USO0RE43 602E

(19) United States (12) Reissued Patent Chu (54)

(10) Patent Number: US (45) Date of Reissued Patent:

DATA SECURITY METHOD AND DEVICE

5,191,581 A

FOR COMPUTER MODULES

5,198,806 A *

(75) Inventor:

5,319,771 5,463,742 5,519,843 5,539,616 5,546,463 5,550,861 5,572,441 5,590,377 5,608,608 5,623,637 5,638,521 5,640,302 5,648,762

William W. Y. Chu, Los Altos, CA (U S)

(73) Assignee: Acqis LLC, McKinney, TX (US)

(21) Appl.No.: 13/294,108 (22) Filed:

Nov. 10, 2011 Related U.S. Patent Documents

Reissue of:

(64) Patent No.: Issued:

(51)

(52) (58)

3/1993 Woodbury et a1. 3/1993

6/1994 10/ 1995 5/1996 7/1996 8/1996 8/1996 11/1996 12/1996 3/1997 4/1997 6/1997 6/1997 7/1997

Lord ............................. .. 726/36

Takeda Kobayashi Moran et a1. Kikinis Caputo et a1. Chan et a1. Boie Smith Flint et a1. Jones et al. Buchala et a1. Kikinis Ichimura et a1.

(Continued)

6,643,777 Nov. 4, 2003

Appl. No.: Filed: U.S. Applications: (63)

A A A A A A A A A A A A A

RE43,602 E Aug. 21, 2012

09/312,199 May 14, 1999

FOREIGN PATENT DOCUMENTS EP

Int. Cl. G06F 17/30 G06F 1/26

(2006.01) (2006.01)

U.S. Cl. ............................... .. 726/2; 726/27; 726/36 Field of Classi?cation Search ................ .. 726/2i9,

726/l6i2l, 34, 36; 7l3/l82il 83, 1924194 See application ?le for complete search history. References Cited U.S. PATENT DOCUMENTS 4,623,964 A *

4,769,764 A 4,799,258 A 5,056,141 A *

5,086,499 A 5,103,446 A

7/1996

(Continued)

Continuation of application No. 11/056,604, ?led on Feb. 10, 2005, noW Pat. No. Re. 41,092.

(56)

0722138 Al

11/1986

GetZ et a1. ....................... .. 705/1

9/1988 Levanon 1/1989 Davies 10/1991

Dyke ......................... .. 340/527

2/1992 Mutone 4/1992 Fischer

OTHER PUBLICATIONS Boosten, “Transmission Overhead and Optimal Packet Size”, Mar. 11, 1998, printed on Jan. 28, 2011, 2 pgs. Primary Examiner * Hosuk Song

(74) Attorney, Agent, or Firm * Cooley LLP

(57)

ABSTRACT

A security method for an attached computer module in a

computer system. The security method reads a security iden ti?cation number in an attached computer module and com pares it to a security identi?cation number in a console, Which houses the attached computer module. Based upon a relation

ship between these numbers, a security status is selected. The security status determines the security level of operating the

computer system. 32 Claims, 20 Drawing Sheets

US RE43,602 E Page 2 U.S. PATENT DOCUMENTS . . .

5,689,654 A

A 5,751,950 A

11/1997 Klkmlsetal

$332 gjl‘giiyetal' 5/1998 Crisan ........................... .. 726/36

2,333,232‘ A

21332 $21118

5,815,681 A

9/l998 Kiiiiigls



l

5,878,211 5,862,381 A 5,884,049 5,907,566 5,909,559 5,933,609 5,935,226 5,941,965 5,974,486 5,978,919 5,991,833 5,999,476 5,999,952 6,006,243 6,012,145 6,025,989 6,029,183 6,038,621 6,046,571

A A A A A A A A A A A A A A A A A

151333 glligget 31 Atkinson Benson et a1. so Walker 6131. Klein MoroZ etal. Siddappa DQ161111. Wandleretal. Dutton 61111. Jenkins 6131. Karidis Mathers et a1. Ayd 61111. Jenkins 6131. Gale 6131. B°Vi° ‘ital

Pinkston, 1161111.

6,381,602 B1*

4/2002

Shoroffetal. .................. .. 707/9

6,393,561 B1* g’jgé’égg ET

5/2002 Hagiwaraetal. ........... .. 713/100 @588; gig et 31'

9/2002 Ellsworth 613.1.

