Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-08-29
2000-02-29
Beausoliel, Jr., Robert W.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
380 23, G06F 1300, H04L 900
Patent
active
060322578
ABSTRACT:
A method of theft protection for computers and computer related hardware. Warranty fraud, theft of proprietary technology, and hardware theft are minimized by encoding the hardware components such that a digitally authenticated handshake must be performed between the system and the component at power-up. If the handshake is successful, normal operation continues with all enhancements. If the handshake is unsuccessful, the device is disabled or shifted into a lower performance mode.
REFERENCES:
patent: 4465901 (1984-08-01), Best
patent: 4982371 (1991-01-01), Bolan et al.
patent: 5010331 (1991-04-01), Dias et al.
patent: 5058161 (1991-10-01), Weiss
patent: 5120939 (1992-06-01), Claus et al.
patent: 5226137 (1993-07-01), Bolan et al.
patent: 5249230 (1993-09-01), Mihm, Jr.
patent: 5267311 (1993-11-01), Bakhoum
patent: 5353350 (1994-10-01), Unsworth et al.
patent: 5367148 (1994-11-01), Storch et al.
patent: 5375243 (1994-12-01), Parzych et al.
patent: 5402490 (1995-03-01), Mihm, Jr.
patent: 5481611 (1996-01-01), Owens et al.
patent: 5506991 (1996-04-01), Curry et al.
patent: 5517015 (1996-05-01), Curry et al.
patent: 5530431 (1996-06-01), Wingard
patent: 5537540 (1996-07-01), Miller et al.
patent: 5546463 (1996-08-01), Caputo et al.
patent: 5587955 (1996-12-01), Lee et al.
patent: 5594793 (1997-01-01), Bahout
patent: 5619066 (1997-04-01), Curry et al.
patent: 5646998 (1997-07-01), Stambler
patent: 5671285 (1997-09-01), Newman
patent: 5677952 (1997-10-01), Blakley, III et al.
patent: 5696824 (1997-12-01), Walsh
patent: 5696827 (1997-12-01), Brands
patent: 5715174 (1998-02-01), Cotichini et al.
patent: 5774545 (1998-06-01), Raghavachari
patent: 5825877 (1998-10-01), Dan et al.
patent: 5832214 (1998-11-01), Kikinis
patent: 5832228 (1998-11-01), Holden et al.
patent: 5838251 (1998-11-01), Brinkmeyer et al.
patent: 5838793 (1998-11-01), Lewis
Jonathan Lambeth, IBM hands users a security lifeline. (put serial numbers on all memory products and processors) (company business and marketing), Computer Weekly, p1 (1), Feb. 1996.
Christian Damsgaard Jensen et al., Protection reconfiguration for reusable software, 1998 Proced. of the second Euromicro conference on, pp. 74-80, Jun. 1998.
Andrew Hiles, Surviving a computer disaster, Computing and control Engineering Journal, vol. 33, pp. 133-135, May 1992.
U.S.Patent Application of Michael F. Angelo, "A Method For Controlling Access to A Computer System By Utilizing An External Device Containing A Hash Value Representation of a user Password", SN 08/777,621 filed Dec. 31, 1996, Docket P-1155.
Brown, Bruce "Stop, Thief!" Computer Shopper, May 1997, p. 232 & 233.
U.S.Patent Application SN 08/396,343, "Security Control For a Personal Computer", filed Mar. 3, 1995.
U.S. Application SN 08/632,892, "Secure Power Supply", filed Apr. 16, 1996, P-973.
U.S.Application SN 08/657,982, "Method and Apparatus for Providing Secure and Private Keyboard Communciations in Computer Systems", filed May 29, 1996, P-1016.
Angelo Michael F.
Jansen Kenneth A.
Olarig Sompong P.
Beausoliel, Jr. Robert W.
Compaq Computer Corporation
Groover Robert
Iqbal Nadeem
LandOfFree
Hardware theft-protection architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Hardware theft-protection architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hardware theft-protection architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-693125