These and other embodiments of the present invention as well as its advantages and features are described in more detail in conjunction with the text below and attached FIGS BRIEF DESCRIPTION OF THE DRAWINGS FIG 1 is a simplified diagram of a computer system according to an embodiment of the present invention FIG 2 is a simplified diagram of a computer module according to an embodiment of the present invention
12. processing unit CPU module 400 and a second portion which includes a hard drive module 420 A common printed circuit board 437 houses these modules and the like Among other features the ACM includes the central processing unit module 400 with a cache memory 405 which is coupled to a north bridge unit 421 and a host inter 20 25 30 35 40 45 50 55 60 65 6 face controller 401 The host interface controller includes a lock control 403 As shown the CPU module is disposed on a first portion of the attached computer module and couples to connectors 17 Here the CPU module is spatially located near connector 17 The CPU module can use a suitable microprocessing unit microcontroller digital signal processor and the like In a specific embodiment the CPU module uses for example a 400 MHz Pentium II microprocessor module from Intel Cor poration and like microprocessors from AMD Corporation Cyrix Corporation now National Semiconductor Corporation and others In other aspects the microproces sor can be one such as the Compaq Computer Corporation Alpha Chip Apple Computer Corporation PowerPC G3 processor and the like Further higher speed processors are contemplated in other embodiments as technology increases in the future In the CPU module host interface controller 401 is coupled to BIOS flash memory 405 Additionally the host interface controller is coupled to a clock control logic a
13. read and copied illegally from a hard disk drive on a PC or any removable media PC architecture generally shows freedom of data flow between memory and peripheral devices within the allowed memory and I O address spaces In conventional PC architecture a peripheral bus i e PCI bus is used to control all data transactions among peripheral devices PCI bus allows any device to be a bus master and perform data trans action with another device Also when a software program is in control it can move data between any two devices There is no hardware or protocol security mechanism on a standard peripheral bus such as PCI Bus to detect or block data trans actions Operating system may have individual files read or write protected These types of special security feature require significant additional user interaction to control This is too cumbersome for a typical user to manage There is no mechanism in current PCs to allow access to the primary hard disk drive and yet prevent copying of its content The conventional PC is a single machine that does not have a mechanism to perform security ID matching in hardware Thus what is needed are computer systems that provide improved security features to prevent illegal or unauthorized access to information SUMMARY OF THE INVENTION According to the present invention a technique including a method and device for securing a computer module in a computer system is provided In an exemplary embodi
14. 22 2004 2 pgs Cubix SP 5200XS Series Technical Specifications O 2000 http 64 173 211 7 support techinfo bc sp5200xs spec htm gt gt downloaded from web on Jun 22 2004 2 pgs Cubix SP 5200 Series Chapter 1 Introduction 2000 lt lt http 64 173 211 7 support techinfo manuals sp5200 chap 1 htm downloaded from web on Jun 22 2004 3 pgs Cubix SP 5200 Series Chapter 2 Switches amp Jumpers 2000 lt lt http 64 173 211 7 support techinfo manuals sp5200 chap 2 htm downloaded from web on Jun 22 2004 3 pgs Cubix SP 5200 Series Chapter 3 Installation 2000 http 64 173 211 7 support techinfo manuals sp5200 chap 3 htm downloaded from web on Jun 22 2004 4 pgs Cubix SP 5200 Series Chapter 4 Technical Reference 2000 lt lt http 64 173 211 7 support techinfo manuals sp5200 chap 4 htm downloaded from web on Jun 22 2004 3 pgs Cubix DP 6200 D Series Plug in Computers lt lt http 64 173 211 7 support techinfo be dp 6200d intro htm gt gt downloaded from web on Jun 22 2004 3 pgs Cubix Installing DP or SP Series Boards 2000 lt lt http 64 173 211 7 support techinfo be dp6200 in tro htm gt gt downloaded from web on Jun 22 2004 2 pgs Cubix Powering On Off or Resetting Plug in Computers in an Density System 2000 lt lt http 64 173 211 7 sup port techinfo system density info power ht
15. 3 561 B1 5 2002 Hagiwara et al 6 401 124 Bl 6 2002 Yang et al 311 397 A 5 1994 Harshberger et al 6 452 790 Bl 9 2002 Chu et al 5 317 477 A 5 1994 Gillett 6 453 344 BL 9 2002 Ellsworth 5 319 771 A 6 1994 Takeda 6 496 361 B2 12 2002 Kim et al 5 331 509 A 7 1994 Kikinis 6 549 966 B1 4 2003 Dickens et al 5 355 391 A 10 1994 Horowitz et al 6 643 777 Bl 11 2003 Chu 5 428 806 A 6 1995 Pocrass 6 718 415 B1 4 2004 Chu 5 436 857 A 7 1995 Nelson et al 5 463 742 A 10 1995 Kobayashi OTHER PUBLICATIONS 5 539 616 A 7 1996 Kikinis 5 546 463 A 8 1996 Caputo et al senes 713 159 Gardner Michael and Null Christopher A Server Condo PA x TS Lr eI et al minium lt lt http www lantimes com testing 98jun 550 an et al 5 578940 A iidoge Dilla 80640424 html gt Jun 23 2004 pgs l 5 600 800 A 2 1997 Kikinis et al Harrison Dave VME in the Military The M1A2 Main 5 606 717 A 2 1997 Farmwald et al Battle Tank Upgrade Relies on COTS VME lt lt http 5 608 608 A 3 1997 Flint et al www dy4 com gt gt Feb 9 1998 pp 1 34 5 623 637 A 4 1997 Jones et al Williams Dennis Consolidated Servers Feb 17 1997 5 630 057 A 3 1997 Hait http www lantimes com testing 97compare pccon 5 638 521 A 6 1997 Buchala et al 5 640302 A 6 1997 Kikinis sol html gt gt downloaded from web on Jun 23 2004 2 pgs 5 659 773 A 8 1997 Huynh et al Williams Dennis Executive Summary Consolidate Now 5 663 661 A 9 1997 Dillon et
16. 81 ple ejqe oue Alepuoses Kjeulud 60S 06 ejosuo eJeudued LOS ejnpoy Jejnduo peuoenv 00S US RE41 092 E Sheet 6 of 8 Jan 26 2010 U S Patent 9 Old qi Aunoes Wim Howa user uoneZien y 3 junoes eeg ebues ssauppy ON WN Nv1 beg eDueJ SSeJppv ON 9 ue BAUQ aIQeAoWSY eDuei sseippy 619 ON WEN E ofuel sseippy v29 Xsig peH Ueuud t09 On WNW si pie Uepuooas BINPOW JaNawor 8L9 c09 U S Patent Jan 26 2010 Sheet 7 of 8 US RE41 092 E 700 701 Power up 703 Security code 706 NO 705 Hopes No Access 707 Wes 709 Block ail data out 716 No 708 710 Access Full YES 714 Privilege access 711 712 Peripheral Access Peripheral Access storage Privilege Read only Privilege Read on 713 e data control 715 721 Hardware takes over 717 Block all 731 c Data 723 data out out to storage 729 device Block 727 data FIG 7 US RE41 092 E Sheet 8 of 8 Jan 26 2010 U S Patent Jejonuo 8 Old BU aul S esayduad auoyd 150 OJU 58902 dS 908 see 9 saBayaud ssaooy ojur MH 85890 puoMsseg OI Aunoes M Wey user G09 Z IOSU LAUG 23 04U09 Ps hunoes SOlg ee M Ulo Use Ieouduag Log einpoy Jeyduo payseny Ojui sa29e S 9 soBayaud sseooy ou MH SSe29y puomssed i Aunoes M WON use J 08 ejoSuo jeJeudued 009 US RE41 092 E 1 DATA SECURITY METHOD AND DEVICE F
17. OR COMPUTER MODULES Matter enclosed in heavy brackets appears in the original patent but forms no part of this reissue specifica tion matter printed in italics indicates the additions made by reissue Notice More than one reissue application has been filed for the reissue of U S Pat No 6 643 777 The reissue appli cations are application Ser No 11 056 604 filed Feb 10 2005 the instant application and Ser No 11 545 056 filed Oct 6 2006 which is a continuation of the instant applica tion BACKGROUND OF THE INVENTION The present invention relates to computing devices More particularly the present invention provides a method and device for securing a personal computer or set top box Merely by way of example the present invention is applied to a modular computing environment for desk top computers but it will be recognized that the invention has a much wider range of applicability It can be applied to other portable or modular computing applications Many desktop or personal computers which are com monly termed PCs have been around and used for over ten years The PCs often come with state of art microprocessors such as the Intel Pentium microprocessor chips They also include a hard or fixed disk drive including memory in the giga byte range Additionally the PCs often include a ran dom access memory integrated circuit device such as a dynamic random access memory device which is com monly termed DRAM
