Method and system for embedded, automated, component-level...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S169000, C713S152000, C713S152000, C380S255000

Reexamination Certificate

active

06249868

ABSTRACT:

TECHNICAL FIELD
The present invention relates to control of computer systems and other types of complex systems at the component level and, in particular, to a method and system for securing a complex system by embedding agents within one or more components of the complex system in order to control access to components within the complex system.
BACKGROUND OF THE INVENTION
Computer security is a very broad and complex field within which, during the past several decades, a number of important sub-fields have developed and matured. These sub-fields address the many different problem areas in computer security, employing specialized techniques that are particular to specific problems as well as general techniques that are applicable in solving a wide range of problems. The present application concerns a technique that can be used to prevent the theft and subsequent use of a personal computer (“PC”) or of various PC components included in, or attached to, a PC. This technique may make use of certain security-related techniques which have been employed previously to address other aspects of computer security, and this technique may itself be employed to address both computer security problems other than theft as well as various aspects of computer reliability, computer administration, and computer configuration. In addition, this technique may be applied to protecting other types of complex electronic and mechanical systems as well as computer software and other types of information encoded on various types of media.
PCs are ubiquitous in homes, offices, retail stores, and manufacturing facilities. Once a curiosity possessed only by a few hobbyists and devotees, the PC is now an essential appliance for business, science, professional, and home use. As the volume of PCs purchased and used has increased, and as PC technology has rapidly improved, the cost of PCs has steadily decreased. However, a PC is still a relatively expensive appliance, especially when the cost of the software installed on the PC and the various peripheral devices attached to the PC are considered. PCs, laptop PCs, and even relatively larger server computers have all, therefore, become attractive targets for theft.
FIG. 1
illustrates various types of security systems commonly employed to prevent theft of PCs and PC components. A PC
102
is mounted on a table
104
and is connected to a keyboard-input device
106
and a display monitor
108
. The PC
102
is physically secured to the table
104
with a hinged fastening device
110
, which can be opened and locked by inserting a key
112
into a lock
114
. The display monitor
108
is physically attached to the table via a cable
116
and cylindrical combination lock
118
system. Serial numbers
120
or
122
are attached to, or imprinted on, the side of the PC
102
and the side of the display monitor
108
, respectively. Finally, there is a software-implemented lock and key system for controlling access to the operating system and hence to the various application programs available on the PC
102
. Typically, a graphical password-entry window
124
is displayed on the screen
126
of the display monitor
108
. In order to use the computer, the user types a password via the keyboard
106
into the password sub-window
128
of the password-entry window
124
. The user then depresses a keyboard key to indicate to a security program that password entry is complete. As the user types the password, each letter of the password appears at the position of a blinking cursor
130
. The characters of the password are either displayed explicitly, or, more commonly, asterisks or some other punctuation symbol are displayed to indicate the position within the password in which a character is entered so that an observer cannot read the password as it is entered by the user. The security program checks an entered password against a list of authorized passwords and allows further access to the operating system only when the entered password appears in the list. In many systems, both a character string identifying the user and a password must be entered by the user in order to gain access to the operating system.
The common types of security systems displayed in
FIG. 1
are relatively inexpensive and are relatively easily implemented and installed. They are not, however, foolproof and, in many cases, may not provide even adequate deterrents to a determined thief. For example, the key
112
for the hinged fastening device
110
can be stolen, or the fastening device can be pried loose with a crowbar or other mechanical tool. A clever thief can potentially duplicate the key
112
or jimmy the lock
114
. The cable
116
can be cut with bolt cutters or the cylindrical combination lock
118
can be smashed with a hammer. Often, the combination for the cylindrical combination lock
118
is written down and stored in a file or wallet. If that combination is discovered by a thief or accomplice to theft, the cylindrical combination lock will be useless. In the situation illustrated in
FIG. 1
, if the table is not bolted to the floor, a thief might only need to pick up the display monitor
108
, place it on the floor, slide the cable down the table leg to the floor, and lift the table sufficiently to slip the cable free. While this example might, at first glance, seem silly or contrived, it is quite often the case that physical security devices may themselves be more secure than the systems in which they are installed, taken as a whole. This commonly arises when security devices are installed to counter certain obvious threats but when less obvious and unexpected threats are ignored or not considered.
While the serial numbers
120
and
122
, if not scraped off or altered by a thief, may serve to identify a PC or components of the PC that are stolen and later found, or may serve as notice to an honest purchaser of second-hand equipment that the second-hand equipment was obtained by illegal means, they are not an overpowering deterrent to a thief who intends to use a purloined PC or PC component at home or to sell the purloined PC to unsavory third parties.
Password protection is commonly used to prevent malicious or unauthorized users from gaining access to the operating system of a PC and thus gaining the ability to examine confidential materials, to steal or corrupt data, or to transfer programs or data to a disk or to another computer from which the programs and data can be misappropriated. Passwords have a number of well-known deficiencies. Often, users employ easily remembered passwords, such as their names, their children's names, or the names of fictional characters from books. Although not a trivial undertaking, a determined hacker can often discover such passwords by repetitive trial and error methods. As with the combination for the cylindrical combination lock
118
, passwords are often written down by users or revealed in conversation. Even if the operating system of the PC is inaccessible to a thief who steals the PC, that thief may relatively easily interrupt the boot process, reformat the hard drive, and reinstall the operating system in order to use the stolen computer.
More elaborate security systems have been developed or proposed to protect various types of electrical and mechanical equipment and to protect even living creatures. For example, one can have installed in a car an electronic device that can be remotely activated by telephone to send out a homing signal to mobile police receivers. As another example, late model Ford and Mercury cars are equipped with a special electronic ignition lock, which is activated by a tiny transmitter, located within a key. As still another example, small, integrated-circuit identification tags can now be injected into pets and research animals as a sort of internal serial number. A unique identification number is transmitted by these devices to a reading device that can be passed over the surface of the pet or research animal to detect the unique identification number. A large variety of different data encryption technique

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for embedded, automated, component-level... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for embedded, automated, component-level..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for embedded, automated, component-level... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2501790

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.