6,460,106 B1

10/2002 Stnf?ebeam

6,496,361

12/2002

B2*

6,549,966 B1

3/1999 1/1999 Advani Delagrange et 111.et a1. 3/1999 5/1999 6/1999 8/1999 8/1999 8/1999 10/1999 11/1999 11/1999 12/1999 12/1999 12/1999 1/2000 2/2000 2/2000 3/2000 ‘V2000

4/2002 Schmidt 4/2002

6,453,344 B1

.

A

6,366,951 B1 6,378,009 B1

253%; 7’099’98l E} B2 7’146’446 7’328’297 7,363,415 7’363’4l6 7’376’779 R’E4l’076 RE41’092 7676’624 R’E41’294 7818’487 R’E41’961 RE42’814 804l’873 R’E42’984 RE43’U9 RE43’I7I 2001/0011’312

B2 B2 B2 B2 B2 E E B2 E B2 E E B2 E E E A1

Klmetal.

1258843‘ 800% Chu 12/2006 200% 4/2008 4/2008 5/2008 M2010 V2010 3/2010 40010 10/2010 110010 100011 100011 1 E2011 V2012 20012 8/2001

Chu Chu c1111 Chu Chu Chu Chu Chu Chu Chu Chu Chu Chu Chu Chu Chu c1111

6,069,615 A

#000 25mm“ etal'

2004/0177200 A1

9/2004 (31111

243326;‘ A

36888 cojlrélyet a1

2005/0174729 A1

8/2005 c1111

2005/0204083 A1

9/2005 c1111

3/2001 RaZZaghe-Ashra?etal. Deschepper et a1. ‘"2001 Chu 5/2001 Wandleretal.

Zoos/0244149 Al 2009/0157939 A1 2010/0174844 A1

100008 Chu 6/2009 c1111 7/2010 Chu

$588} gh‘c’lsmwpour

2011/0208893 A1

8/2011 c1111

6,157,534 2,121,547‘ A 2 6,199,134 B1 6,202,169 6,216,185 B1 6,226,700 B1

2,322’??? 5% 1

1

6,301,637 6,304,895 6,311,268 6,314,522 6,321,335 6,324,605 6,332,180 6,345,330

B1 B1 B1 B1 B1 B1 B1 B2

12/2000 $5888 Gallagher etet a1a1.

3-r

10/2001 10/2001 10/2001 11/2001 11/2001 11/2001 12/2001 2/2002

0

Krull et a1. Schneideret a1. c1111 Chu c1111 Raffeityet a1. Kauffman @1111. Chu

................... .. 361/683

4/2003 Dickens 61111.

FOREIGN PATENT DOCUMENTS JP W0 W0 W0

6-289953 WO 92/18924 WO 94/00970 WO 95/13640

* cited by examiner

10/1994 10/1992 1/1994 5/1995

US. Patent

Aug. 21, 2012

Sheet 1 0f 20

US RE43,602 E

40

Computer

Monitor

Module 80}! 20 '3

Deskiop

i5 Insert

-'-Peripheru| Console

Attached

Compu‘ter Moduie

F761 /

US. Patent

Aug. 21, 2012

Sheet 2 or 20

US RE43,602 E

Opening for Engaging Lock l5

F761 2

US. Patent

Aug. 21, 2012

Sheet 4 or 20

US RE43,602 E

r300 301

{313 _ Securrty ID

Company's shared

console

327

r315

Owner: Owner Password:

JST None

Business:

JST

Business Password: Console Type: Location: - . Access privilege.

Ether Portable None Company

Owner: Owner Password:

John Doe None

Business:

None

4- Business Password:

John Doe Home

Access Prn'v‘rlege Granted 303

Geneml

Company 317

(-305

None

gesm'cted

Console Type:

Desktop

Location:

None

Access privilege: Owner; Owner Password:

None K319 John Doe Attached COI'?DUtGl’ Sunshine Hi8

4-1 Business:

JST

Business Password: Access privilege:

Ether Private

Owner: Owner Password: Business:

John Doe Sunshine JST

Business Password:

Ether

307

‘(-321

Console Type:

Desktop

Location:

SFB3

Owner Access pn'vilege: Others Access privilege: Owner:

Private Company Mary l_i

Owner Password:

Vacation

Business:

JST

4+ Business Password:

->

Ether

Console Type:

Desktop

Location: Owner Access privilege:

LAB1 Private

Others Access privilege:

Company

309 .

Pnvate 323

K31 1 General

Company FIG_ 4

US. Patent

Aug. 21, 2012

Sheet 7 0f 20

US RE43,602 E

r700 <- 70 1 Power up

Security code

706

705 “0

ACCGSS

p?vilege No Access

Match lD?