18. Peripheral console 503 includes a variety of elements to interface to the module 501 display 551 and network 553 The console forms around south bridge 571 which couples to bus 563 which couples to bus 561 Bus 561 is in commu nication with network card 555 which is a local area net work for Ethernet for example South bridge also couples through control 569 to peripheral interface controller 567 which also communicates to bus 561 Peripheral interface controller also couples to host interface controller through connection 515 5 6 and bus 513 The peripheral console has a primary removable drive 559 connected to south bridge US RE41 092 E 11 through bus 575 South bridge also couples to secondary hard disk through bus 577 In a specific embodiment the peripheral console also has a serial EEPROM memory device 575 which is coupled to the peripheral interface controller The memory device can store a security identification number or the like The memory device is generally non volatile and can preserve information even when the power is turned off for example The memory generally has at least 16 kilobits of storage cells or more Preferably the memory device is a 16 kilobit device or 64 megabit device or greater depending upon the application The memory can be any product such as a X24320 product made by a company called Xicor but can also be others The memory cell and user identification will be more fully described below i
19. The DRAM devices now provide up to millions of memory cells i e mega bit on a single slice of silicon PCs also include a high resolution display such as cathode ray tubes or CRTs In most cases the CRTs are at least 15 inches or 17 inches or 19 inches in diameter High resolution flat panel displays are also used with PCs Many external or peripheral devices can be used with the PCs Among others these peripheral devices include mass storage devices such as a Zip Drive product sold by Iomega Corporation of Utah Other storage devices include external hard drives tape drives and others Additional devices include communication devices such as a modem which can be used to link the PC to a wide area network of computers such as the Internet Furthermore the PC can include output devices such as a printer and other output means Moreover the PC can include special audio output devices such as speakers the like PCs also have easy to use keyboards mouse input devices and the like The keyboard is generally configured similar to a typewriter format The keyboard also has the length and width for easily inputting information by way of keys to the computer The mouse also has a sufficient size and shape to easily move a cursor on the display from one location to another location Other types of computing devices include portable com puting devices such as laptop computers and the like Although somewhat successful laptop computer
20. address for a networked system Alternatively the location can also be a home location Access privilege can be categorized into many different levels For example the user can access general company information but not information directed to other business units The user can also be limited to access his her private information which is company related Many other types of information can be restricted or accessed depending upon the embodiment Other types of access can be granted depending upon the consoles For example various consoles include among others a console at a user s home e g John Doe s a console in the user s office 329 a console in a co worker s office 331 which the user can access The access from John Doe s home console uses security identification 317 and provides restricted access 305 The user s use of the module 307 can be from a variety of consoles and is accessed using security identification 319 Here access privilege is private which allows the user to access private personal information or private company information that the user has created The user s access from his office relies upon security identi fication 321 which grants access to private information and general company information The co worker s console can also be used with security identification 323 which allows the user to access general company information but not pri vate information of John Doe for example Depending upon the
21. as United States a2 Reissued Patent Chu 0 Patent Number 45 Date of Reissued Patent USO0RE41092E US RE41 092 E Jan 26 2010 54 DATA SECURITY METHOD AND DEVICE FOR COMPUTER MODULES 75 Inventor William W Y Chu Los Altos CA US 73 Assignee ACQIS Technology Inc Mountain View CA US 21 Appl No 11 056 604 22 Filed Feb 10 2005 Related U S Patent Documents Reissue of 64 Patent No 6 643 777 Issued Nov 4 2003 Appl No 09 312 199 Filed May 14 1999 51 Int CI H04L 9 32 2006 01 52 US CLE eon 726 2 726 3 726 4 58 Field of Classification Search 726 2 9 726 16 21 26 30 713 189 192 194 182 183 See application file for complete search history 56 References Cited U S PATENT DOCUMENTS 3 996 585 A 12 1976 Hogan 4 623 964 A 11 1986 Getz et al 4 700 362 A 10 1987 Todd et al 4 769 764 A 9 1988 Levanon 4 799 258 A 1 1989 Davies ees 713 159 4 872 091 A 10 1989 Maniwa et al 4 890 282 A 12 1989 Lambert et al 4 918 572 A 4 1990 Tarver et al 4 939 735 A 7 1990 Fredericks et al 5 056 141 A 10 1991 Dyke 5 086 499 A 2 1992 Mutone 5 278 509 A 1 1994 Haynes et al 5 278 730 A 1 1994 Kikinis 5 293 497 A 3 1994 Free Continued FOREIGN PATENT DOCUMENTS EP 722138 Al 7 1996 JP 6 289953 10 1994 WO WO 92 18924 10 1992 WO WO 94 00097 1 1994 WO WO 95 13640 5 1995 OTHER PUBLICATIONS Bernal Carlos product brochure en
22. as will be described below including a central processing unit CPU IDE controller hard disk drive computer memory and the like The computer module bay i e CMB 40 is an opening or slot in the desktop console The CMB houses the ACM and provides communication to and from the ACM The CMB also provides mechanical pro tection and support to ACM 10 The CMB has a mechanical alignment mechanism for mating a portion of the ACM to the console The CMB further has thermal heat dissipation sinks electrical connection mechanisms and the like Some details of the ACM can be found in co pending U S patent application Ser Nos 09 149 882 and 09 149 548 filed Sep 8 1998 commonly assigned and hereby incorporated by reference for all purposes In a preferred embodiment the present system has a secu rity system which includes a mechanical locking system an electrical locking system and others The mechanical lock ing system includes at least a key 11 The key 11 mates with key hole 13 in a lock which provides a mechanical latch 15 in a closed position The mechanical latch in the closed position mates and interlocks the ACM to the computer module bay The mechanical latch which also has an open position allows the ACM to be removed from the computer module bay Further details of the mechanical locking sys tem are shown in FIG below FIG 2 is a simplified diagram of a computer module 10 according to an embodiment of the presen
23. ation to the security program determining a predetermined security status and control ling different levels of access privilege to said attached computer module 52 A system for secured information transactions the system comprising a console comprising a network communication control ler housed in the console and coupled to an external network a user identification input device coupled to the console the user identification input device being provided for user identification data and an attached computer module coupled to the console the attached computer module comprising a central pro cessing unit a graphics subsystem and a mass storage unit storing a security program and a user identifica tion datum wherein the security program is configured to receive the user identification datum from the input device match the stored user identification data and permit external access to the computer module and wherein the security program is further configured to at least one of activate different levels of password protection and control different levels of access privi lege 53 The system of claim 52 wherein the console further comprises a Read only removable storage medium 54 A system for secured information transactions the system comprising a console comprising a network communication control ler housed in the console and coupled to an external network a user identification input device coupled to the con
