Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
1998-10-05
2002-04-23
Hayes, Gail (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C710S104000, C710S302000, C710S304000, C713S300000, C713S310000, C713S323000, C713S340000
Reexamination Certificate
active
06378074
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of Invention
This invention is related to computer systems and in particular maintaining integrity and security of computer networks and data stored on a computer.
2. Description of Related Art
Computers connected to more than one network provide a way for hackers to gain access to other networks connected to the computer and to the data stored in the computer. The hacker generally enters through a lower security network and gains access to a higher security network. A hacker can also gain access to a computer through the Internet. This can allow the hacker to erase or copy stored data.
In U.S. Pat. No. 5,778,174 (Cain) a system is disclosed for providing a secured access to a server connected to a private computer network protected by a router acting as a firewall. The system isolates a public and private network from one another. In U.S. Pat. No. 5,623,601 (Vu) an apparatus and method for providing a secure firewall between a private and public network is discussed. The method produces a transparent firewall with application level security and data screening capability. In U.S. Pat. No. 5,550,984 (Gelb) a security system is disclosed in which two mother boards with network adapters are used to communicate with separate networks. The two mother boards communicate with each other through a transfer adapter and network interface adapter.
In U.S. Pat. No. 5,542,044 (Pope) a computer security device is disclosed having a main and auxiliary storage device. A method for isolating the main and auxiliary storage is described, and the main storage area can be partitioned between a safe storage area and a working area. In U.S. Pat. No. 5,483,649 (Kuznetsov et al) a computer security system is provided by controlling access to the hard disk controller only through a path using the computers operating system, a modular device driver and the basic input/output system. In U.S. Pat. No. 4,685,056 (Barnsdale et al.) a computer security system is discussed in which a buss is monitored for unauthorized commands or data. Upon detection of unauthorized commands or data, DC power can be disrupted to selected computing devices which are wanted to be protected.
It is usually not practical to isolate all important data resources stored on hard disks in a computer system from outside influences all the time. However, it is practical to make available only those data resources that are needed when connecting to external networks and phone lines, and including connecting only to those networks and Internet providers that are required during a particular computing session. In the process of making some data resources available, the data resources not made available needs to be protected in such away that the active data and networks can not gain access in any way.
SUMMARY OF THE INVENTION
The objective of this invention is to keep data on hard disks and computer network connections not accessible when not being used. In this invention a computer is operated in two or more modes. Data stored in the computer in one mode is not accessible when the computer is operated in another mode. Similarly a computer network connected in one mode is not accessible in another mode. To accomplish this a computing system is connected to an isolation unit which controls selection of the hard disk drives in the system and controls the connection to external communication lines such as networks and phone lines. The isolation unit contains a control unit in which different computing modes are programmed. Each computing mode selects one or more disk drives by connecting power to the selected drives, and connecting the selected drives to the disk drive interface through the associated buss interface unit (BIU). The BIU associated with the unselected disk drives disconnects the disk drives from the disk drive interface to prevent the unselected disk drives from loading and interfering with signals on the disk drive interface. The connection of external communication lines, including networks and telephone lines, is also controlled by the various modes programmed into the isolation unit. Only those data resources (hard disks, networks and telephone lines) needed for a particular computing mode are powered on and connected to the computing system.
The isolation unit detects when the computer system is powered on or off. When the computer is powered on a computing mode cannot be changed in the isolation unit. The power to the computer must first be turned off and then a new computing mode can be selected. This prevents residual data in main memory, for instance, from being carried over to the new computing mode and the attendant data. Each computing mode powers on at least one hard disk drive and may be connected to one or more external communication lines.
REFERENCES:
patent: 4685056 (1987-08-01), Barnsdale, Jr. et al.
patent: 4941086 (1990-07-01), Kriz
patent: 5434562 (1995-07-01), Reardon
patent: 5483649 (1996-01-01), Kuznetsov et al.
patent: 5504909 (1996-04-01), Webster et al.
patent: 5542044 (1996-07-01), Pope
patent: 5550984 (1996-08-01), Gelb
patent: 5623601 (1997-04-01), Vu
patent: 5778174 (1998-07-01), Cain
patent: 6128682 (2000-10-01), Humpherys et al.
patent: 6138181 (2000-10-01), Aida et al.
patent: 6304976 (2001-10-01), Kim
patent: 0689 690 (1996-03-01), None
patent: WO 00/20949 (2000-04-01), None
International Publication No. WO98/25372, Date Jun. 11, 1998.
International Application # PCT/IL97/00380, Date Nov. 20, 1997.
Ackerman Stephen B.
Hayes Gail
Jackson Jenise
Saile George O.
Sentry Technologies Pte Ltd
LandOfFree
Method for security partitioning of a computer system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for security partitioning of a computer system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for security partitioning of a computer system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2856102