Method and structure for securing access to a computer system

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 4, G06F 1214

Patent

active

054758394

ABSTRACT:
Tests are performed prior to or during the boot operation to determine whether files are corrupted. This may indicate the presence of a virus. If a potential error is detected, boot is halted, allowing the user to boot from uncorrupted files. In another embodiment, an uniquely formatted floppy diskette is used as an access diskette serves as a hardware key to gain access. In another embodiment, a host controls information stored locally. In another embodiment, security from unauthorized access is provided once a valid user has legitimately accessed a computer. In response to a predefined hot key or a predetermined period of time during which the user has not provided input, portions of the computer are disabled. Upon entry of access information by the valid user, the disabled features are enabled. In another embodiment, access to the computer is made more difficult in response to invalid access attempts. In one embodiment, once a threshold number of invalid access attempts is reached, the computer is locked up, requiring reboot, thereby increasing the difficulty of a would be intruder to gain access to the computer. In one embodiment, once the threshold value is reached, it is reset to a lower value.

REFERENCES:
patent: 3890601 (1975-06-01), Pietrolewicz
patent: 4609777 (1986-09-01), Cargile
patent: 4677284 (1987-06-01), Genest
patent: 4734856 (1988-03-01), Davis
patent: 4785361 (1988-11-01), Brotby
patent: 4786900 (1988-11-01), Karasawa et al.
patent: 4816654 (1989-03-01), Anderi
patent: 4866769 (1989-09-01), Karp
patent: 4879645 (1989-11-01), Tamada et al.
patent: 4937864 (1990-06-01), Caseiras et al.
patent: 4951249 (1990-08-01), McClung et al.
patent: 5018096 (1991-05-01), Aoyama
patent: 5022077 (1991-06-01), Bealkowski
patent: 5113499 (1992-05-01), Ankney et al.
patent: 5121345 (1992-06-01), Lentz
patent: 5144659 (1993-02-01), Jones
patent: 5191611 (1993-03-01), Lang
patent: 5206905 (1993-04-01), Lee et al.
"Security", Wayne Rash, Jr., BYTE, Jun. 1989, p. 254.
"How Safe Is It?", Martin Kochanski, BYTE, Jun. 1989, p. 257.
"Secret Codes" Asael Dror, BYTE, Jun. 1989, p. 267.
Know Thy Viral Enemy, BYTE, Jun. 1989, p. 275.
Personal and Private, Peter Stephenson, BYTE, Jun. 1989, p. 285.
The Safety Zone, BYTE, Jun. 1989, p. 290.
Memorized Passwords, Robert J. Bosen, Multi-User, Nov. 1985, pp. 28-42.
Security-Microcomputer Encryption and Access Control Products, PC Communications Dec. 1986, pp. 15-17.
Advisory Memorandum on Office Automation Security Guideline, NTISSAM COMPUSEC/1-87 Jan. 16, 1987.
NSCS-TG-005, Library No. S228,526, Version 1, "Trusted Network Interpretation"
NSCS-TG-004-88, Library No. S-231,238, "Glossary of Computer Security Terms".
Recovering from a Computer Virus Attach, F. Davis et al., The Journal of Systems and Software 7, pp. 253-258 (1987).
IBM Tech. Disc. Bull., vol. 32, No. 3A, "Hardware Monitor Security Feature" pp. 284-285, Aug. 1989.
IBM Tech. Disc. Bull., vol. 31, No. 9, "Discouraging Penetration Attempts on Interactive Computer Systems without Denial-of-Service" pp. 147-149, Feb. 1989.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and structure for securing access to a computer system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and structure for securing access to a computer system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and structure for securing access to a computer system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1368366

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.