24. cally much slower than processors in dedicated desktop computers because of power consumption and heat dissipation concerns As an example it is noted that at the time of drafting of the present application some top of the line desktops include 400 MHz processors whereas top of the line notebook computers include 266 MHz processors Another drawback to the docking station approach is that the typical cost of portable computers with docking stations can approach the cost of having a separate portable computer and a separate desktop computer Further as noted above because different vendors of portable computers have pro prietary docking stations computer users are held captive by their investments and must rely upon the particular computer vendor for future upgrades support and the like To date most portable computers provide data file secu rity through software only A wide variety of removable stor age media are available for a personal computer These removable media do not provide any access security protec tion in hardware Data encryption program often must be used for protection Such program is cumbersome to handle for the user requiring extra cost and time Data encryption is more commonly used for communication over an unpro tected network or the Internet Having a large number of frequently used files managed by encryption software is not US RE41 092 E 3 practical Without software security program any file can be
25. computer operating system application software program files data files and the like In a specific embodiment the computer operating system may be the Windows98 operating system from Microsoft Corporation of Redmond Washington Other operating systems such as WindowsNT MacOS8 Unix and the like are also contem plated in alternative embodiments of the present invention Further some typical application software programs can include Office98 by Microsoft Corporation Corel Perfect Suite by Corel and others Hard disk module 420 includes a hard disk drive The hard disk drive however can also be replaced by removable hard disk drives read write CD ROMs flash memory floppy disk drives and the like A small form factor for example 2 5 is currently contemplated however other form factors such as PC card and the like are also contemplated Mass storage unit 240 may also support other interfaces than IDE In a specific embodiment the present invention provides a file and data protection security system and method for a removable computer module or ACM ACM contains the US RE41 092 E 7 primary hard disk drive HDD where the operating system application programs and data files reside The security sys tem is used to prevent illegal access and copying of any file residing on the HDD inside ACM An ACM is a self contained computing device that can be armed with security software and hardware to protect its owner s private
26. configuration signal and a peripheral bus The present invention has a host interface controller that has lock control 403 to provide security features to the present ACM Furthermore the present invention uses a flash memory that includes codes to provide password protection or other elec tronic security methods The second portion of the attached computer module has the hard drive module 420 Among other elements the hard drive module includes north bridge 421 graphics accelerator 423 graphics memory 425 a power controller 427 an IDE controller 429 and other components Adjacent to and in parallel alignment with the hard drive module is a personal computer interface PCT bus 431 432 A power regulator 435 is disposed near the PCI bus In a specific embodiment north bridge unit 421 often couples to a computer memory to the graphics accelerator 423 to the IDE controller and to the host interface controller via the PCI bus Graphics accelerator 423 typically couples to a graphics memory 423 and other elements IDE control ler 429 generally supports and provides timing signals nec essary for the IDE bus In the present embodiment the IDE controller is embodied as a 643U2 PCI to IDE chip from CMD Technology for example Other types of buses than IDE are contemplated for example EIDE SCSI USB and the like in alternative embodiments of the present invention The hard drive module or mass storage unit 420 typically includes a
27. d manage data going out of ACM and 4 A low level hardware dependent security code to per form security ID matching hardware programming to manage data flow 5 A high level security program to manage user interface program security ID program security level and other functions The hardware and software implementation allow more flexibility in the level of security protection offered to an ACM owner Some examples of security levels are 1 No access Security IDs do not match according to owner s requirement The Host Interface Controller blocks all peripheral data traffic between ACM and peripheral console except for keyboard and mouse 2 Peripheral Read only No files can be written to any peripheral devices All peripheral devices in peripheral console are managed as Read only devices The pri mary hard disk drive in ACM can be accessed freely 3 Limited access Certain peripheral devices are allowed read write access i e modem and other devices are Read only i e removable media devices 4 Full access No restriction and others Upon power up the low level security code is executed to compare security ID between the respective flash memory between ACM and peripheral console Typical security ID can include 1 User ID 2 User password 3 User Access privilege 4 Business ID 5 Business password 6 Equipment ID 7 Equipment access privilege and any other security IDs The user through the security pro
28. d predetermined security status and operating said computer module based upon said security status 20 25 30 45 55 60 65 14 2 The method of claim 1 wherein said predetermined security status disables a network access to the computer module 3 The method of claim 1 wherein said predetermined security status disables a secondary storage of information from said computer module to substantially prevent infor mation to be transferred from a memory of the computer module to said secondary storage 4 The method of claim 1 wherein said security program is provided in a system BIOS 5 The method of claim 1 wherein said step of initiating reads said security identification of said computer module from a flash memory device 6 The method of claim 1 wherein said step of initiating reads said security identification of said console from a flash memory device 7 The method of claim 1 wherein said console is selected from a desktop home computing device an office desktop computing device a mobile computing device a television sot top computing device and a co worker s computing device 8 A system for secured information transactions the sys tem comprising a console comprising a peripheral controller housed in the console a user identification input device coupled to the peripheral controller the user identification input device being provided for user identification data wherein the user identificatio
29. dge by way of the host PCI bus 531 which connects bus 537 to the north bridge The hard disk includes computer codes that implement a security program accord ing to the present invention Details of the security program are provided below The attached computer module also has a flash memory device 505 with a BIOS The flash memory device 505 also has codes for a user password that can be stored in the device The flash memory device generally permits the stor age of such password without a substantial use of power even when disconnected As merely an example the flash memory device has at least 512 kilobits or greater of memory or 1 megabits or greater of memory The flash memory device can store a security identification number or the like The flash memory device is generally non volatile and can preserve information even when the power is turned off for example The flash memory generally has at least 128 kilobits storage cells or more The flash memory can be any product such as a W29C020 product made by a company called Winbond of Taiwan but can also be others The flash memory cell and user identification will be more fully described below in reference to the FIGS A host interface controller 507 communications to the north bridge via bus 535 and host PCI bus The host interface controller also has a data control 511 Host interface controller 507 communi cates to the console using bus 513 which couples to connec tion 515 5 6
