Security system for a computerized apparatus

Electrical computers and digital processing systems: support – Digital data processing system initialization or configuration – Loading initialization program

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

06275933

ABSTRACT:

BACKGROUND OF THE INVENTION
1. The Field of the Invention
The present invention relates to systems to prevent unauthorized access to computer systems and is more particularly related to a physical key system that is used to gain access to a computerized apparatus.
2. Present State of the Art
There is an increasing dependency upon computers to assist in daily affairs of both businesses and individuals. This dependency creates within computerized systems a vast array of public and private data storage. The storage of private data of a sensitive nature necessitates a focused effort within security systems to prevent unauthorized access to computers so as to prevent any invasion of the privacy of the data therein. In addition to the protection of the privacy of data in stored in a computer system, there is also a need to prevent access to general purpose computers as well as computerized machines such as cellular phones, personal digital assistants, pagers, televisions, and automobiles. When a security system is present in general purpose computers and computerized machines, not only is there a prevention of unauthorized use and access but there is also realized a crime deterrent in that, should the machine be stolen, the machine will be of no use unless the security system can be breached.
Mechanical security measures, such as locks and keys, are known for prevention of access to machinery. Lock and key security systems present a crime deterrent in a well understood visual stigma of difficulty of access. Electrical security measures, such as those requiring passwords and user identification codes, have been used in the past by users to obtain and prevent entrance through a security system associated with general purpose computers and computerized machines. As to the former, mechanical lock and key systems can be overcome by locking picking devices as well as by force. As to the latter, the benefit of the security system is lost when the access codes are found out or otherwise known by an unauthorized party. Thus, what is needed is a system and apparatus for providing security of access to a general purpose computer or a computerized machine that combines both mechanical and electrical security measures in an implemented electronic technique that improves upon that which is lacking in each these measures.
SUMMARY AND OBJECTS OF THE INVENTION
It is, therefore, an object of the present invention to provide a visual and electronic access deterrent to a general purpose computer or computerized machine.
It is a further object of the present invention to provide a visual access deterrent to a general purpose computer or computerized apparatus that requires a user to possess a physical key having an electronic component in order to gain access.
It is a still further object of the present invention to provide an access deterrent to a general purpose computer or computerized machine that requires a user to possess a physical key having an electronic component therein in order to gain access thereto after entry thereof into a conservation mode.
Additional objects and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objects and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims.
To achieve the foregoing objects, and in accordance with the invention as embodied and broadly described herein, a system and apparatus for improving upon secure access to a general purpose computer or computerized machine is presented. The inventive apparatus includes a computerized apparatus that has a program memory means and a processing means. The program memory means stores one or both of a BIOS and an operating system, or an equivalent. The processing means is electrically connected to the program memory means and executes the BIOS and the operating system.
The inventive apparatus also includes a security interface device in electrical communication with the computerized apparatus. Included in the security interface device is a universal connector for receiving a physical connection to a cable, a program storage means for storing a plurality of cable identification codes, a processing means electrically connected to the program storage means and the universal connector means for receiving a cable identification signal from the universal connector means and comparing the signal to the cable identification codes stored in the program storage means, a read only memory containing a first identification code, and a random access memory containing a second identification code.
In addition to the foregoing, the inventive apparatus also includes a security access device that includes a read only memory containing a first identification code and a cable identification code, a means for communicating the cable identification code in a cable identification signal to the universal connector means, a random access memory containing a second identification code, and a universal connector for operably and detachably connecting the security interface device to the security interface device.
The inventive system begins execution when power is supplied to the inventive apparatus and when the processing means of the security interface device receives a cable identification signal from the universal connector means. When the cable identification signal matches a cable identification code that is stored in the program storage means of the security interface device, this is an indication that a proper security cable has been inserted at the universal connector means. If there is a match of the cable identification code, the processing means of the computerized apparatus loads and executes the BIOS.
When the BIOS executed, the first and second identification codes are read from the security interface device and the security access device. Then, a first comparison of the first and second identification codes from the security interface device is made, respectively, to the first and second identification codes from the security access device. When the first comparison is not a match, the BIOS prevents the booting of the hardware computer device.
When the first comparison is a match, and when the BIOS has stored therein a first and a second identification code, the processing means reads the first and second identification codes from each of the security interface device, the security access device, and the BIOS. Then, the processing means performs a second comparison of the first and second identification codes, respectively, among each of the security interface device, the security access device, and the BIOS. When the second comparison is a match, said BIOS initiates the loading of the operating system.
Once the loading of the operating system is initiated and when the second comparison is a match, the processing means reads the first and second identification codes from each of the security interface device, the security access device, BIOS, and the operating system, and then does a third comparison of the first and second identification codes, respectively, among each of the security interface device, the security access device, the BIOS, and the operating system. When the third comparison is a match, the processing means generates a random number, encrypts the random number, and stores the result in the second identification code of each of the security interface device, the security access device, the BIOS, and the operating system. When the encrypted random number has been successfully stored, the loading of the operating system is completed, and a diagnostic is output, such as a light emitted from an LED on the security access device, indicating that the security access device can be optionally removed from the security interface device without interrupting the loading of the operating system. Until the operating system is finished loading a user is prevented use of or access to most of the fun

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security system for a computerized apparatus does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security system for a computerized apparatus, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security system for a computerized apparatus will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2490817

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.