Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
1999-01-26
2003-12-16
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
Reexamination Certificate
active
06665800
ABSTRACT:
BACKGROUND
The disclosures herein relate in general to information processing systems and in particular to a system and method for securing operation of a computer system.
In an example personal computer (“PC”) system, a human user enters one or more passwords in order to read information from a computer-readable medium of the system, write information to the computer-readable medium, and cause the system to perform various operations such as executing applications software. In that manner, the passwords help to guard against theft of the PC system, especially if the PC system is a laptop computer system. In one example, the passwords include a user password, an administrative password, and a master password.
According to a previous technique, if the user forgets the user password, the user may contact the system's manufacturer to learn the master password. After learning the master password, the user may specify a new user password. Accordingly, it is preferable that the master password be unique to each system.
Such uniqueness may be achieved by computing the master password according to a procedure (e.g. formula, algorithm) that is shared by numerous systems produced by the manufacturer, but which uses a particular system's unique serial number as an operand. Nevertheless, if the serial number is printed on the outside of each system or is otherwise readily published, then security would be compromised if the user learns the procedure, because (upon learning the procedure) the user would be able to read the serial number (and compute the master password) for any system that shares the procedure. Accordingly, a shortcoming of such a previous technique is that (a) employees of the manufacturer may fail to properly maintain confidentiality of the procedure; and (b) a user may reverse engineer the procedure by obtaining master passwords for multiple systems, as for example if the user purchases multiple systems.
Accordingly, a need has arisen for a system and method for securing a computer system, in which various shortcomings of previous techniques are overcome. More particularly, a need has arisen for a system and method for securing a computer system, in which a user is less likely to know a procedure and operand for computing a password. Also, a need has arisen for a system and method for securing a computer system in which, if security of a master password procedure (and its operand) has been compromised by a breach of confidentiality, the negative effect of such compromise is readily addressed and temporary.
SUMMARY
One embodiment, accordingly, provides for a computer system that includes circuitry for selecting among first and second parameters in response to a command. The parameters are for use in computing a password. The circuitry is for reading content of the selected parameter from a computer-readable medium and computing the password in response thereto. The password computed in response to content of the first parameter is different from the password computed in response to content of the second parameter. Also, the circuitry is for concealing the password from a user of the computer system.
A principal advantage of this embodiment is that (a) various shortcomings of previous techniques are overcome, (b) a user is less likely to know a procedure and operand for computing a password, and (c) if security of a master password procedure (and its operand) has been compromised by a breach of confidentiality, the negative effect of such compromise is readily addressed and temporary.
REFERENCES:
patent: 4453074 (1984-06-01), Weistein
patent: 4757543 (1988-07-01), Tamada et al.
patent: 4907268 (1990-03-01), Bosen et al.
patent: 5060263 (1991-10-01), Bosen et al.
patent: 5097505 (1992-03-01), Weiss
patent: 5163098 (1992-11-01), Pegg
patent: 5233658 (1993-08-01), Bianco et al.
patent: 5375243 (1994-12-01), Parzych et al.
patent: 5450491 (1995-09-01), McNair
patent: 5455941 (1995-10-01), Okuno et al.
patent: 5488660 (1996-01-01), Dawson et al.
patent: 5495411 (1996-02-01), Ananda
patent: 5524072 (1996-06-01), Labaton et al.
patent: 5537544 (1996-07-01), Morisawa et al.
patent: 5548645 (1996-08-01), Ananda
patent: 5586301 (1996-12-01), Fisherman et al.
patent: 5588056 (1996-12-01), Ganesan
patent: 5612683 (1997-03-01), Trempala et al.
patent: 5638513 (1997-06-01), Ananda
patent: 5661807 (1997-08-01), Guski et al.
patent: 5668876 (1997-09-01), Falk et al.
patent: 5737525 (1998-04-01), Picazo, Jr. et al.
patent: 5742684 (1998-04-01), Labaton et al.
patent: 5771291 (1998-06-01), Newton et al.
patent: 5771349 (1998-06-01), Picazo, Jr. et al.
patent: 5812764 (1998-09-01), Heinz, Sr.
patent: 5857024 (1999-01-01), Nishino et al.
patent: 5931948 (1999-08-01), Morisawa et al.
patent: 6061799 (2000-05-01), Eldridge et al.
patent: 6067621 (2000-05-01), Yu et al.
patent: 6112187 (2000-08-01), Fukawa
patent: 6141760 (2000-10-01), Abadi et al.
patent: 6219421 (2001-04-01), Backal
patent: 6225889 (2001-05-01), Furuta et al.
patent: 6385731 (2002-05-01), Ananda
patent: 2002/0113824 (2002-08-01), Myers, Jr.
patent: 2317983 (1998-04-01), None
patent: 401297927 (1989-12-01), None
patent: WO 97/38878 (1996-04-01), None
Hall et al, “Safeguarding microcomputers and LANs” May 1996, Management Accounting, v77n11, p. 27-36.*
“Password Manager 2.5”, Sep. 1, 1999, PC Magazine, courtesy of dialog text search, p. 1.
Davis, Jr. Michael A.
Dell USA L.P.
Haynes and Boone LLP
Revak Christopher
Sheikh Ayaz
LandOfFree
System and method for securing a computer system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for securing a computer system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for securing a computer system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3156077