30. e implemented using a primary hard disk 611 coupled to a CPU cache combination which includes a main memory The main memory is often a vola tile memory such as dynamic random access memory Data from any one of the external devices can enter the CPU cache combination For example the secondary hard disk memory and I O address range data is transferred 624 to the CPU cache combination The removable drive memory and T O address range data can also transfer 625 to the CPU cache combination The LAN memory and I O address range data can also transfer 626 to the CPU cache combina tion Keyboard data can also transfer 627 to the CPU cache combination To write data from the module into any one of these external elements the data security program interfaces with the data detection and control circuit to determine of such data should be transferred to any one of the external elements As noted the external elements include among others secondary hard disk and removable drive Here the data security program checks the security identification number with other numbers to determine the security access level There are many other ways that the present invention can be implemented These methods are described more fully below FIG 7 is a simplified diagram 700 of a method according to an embodiment of the present invention This diagram is merely an illustration which should not limit the scope of the claims herein One of ordinary skill in the ar
31. ecurity identification of said computer module determining of a predetermined security status based upon a relationship of said console identification and said computer module identification selecting said predetermined security status and operating said computer module based upon said security status 33 The method of claim 32 wherein a user identification input device coupled to the console provides user security identification information to the console 34 A method for operating a module computer into one of a plurality of network systems the method comprising providing an attached computer module the module com prising a connection program an interface controller and a security identification storing security identification data in a security memory device of the computer module coupling the computer module to a computer console through the interface controller the computer console comprising a network communication device having access to a network receiving connection information from the console through the interface controller receiving the security identification through the interface controller transmitting video information to the console from a graphics subsystem of the attached computer module configuring the connection program to adapt to the con nection information 35 The method of claim 34 wherein the attached com puter module further comprises of a micro controller coupled to the inter
32. f the module to access peripheral storage step 711 The access privilege is read only The user can read information on the peripheral storage including hard disks and the like Once the user accesses the storage the method data control step 719 takes over where the hardware prevents the user from accessing other information step 721 In a specific embodiment the method can allow information to be removed from the peripheral storage If the method allows for data to be removed step 723 the method goes through branch 731 to let data out which can occur through the module Alternatively the method goes to block data step 725 via branch 733 Depending upon the embodiment the method returns to the decision block step 723 Alternatively the method traverses branch 714 to a peripheral read only process step 712 The read only process programs data control step 713 Next the hardware takes over step 715 The method blocks all data from being accessed by the user step 717 FIG 8 is a simplified diagram of a system 800 according to an alternative embodiment of the present invention This diagram is merely an example which should not limit the scope of the claims herein One of ordinary skill in the art would recognize many other variations modifications and alternatives The system 800 includes an attached computer module 801 which can be inserted into one of a plurality of console devices to create a plug and play operation F
33. face controller 36 The method of claim 34 wherein the attached com puter module further comprises a hard disk drive containing a security program 37 A method for operating a module computer into one of a plurality of network systems the method comprising providing an attached computer module the module com prising a connection program a graphics subsystem an interface controller and a security memory device stored with the user identification data coupling the computer module to a computer console through the interface controller the computer console comprising a network communication device having access to a network receiving connection information from the console through the interface controller 5 0 15 20 25 40 45 50 18 receiving the user identification data through the interface controller configuring the connection program to adapt to the con nection information and establishing console access to the computer module wherein all network data trans action of the attached computer module passes through the console 38 The method of claim 37 further comprising providing password protection for said computer module from a secu rity program stored on a hard disk drive of the computer module 39 The method of claim 37 further comprising providing password protection for said computer module from codes stored in a flash memory of the computer module 40 The method of claim 37 f
34. files and data ACM docks with a computer bay in a wide variety of peripheral consoles The combined ACM and peripheral console function as a personal computer A computer mod ule interface bus connects ACM and peripheral device In some embodiments all ACM data passes through computer module interface CMI bus to reach any device in the peripheral console i e floppy drive removable media sec ondary hard disk drive modem and others CMI bus data transfer is controlled by a pair of interface controllers on either side of the bus This partitioning of a personal com puter offer a way of protecting against illegal access of data residing within ACM by guarding data transaction through the computer module interface bus In a specific embodiment a secured ACM has an enclo sure that includes the following components 1 ACPU 2 Main memory 3 A primary Hard Disk Drive HDD 4 Operating System application software data files on primary HDD 5 Interface circuitry and connectors to peripheral console 6 Flash memory used for storing security code and ID 7 Data detection and control circuitry to manage data flow to peripheral console 8 Circuit board connecting the above components and others A peripheral console includes some of the following ele ments 1 Input means e g keyboard and mouse 2 Display means e g CRT monitor or integrated LCD display 3 Removable storage media subsystem e g Floppy drive CDROM drive
35. gram can activate differ ent levels of password protection which can be stored in a look up table The company through the security program can control different levels of access privilege of a user a business group or equipment The security code then pro gram the security level allowed by the access privilege deter mined by the security ID matching result For example if an unidentified peripheral console is detected upon power up by the low level security code e g a home unit the access privilege can set to Peripheral Read only With Read only access privilege for all peripheral devices in peripheral console the data detection and control circuitry is pro grammed to monitor all data traffic going to the peripheral console Any memory block transfer to peripheral console will be detected and blocked Under this mode a user can use the computer with free access to the primary HDD in ACM Any files can be read from other storage media in the peripheral console But no files from the primary HDD can be copied to another media The data detection circuitry separately monitors periph eral bus operation type and memory address range being accessed A specific address range for memory accesses and for I O accesses can be programmed for the data detection circuitry to flag a match A data blocking circuitry is trig gered by the detection circuitry when a match occurs and blank out the data that is being sent to the peripheral console For
36. housed in the console and coupled with an interface connector and an attached computer module coupled to the console through the interface connector and comprising a mass storage unit a graphics subsystem a security program and a second interface controller coupled to the first 16 interface controller wherein the computer module fur ther comprises a security memory device stored with security identification data wherein the security memory device comprises a flash memory including a 5 code to provide password protection and wherein all data transferred from the mass storage unit to the con sole passes through the first and second interface con trollers 22 The system of claim 21 wherein the attached computer module further comprises a tamper resistant enclosure 23 The system of claim 21 wherein the attached computer module can be inserted into the console to create a plug and play operation 24 The system of claim 21 wherein the attached computer module further comprises a microcontroller 25 A modular system for secured information transactions the system comprising a computer console comprising a first interface controller housed in the console and coupled to an interface con 20 nector a user identification input device coupled to the console the user identification input device being provided for user identification data and an attached computer module coupled to the console the attached compu
