Hardware theft-protection architecture

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 23, G06F 1300, H04L 900

Patent

active

060322578

ABSTRACT:
A method of theft protection for computers and computer related hardware. Warranty fraud, theft of proprietary technology, and hardware theft are minimized by encoding the hardware components such that a digitally authenticated handshake must be performed between the system and the component at power-up. If the handshake is successful, normal operation continues with all enhancements. If the handshake is unsuccessful, the device is disabled or shifted into a lower performance mode.

REFERENCES:
patent: 4465901 (1984-08-01), Best
patent: 4982371 (1991-01-01), Bolan et al.
patent: 5010331 (1991-04-01), Dias et al.
patent: 5058161 (1991-10-01), Weiss
patent: 5120939 (1992-06-01), Claus et al.
patent: 5226137 (1993-07-01), Bolan et al.
patent: 5249230 (1993-09-01), Mihm, Jr.
patent: 5267311 (1993-11-01), Bakhoum
patent: 5353350 (1994-10-01), Unsworth et al.
patent: 5367148 (1994-11-01), Storch et al.
patent: 5375243 (1994-12-01), Parzych et al.
patent: 5402490 (1995-03-01), Mihm, Jr.
patent: 5481611 (1996-01-01), Owens et al.
patent: 5506991 (1996-04-01), Curry et al.
patent: 5517015 (1996-05-01), Curry et al.
patent: 5530431 (1996-06-01), Wingard
patent: 5537540 (1996-07-01), Miller et al.
patent: 5546463 (1996-08-01), Caputo et al.
patent: 5587955 (1996-12-01), Lee et al.
patent: 5594793 (1997-01-01), Bahout
patent: 5619066 (1997-04-01), Curry et al.
patent: 5646998 (1997-07-01), Stambler
patent: 5671285 (1997-09-01), Newman
patent: 5677952 (1997-10-01), Blakley, III et al.
patent: 5696824 (1997-12-01), Walsh
patent: 5696827 (1997-12-01), Brands
patent: 5715174 (1998-02-01), Cotichini et al.
patent: 5774545 (1998-06-01), Raghavachari
patent: 5825877 (1998-10-01), Dan et al.
patent: 5832214 (1998-11-01), Kikinis
patent: 5832228 (1998-11-01), Holden et al.
patent: 5838251 (1998-11-01), Brinkmeyer et al.
patent: 5838793 (1998-11-01), Lewis
Jonathan Lambeth, IBM hands users a security lifeline. (put serial numbers on all memory products and processors) (company business and marketing), Computer Weekly, p1 (1), Feb. 1996.
Christian Damsgaard Jensen et al., Protection reconfiguration for reusable software, 1998 Proced. of the second Euromicro conference on, pp. 74-80, Jun. 1998.
Andrew Hiles, Surviving a computer disaster, Computing and control Engineering Journal, vol. 33, pp. 133-135, May 1992.
U.S.Patent Application of Michael F. Angelo, "A Method For Controlling Access to A Computer System By Utilizing An External Device Containing A Hash Value Representation of a user Password", SN 08/777,621 filed Dec. 31, 1996, Docket P-1155.
Brown, Bruce "Stop, Thief!" Computer Shopper, May 1997, p. 232 & 233.
U.S.Patent Application SN 08/396,343, "Security Control For a Personal Computer", filed Mar. 3, 1995.
U.S. Application SN 08/632,892, "Secure Power Supply", filed Apr. 16, 1996, P-973.
U.S.Application SN 08/657,982, "Method and Apparatus for Providing Secure and Private Keyboard Communciations in Computer Systems", filed May 29, 1996, P-1016.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Hardware theft-protection architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Hardware theft-protection architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hardware theft-protection architecture will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-693125

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.