Security control for personal computer

Communications: electrical – Selective – Intelligence comparison for controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C711S164000, C340S005740

Reexamination Certificate

active

06480097

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to personal computer systems and, more particularly, to a personal computer having security features enabling control over access to data retained in the computer.
2. Description of the Related Art
The rapid development and adaptation of new technology in the computer industry has enabled personal computers and peripherals to become ever more powerful and sophisticated. However, the torrid pace of technological innovation has rendered many otherwise operable personal computers obsolete due to outdated system software. Particularly, if the system resident code (or firmware) is outdated, an IBM compatible computer may not be able to support features available with the latest peripherals.
Developed since the earliest generation of personal computers, the firmware residing in read only memory (ROM) provides an operational interface between a user's application program/operating system and the device to relieve the user of the concern about specific characteristics of hardware devices. This insulation layer of code eventually evolved into a Basic Input/Output System (BIOS) code which allowed new devices to be added to the system while isolating the application program from the peculiarities of the hardware. Since the BIOS is an integral part of the system and controls the movement of data in and out of the system processor, it resides on the system ROM. As new models of the personal computer family are introduced, the BIOS had to be updated and expanded to include new hardware and I/O devices.
Since the technology is rapidly changing and new I/O devices are being added to the personal computer systems, modification to the BIOS and other system software is desirable to keep existing personal computers up to date to support the latest peripherals while maintaining compatibility with existing peripherals. The availability of flash ROMs has made possible the ability to update the contents of the ROM without ever physically removing the ROM. However, since the BIOS is an integral part of the operating system, a corrupt BIOS could lead to devastating results and in many cases to complete failure and non-operation of the system.
The user's awareness of accidental or intentional misuse or otherwise unauthorized modifications to the computer's system software has been made more acute following the publicity on the adverse consequences of computer security breaches. Thus, security conscious users are requesting that security and integrity features be incorporated into their personal computers to protect the flash ROM and to prevent unintentional or malicious erasure of the flash ROM contents.
In previous systems, a switch was used to control the updating of the flash ROM. However, the switch method was burdensome and inflexible. A password approach is desirable due to lower cost of eliminating a switch, increased flexibility because passwords can be easily changed, and enhanced user convenience while still providing the necessary level of security. But at the same time, the password approach must be sufficiently secure so that the password cannot be obtained during the process. Thus, a security device is needed that can verify a password provided by the user instead of requiring the user to throw a switch to update the flash ROM and to perform such verification in a secure manner.
SUMMARY OF THE INVENTION
A computer according to the present invention provides security by having the system ROM provide a password at power-on to a security device which controls access to the secured features. Once a password has been downloaded to the security device, a Protect Resources command is issued to the security device which controls access to the protected resources such as the flash ROM. To access the secured resource, the user provides the correct password to the security device. The security device can only verify and not divulge the password, so security of the system is enhanced.
These and other features of the present invention will be understood upon reading of the following description along with the drawings.


REFERENCES:
patent: 3890601 (1975-06-01), Pietrolewicz
patent: 4891838 (1990-01-01), Faber
patent: 4942606 (1990-07-01), Kaiser et al.
patent: 4959860 (1990-09-01), Watters et al.
patent: 5060263 (1991-10-01), Bosen et al.
patent: 5173940 (1992-12-01), Lantz et al.
patent: 5212729 (1993-05-01), Schafer
patent: 5265163 (1993-11-01), Golding et al.
patent: 5313639 (1994-05-01), Chao
patent: 5355414 (1994-10-01), Hale et al.
patent: 5375243 (1994-12-01), Parzych et al.
patent: 5377343 (1994-12-01), Yaezawa
patent: 5388156 (1995-02-01), Balckledge, Jr. et al.
patent: 5451934 (1995-09-01), Dawson et al.
patent: 5475762 (1995-12-01), Morisawa et al.
patent: 5533125 (1996-07-01), Bensimon et al.
patent: 5537544 (1996-07-01), Morisawa et al.
patent: 2 154 344 (1985-09-01), None
Compaq DeskPro/M Reference Guide, Compaq Computer Corporation, pp. 5-1 through 5-13.
Fastlock User's Manual, Version 1.0, Rupp Corp., New York, New York, pp. 1-8.
Disklock Advertisement, PC Magazine, vol. 10, No. 11, Jun. 11, 1991, p. 139.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security control for personal computer does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security control for personal computer, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security control for personal computer will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2922873

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.