37. ises a connection protocol for providing the connection 13 The method of claim 12 wherein the connection pro tocol is selected from TCP IP or mobile IP US RE41 092 E 15 14 A security protection method for a computer module said method comprising inserting the computer module into a console initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module wherein initiating reads said security identification from a flash memory device determining of a security status based upon a relationship of said console identification and said computer mod ule identification selecting said security status and operating said computer module based upon said security status 15 A system for secured information transactions the system comprising a console comprising a network communication control ler housed in the console a user identification input device coupled to the console the user identification input device being provided for user identification data and an attached computer module coupled to the console the attached computer module comprising a mass storage unit a graphics subsystem an interface controller coupled to the console and a security memory device stored with the user identification data wherein the security memory device comprises a flash memory and wherein all data from the computer module passes thr
38. m gt gt down loaded from web on Jun 22 2004 2 pgs Cubix Multiplexing Video Keyboard amp Mouse with Mul tiple Density Systems 2000 lt lt http 64 173 211 7 support techinfo system density info vkm mux htm gt gt downloaded from web on Jun 22 2004 2 pgs eBay Advertisement for Total IT Group Network Engines http cgi ebay com we eBayIS API dII ViewItem amp item 5706388046 amp sspagename STRK 3AMDBI 3AMEBIAIT amp rd 1 gt gt from web on Jun 25 2004 1 pg Features Chart Feb 1 1997 lt lt http www lanti mes com testing 97feb 702b072a html downloaded from web on Jun 23 2004 3 pgs Internet Telephony Roundup Industrial Computers lt lt http www tmcnet com articles itmag 0499round up htm gt gt downloaded from web on Jun 23 2004 5 pgs Press Release Hiawatha Iowa Mar 1 1997 entitled Crystal Group Products Offer Industrial PCs with Built in Flexibility lt lt http www crystalpc com news pressre leases prodpr asp gt gt downloaded from web on May 14 2004 2 pgs Press Release Kanata Ontario Canada Apr 1998 entitled Enhanced COTS SBC from DY 4 Systems features 166MHz Pentium Processor http www realtime in fo be VPR layout display pr asp pr asp PRID 363 gt gt 2 pgs Product Brochure entitled SVME DM 192 Pentium II Single Board Computer Jun 1999 pp 1 9 Product Brochure entitled System 8000 lt lt ht
39. ment the present invention provides a security system for an attached computer module ACM In an embodiment the ACM inserts into a computer module bay CMB within a peripheral console to form a functional computer A security program reads an identification number in a security memory device to determine a security level of the ACM according to one embodiment In a specific embodiment the present invention provides a system for secured information transactions The system has a console e g computer housing comprising a peripheral controller housed in the console and a security memory device e g flash memory device coupled to the peripheral controller The system also has an attached computer module i e a removable module with memory and microprocessor coupled to the console The attached computer module has a host interface controller housed within the attached com puter module to interface to the security memory device through the peripheral controller In an alternative embodiment the present invention pro vides a security protection method for a computer module The method includes steps or acts of inserting the computer module into a console Once the module has been inserted the method initiates a security program in the module to read a security identification of the console and to read a security identification of the computer module Based upon a rela tionship of the console identification and the computer mod
40. n input device is a finger print reader and an attached computer module coupled to the console the attached computer module comprising a security memory device stored with the user identification data 9 The system of claim 8 wherein the user identification input device is a finger print reader 10 The system of claim 8 4 system for secured informa tion transactions the system comprising a console comprising a peripheral controller housed in the console a user identification input device coupled to the periph eral controller the user identification input device being provided for user identification data wherein the user identification input device is a voice processing device and an attached computer module coupled to the console the attached computer module comprising a security memory device stored with the user identification data 11 A method for operating a module computer into one of a plurality of network systems the method comprising providing a computer module the module comprising a connection program inserting the computer module into a computer console the computer console having access to a network receiving connection information from the computer con sole configuring the connection program to adapt to the con nection information and establish a connection between the computer module and a server coupled to the network 12 The method of claim 11 wherein the connection information compr
41. n reference to the FIGS FIG 6 is a simplified diagram of a security method 600 for a module according to an embodiment of the present invention This diagram is merely an illustration which should not limit the scope of the claims herein One of ordi nary skill in the art would recognize other variations modifications and alternatives The present method shows an example of how the present security method can be implemented The present method uses a combination of software 601 and hardware 603 which is in the computer module A plurality of external devices can be accessed depending upon the embodiment These external devices include a secondary hard drive 618 a removable drive 619 a network e g LAN modem device 621 and others A key board 623 is also shown which can act locally The software 601 includes an operating system 609 appli cation programs 607 and a data security and initialization program 605 Other programs can also exist Additionally some of these programs may not exist Preferably the data security and initialization program exists This data security and initialization program is initiated once the attached com puter module is inserted into the console The program inter face and oversees a variety of hardware features which will be used to control access to the external devices for example Of course the particular configuration of the soft ware will depend upon the application Hardware features can b
42. nection information and establishing the computer module access to the external network the method fur ther comprising providing password protection for said computer module from codes stored in a flash memory device of the computer module 46 The method of claim 45 wherein providing the attached computer module further comprises inserting the computer module into the console to create a plug and play operation and powering on the computer module by the console 47 A method for operating a module computer into one of a plurality of network systems the method comprising providing an attached computer module the module com prising an enclosure a graphics subsystem a connec tion program and a first interface controller coupling the computer module to a computer console the computer console comprising a second interface con troller coupled to the first interface controller upon insertion and the console having access to an external network providing password protection for said computer module from codes stored in a flash memory device of the com puter module receiving connection information from the console through the interface controllers configuring the connection program to adapt to the con nection information and establishing the computer module access to the external network the method fur ther comprising providing password protection for said computer module from a security program of a hard disk dri
43. o show the operation of the present system The block diagram 500 illustrates attached computer module 501 The module 501 has a central processing unit 502 which communicates to a north bridge 541 by way ofa CPU bus 527 The north bridge couples to main memory 523 via memory bus 529 The main memory can be any suitable high speed memory device or devices such as dynamic ran dom access memory DRAM integrated circuits and oth ers The DRAM includes at least 32 Meg or 64 Meg and greater of memory but can also be less depending upon the application Alternatively the main memory can be coupled directly with the CPU in some embodiments The north bridge also couples to a graphics subsystem 515 via bus 542 The graphics subsystem can include a graphics accelerator graphics memory and other devices Graphics subsystem transmits a video signal to an interface connector which couples to a display for example The attached computer module also includes a primary hard disk drive 509 that serves as a main memory unit for programs and the like The hard disk can be any suitable drive that has at least 2 GB and greater As merely an example the hard disk is a Marathon 2250 2 25 GB 2 1 2 inch drive product made by Seagate Corporation of Scotts Valley but can be others The hard disk communicates to the north bridge by way of a hard disk drive controller and bus lines 502 and 531 The hard disk drive controller couples to the north bri
44. or example the console device can be peripheral console 801 or peripheral console 805 Each peripheral console can have similar or different connection characteristics Peripheral console 803 couples to a local area network using Ethernet 817 Peripheral console 805 couples to a DSL line 827 through a DSL modem 825 Other consoles can also be included to use other types of networks such as ADSL Cable Modem wireless Token Ring and the like As shown the attached computer module has elements such as a memory region 807 which stores BIOS information a security code and a security identification number on a flash memory device or the like The memory region couples to a central processing region 809 which can include CPU chipset cache memory graphics and a hard disk drive as well as other features The central processing region couples to a host interface controller which interfaces the attached computer module to one of the peripheral con US RE41 092 E 13 soles Any of the above information can also be included in the attached computer module Each peripheral console also has a variety of elements These elements include a region 813 821 which has a flash memory device with a security identification number a password access information access privileges internet ser vice provider access information as well as other features which were previously noted The peripheral console also has an interface controller 815 823
45. orage unit stored with the user identification data the mass storage unit compris ing a flash memory device including codes to provide password protection wherein all LAN communication of the computer module passes through the console 57 The system of claim 56 wherein the attached computer module can be inserted into the console to create a plug and play operation 58 The system of claim 56 wherein the attached computer module further comprises a tamper resistant enclosure 59 A system for secured information transactions the system comprising a computer console comprising an interface controller housed in the console and a LAN communication con troller a user identification input device coupled to the console the user identification input device being provided for user identification data and an attached computer module coupled to the console through the interface controller the attached computer module comprising a graphics subsystem a CPU mod ule and a mass storage unit wherein all network data transaction of the computer module passes through the console and wherein the mass storage unit comprises a hard disk drive containing a security program to pro vide password protection of said computer module 60 A method for operating an attached computer module the method comprising 10 15 20 22 providing an attached computer module the module com prising a security program a user password a first
46. ough the interface controller to reach any device in the console 16 The system of claim 15 wherein said security memory device is further stored with a security program wherein said security program can at least one of activate different levels of password protection and control different levels of access privilege 17 The system of claim 15 wherein the flash memory device includes codes to provide password protection 18 A system for secured information transactions the system comprising a console comprising a network communication control ler housed in the console a user identification input device coupled to the console the user identification input device being provided for user identification data and an attached computer module coupled to the console the attached computer module comprising a mass storage unit comprising a hard disk drive including a computer code for implementing a security program a graphics subsystem and a security memory device stored with the user identification data 19 The system of claim 18 wherein the security memory device comprises flash memory includes a code to provide password protection 20 The system of claim 18 wherein said security program can at least one of activate different levels of password protection and control different levels of access privilege 21 A modular system for information transactions the system comprising a console comprising a first interface controller
47. s have many limitations These computing devices have expensive display technology In fact these devices often have a smaller flat panel display that has poor viewing characteris tics Additionally these devices also have poor input devices such as smaller keyboards and the like Furthermore these devices have limited common platforms to transfer informa tion to and from these devices and other devices such as PCs 20 25 30 40 45 50 55 60 65 2 Up to now there has been little common ground between these platforms including the PCs and laptops in terms of upgrading ease of use cost performance and the like Many differences between these platforms probably some what intentional has benefited computer manufacturers at the cost of consumers A drawback to having two separate computers is that the user must often purchase both the desk top and laptop to have total computing power where the desktop serves as a regular computer and the laptop serves as a portable computer Purchasing both computers is often costly and runs thousands of dollars The use also wastes a significant amount of time transferring software and data between the two types of computers For example the user must often couple the portable computer to a local area network i e LAN to a serial port with a modem and then manually transfer over files and data between the desk top and the portable computer Alternati
48. sactions the system comprising a computer console comprising a network communication controller housed in the console and an attached computer module coupled to the console the attached computer module comprising a central pro cessing unit a graphics subsystem a security program configured to at least one of activate different levels of password protection and control different levels of access privilege and an interface controller coupled to the console wherein all computer module network data passes through the console 30 35 45 50 60 65 US RE41 092 E 17 31 The system of claim 30 wherein the console further comprises a user identification input device coupled to the console the user identification input device being provided for user identification data wherein the user identification data passes from the console through said interface control ler to the attached computer module 32 A security protection method for a computer module comprising a mass storage unit and a graphics subsystem said method comprising inserting the computer module into a console comprising a network communication controller storing security information data with a security memory device of the computer module by storing codes in a flash memory to provide password protection for said attached computer module initiating a security program in said module to read a security identification of said console and to read a s
49. sole the user identification input device being provided for user identification data and an attached computer module coupled to the console the attached computer module comprising a central pro cessing unit a graphics subsystem an interface con troller coupled to the console and a mass storage unit storing a security program and a user identification data wherein the attached computer module further comprises a flash memory device including codes for password protection wherein the security program receives the user identifica tion data from the input device matches the stored user identification data and permits external data transfer to the computer module through the interface controller 55 The system of claim 54 wherein all peripheral data transaction of the attached computer module passes through said interface controller 56 A system for secured information transactions the system comprising a computer console comprising a first interface controller housed in the console and a LAN communication con troller a user identification input device coupled to the console the user identification input device being provided for user identification data and an attached computer module coupled to the console through the interface controller the attached computer module comprising a second interface controller US RE41 092 E 21 couples to the first interface controller a CPU a graph ics subsystem and a mass st
50. t invention This diagram is merely an illustration and should not limit the scope of the claims herein One of ordinary skill in the art would recognize other variations modifications and alterna tives Some of the reference numerals are similar to the pre vious FIG for easy reading The computer module 10 includes key 11 which is insertable into keyhole 13 of the lock The lock has at least two position including a latched or closed position and an unlatched or open position The latched position secures the ACM to the computer module bay The unlatched or open position allows the ACM to be inserted into or removed from the computer bay module As shown the ACM also has a slot or opening 14 which allows the latch to move into and out of the ACM The ACM also has openings 17 in the backside for an electrical and or mechanical connection to the computer module bay which is connected to the console FIG 3 is a simplified top view diagram 10 of a computer module for computer system according to an embodiment of the present invention This diagram is merely an illustration and should not limit the scope of the claims herein One of ordinary skill in the art would recognize other variations modifications and alternatives The layout diagram illus trates the top view of the module 10 where the backside components e g Host Interface Controller are depicted in dashed lines The layout diagram has a first portion which includes a central
51. t would recog an 0 35 40 45 50 65 12 nize other variations modifications and alternatives The present method begins at power up which is step 701 The present method reads a security code which has been entered by a user for example in step 703 The security code can be a string of characters including numbers and letters The security code is preferably a mixture of numbers and letters which are at least about 6 characters in length but is not limited The present method reads step 703 the security code which has been entered Next the security code is compared with a stored code which is in flash memory or the like step 705 If the compared code matches with the stored code the method resumes to step 708 Alternatively the method goes to step 707 via branch 706 where no access is granted When no access is granted all data are blocked out from the user that attempts to log onto the system Alternatively the method determines if a certain level of access is granted step 708 Depending upon the embodiment the present method can grant full access step 710 via branch 716 The present method allows full access based upon information stored in the flash memory device Alternatively the method can allow the user to access a limited amount of information Here the present method allows for at least one or more than two levels of access In a specific embodiment the present method allows for the user o
52. ter module comprising a security pro gram providing password protection a mass storage unit comprising a flash memory device a graphics subsystem and a second interface controller coupled to the first interface controller wherein the user identifi cation data passes to the computer module through first and second interface controllers 26 The system of claim 25 wherein the attached computer module further comprises a central processing unit and a graphics subsystem 27 A system for secured information transactions the system comprising a computer console comprising a network communication controller housed in the console a user identification input device coupled to the console the user identification input device being provided for user identification data and an attached computer module coupled to the console the attached computer module comprising a central pro cessing unit a graphics subsystem an interface con troller coupled to the console and a security memory device stored with the user identification data wherein the security memory device comprises a flash memory including codes to provide password protection 28 The system of claim 27 wherein said attached com puter module inserts into a bay of the console to form a functional computer 29 The system of claim 27 wherein the attached computer module can be inserted into the console to create a plug ss and play operation 30 A system for information tran
53. the security system to be effective a temper tamper resistant enclosure must be used to prevent removal of the hard disk drive and the flash memory inside ACM Further details are shown throughout the present specification and more particularly below US RE41 092 E 9 FIG 4 is a simplified illustration of security systems 300 according to embodiments of the present invention This illustration is merely an example which should not limit the scope of the claims herein One of ordinary skill in the art would recognize other variations modifications and alterna tives The systems show various examples of ways to imple ment the present invention Here a user relies upon certain consoles to access information A company s shared por table console 325 can access general company information 303 Selected security identification information 315 is entered into the shared console to access the information via a network The information generally includes owner owner password business business password console type location and access privilege information which is dis played on a user display The owner is generally the user name Owner password is the user password The business is the business unit name and business password is the business unit password The console type can be portable for laptops notebooks and the like Alternatively the console type can be a desktop The location generally specifies the desktop location or
54. titled PowerSMP Series 4000 Mar 1998 http www winnetmag com Windows Article ArticleID 3095 3095 html downloaded from web on Jun 22 2004 2 pgs Cragle Jonathan Density System 1100 May 1999 lt lt http www winnetmag com Windows Article ArticleID 5199 5199 html gt gt downloaded from web on Jun 21 2004 4 pgs Feldman Jonathan Rack Steady The Four Rack Mounted Servers That Rocked Our Network http www net workcomputing com shared printA rticle jhtml article2 910 910r3side htm gt gt Jun 23 2004 3 pgs Fetters Dave Cubix High Density Server Leads the Way With Standout Managemant Software Feb 8 1999 http www nwc com shared printArticle jhtml article2 1003 1003r3 full html amp pub nwe gt gt downloaded from web on Jun 23 2004 5 pgs Continued Primary Examiner Hosuk Song 74 Attorney Agent or Firm Cooley Godward Kronish LLP 57 ABSTRACT A security method for an attached computer module in a computer system The security method reads a security iden tification number in an attached computer module and com pares it to a security identification number in a console which houses the attached computer module Based upon a relationship between these numbers a security status is selected The security status determines the security level of operating the computer system 57 Claims 8 Drawing Sheets US RE41 092 E Page 2 U S PATENT DOCUMENTS 6 39
55. tp www bomara com Eversys briefDefault htm gt gt downloaded from web on Jun 22 2004 4 pgs Product Brochure entitled ERS FT II System 2000 lt lt http 64 173 211 7 support techinfo system ersft2 ersft2 htm gt gt downloaded from web on Jun 22 2004 4 pgs Product Brochure entitled ERS II and ERS FT IT Chap 3 System Components lt lt http 64 173 211 7 support tech ninfo manuals ers2 ers2 c3 htm downloaded from web on Jun 22 2004 21 pgs Windows Magazine Cubix PowerSMP Series 4000 Nov 1997 lt http lt www techweb com winmag library 1997 1101 ntent008 htm gt gt downloaded from the web on Jun 22 2004 pg NTO7 MPL The First Rugged All in One Industrial 486FDX 133 MHz PC IPM486 IPMS User Manual 1998 pp 1 24 Eversys Corp Eversys System 8000 Consolidated Network Server Market and Product Overview Slide Presentation downloaded from lt lt http eversys com gt gt 20 pages total SQL Server and NT Cluster Manager Availability Demo Microsoft Server Programmer Developers Conference Nov 1996 15 pages total Microsoft Cluster Service Center MSCS Basics down loaded from lt lt http www nwnetworks com mscsbasics htm gt gt Feb 7 2005 6 pages total Agerwala T SP2 System Architecture IBM Systems Journal vol 34 No 2 pp 152 184 1995 cited by examiner downloaded U S Patent Jan 26 2010 Sheet 1 of 8 US RE41 092 E
56. ule com prising a connection program and an interface control ler inserting the computer module into a computer console to form a functional computer to create a plug and play operation the computer console comprising a second interface controller coupled to the first interface con troller upon insertion and the console having access to an external network receiving connection information from the console through the interface controller configuring the connection program to adapt to the con nection information and establishing the computer module connection to the external network through said interface controllers the method further comprising providing password protection for said computer mod ule from a security program on a hard disk drive of the computer module 45 A method for operating a module computer into one of a plurality of network systems the method comprising providing an attached computer module the module com prising an enclosure a graphics subsystem a connec tion program and a first interface controller US RE41 092 E 19 coupling the computer module to a computer console the computer console comprising a second interface con troller coupled to the first interface controller upon insertion and the console having access to an external network 5 receiving connection information from the console through the interface controllers configuring the connection program to adapt to the con
57. urther comprising providing to the network with security credit card information stored in the attached computer module 41 A method for operating a module computer into one of a plurality of network systems the method comprising providing an attached computer module the module com prising a connection program and an interface control ler storing security information in a flash memory device of the computer module inserting the computer module into a computer console to form a functional computer to create a plug and play operation the computer console comprising a second interface controller coupled to the first interface con troller upon insertion and the console having access to an external network receiving connection information from the console through the interface controller configuring the connection program to adapt to the con nection information and establishing the computer module connection to the external network through said interface controllers 42 The method of claim 41 further comprising providing password protection to the computer module from codes stored in a flash memory device of the computer module 43 The method of claim 41 further comprising providing to the network with security credit card information from the computer module 44 A method for operating a module computer into one of a plurality of network systems the method comprising providing an attached computer module the mod
58. ve of said computer module 48 The method of claim 45 further comprising providing with security the external network credit card information of the attached computer module 49 A method for operating a modular computer into a network the method comprising 10 20 25 30 35 40 sai ds 45 providing a computer module the module comprising a central processing unit a graphics subsystem and a connection program inserting the computer module into a computer console to create a plug and play operation the computer con sole comprising a network communication controller having access to an external network receiving connection information from the computer con sole configuring the connection program to adapt to the con nection information and establishing a connection between the computer module and a server coupled to the network in the plug and play operation the method further comprising providing password protection for said computer module from codes stored in a flash memory device of the computer module 50 The method of claim 49 wherein the computer module further comprising managing a user interface with a high level security pro gram and accessing data content of the computer module utilizing a program security ID 55 65 20 51 The method of claim 49 wherein the computer module further comprises security identification the method further comprising providing the security identific
59. vely the user often must use floppy disks to zip up files and programs that exceed the storage capacity of conventional floppy disks and transfer the floppy disk data manually Another drawback with the current model of separate por table and desktop computer is that the user has to spend money to buy components and peripherals that are dupli cated in at least one of these computers For example both the desktop and portable computers typically include hard disk drives floppy drives CD ROMs computer memory host processors graphics accelerators and the like Because program software and supporting programs generally must be installed upon both hard drives in order for the user to operate programs on the road and in the office hard disk space is often wasted One approach to reduce some of these drawbacks has been the use of a docking station with a portable computer Here the user has the portable computer for on the road use and a docking station that houses the portable computer for office use The docking station typically includes a sepa rate monitor keyboard mouse and the like and is generally incompatible with other desktop PCs The docking station is also generally not compatible with portable computers of other vendors Another drawback to this approach is that the portable computer typically has lower performance and functionality than a conventional desktop PC For example the processor of the portable is typi
60. which couples region 813 821 respectively to a networking device 817 825 The networking device can be an Ethernet card 817 which allows communication to the local area network 819 Alternatively the networking device can be a DSL modem 825 which allows communication to a DSL or ADSL phone line Other types of networking device can also be used depending upon the application Each console provides a selected connection based upon set of predefined factors These factors include communica tion hardware information so that software in attached com puter module can read and allow a connection to a network Here access information can be provided to the user Infor mation about connection information will also be included This connection information includes telephone numbers account numbers passwords local or a company pass word The console and module combination will take care of charges etc based upon time bases Module will have credit card information but will have security In a specific embodiment the module inserts into the console The mod ule then asks the console which hardware will be used If the hardware is an Ethernet connect the module configures con nection information to access the Ethernet connection Alternatively if the hardware requires a DSL connection the module configures connection information to access the DSL connection Other configuration information such as company server information password

Download Pdf Manuals

image

Related Search

Related Contents

Mach Speed Technologies T4 User's Manual    NiTek Q4 Computer  公表資料2 住宅履歴情報の蓄積・活用の指針(解説付)  La sécurité alimentaire implicite : Les femmes hors  ESI-1553RPT - Excalibur Systems, Inc.  N8104-153 10GBASE-T接続ボード(2ch) スタートアップ  Ethernet Control System IPX  BDA-M400 Funk -EN- (Rev-02) 01-10-2009  GE ERESCO MF4 Brochure  

Copyright © All rights reserved.
Failed to retrieve file