/‘707

YES

Block all data out 716

708

71 O\ Access

Privilege

[-714

access

+ F711 Peripheral

1f???“

1 F71 2 Access

storage

Peripheral

Privilege Read-only

m” age Read-only

} /-713

j /-719

Program

Program

data control

data control -

71 5 721

Hardware

Hardware

takes over

takes over 731

Data

k—+—;-71 7 Block all data 0"‘

723

out to storage 729\

'

Let Data

727

US. Patent

Aug. 21, 2012

Sheet 9 0f 20

US RE43,602 E

US. Patent

Aug. 21, 2012

ACM

I

/ 10:0

C PU

Sheet 10 0f 20

US RE43,602 E

Peripherai Console

/ ‘w

r

(‘740

mo‘\

{an

I

104‘!

f {020

.'

gumlary is a

Deeicg

Pr§mary Input

System

Device

Memory i050 1, High

r102! "

Interface

and

Support

Interface

Seconda

_ Support F: lnterconnecuon -

Storage

(

{903

Pedormance :

Devices

and

Mass ry NW5!

Other

Devices

Arm‘ /

I I030 Pdma’Y Mass

EX pansaon r mi Stots "

Storage

1

Secondary Power Supply

Primary Power Supp¥y /' 03 I

FIG... /O

US. Patent

Aug. 21, 2012

Sheet 15 or 20

US RE43,602 E

C

Jun Mux 234M" .

1 To

1120

1110 1

"éLIG'mm

H132 A0131 :0] 0M Pualm u:

50ml Convene! Em: CNTL oul

I

Plrllbl lo Swiul

E PCNR

Serial b Fauna! Canvas-w

143 Encador I»

Margo Om Pam

Bun (306N016: CPU CNTL a- GHQ LamnDmm

Vuiea Pen Dam

1

Vi'dao Pod Comm!

FIG. *5

US. Patent

PCK

Aug. 21, 2012

Sheet 16 or 20

US RE43,602 E

-——~—‘ Mu

PCK

P00

P90

PD 1 _._..__..,... 5;“

Receiver

+

m

P01

+

Drivel’

ROCOIVQI

F103 -----‘ Dl'iVQf

Receiver

P03

PCN _________ on”;

Receive:

PCN

FIG. 14;

US. Patent

Aug. 21, 2012

Sheet 17 or 20

US RE43,602 E

Computing System CPU Host Bus

CPU/NB

signals ‘

North Bridge



,

.

North Bridge s Pnmary PC! Bus

,------’:’+;—--—1K with PCI Bus Bridge 08

Peripheral System South -

CPU/NB



Interface

Interface Dev.

Controller

P an . A n d PB us

1I l ‘-----—-' 5 Fl>etriolfqeral " e 308

Bridge Signals i Controller L __________ .-_.-l

Secondary PCl Bus 1 PCl Dewce 1

l PCl Add on Board 2

FIGURE I‘?

US. Patent

Aug. 21, 2012

Sheet 1s or 20

US RE43,602 E

Computing System CPU

I805 Main

1r ..............

Memory

;

Integrated

: :

Host interface Cn?r North Bridge

I

Graphics Subsystem

gl_'_'_l___1 i Peripheral System

I

'-—~—--:—--—--‘ / integrated Other BUS

Peripheral Interface Cntir. & S. Bridge I L. ___________________ __...|

PC! Bus

1

1

PC! Device

PC! Device

FIGURE i8

I?’ 0

Data security method and device for computer modules

Nov 10, 2011 - U.S. Applications: ... See application ?le for complete search history. (56) .... Desktop. Location: None. John Doe Home. Access privilege:.

2MB Sizes 5 Downloads 287 Views

Recommend Documents

Data security method and device for computer modules
Oct 6, 2006 - (45) Date of Reissued Patent: US RE43,171 E ..... “Component House: Design Technology for 'PCs in a snap'iNeoSystems Offers ..... for Performance,” Sixth Edition, Pearson Education, Inc., 2003, pp. 69-89. Hill, Goff (editor) ...

Data security method and device for computer modules
Oct 6, 2006 - Built For Distributed Business Applications” Core Technologies / ..... “Defendant International Business Machines Corp.'s Answer to.

Data security method and device for computer modules
Oct 6, 2006 - 10, 2009, 36 pages. “Defendant ... LED, ?led Oct. 9, 2010, 36 pages. ...... A, Declaration of William Henry Mangione-Smith under 37 CFR. 1.132 ...

Method and device for pictorial representation of space-related data
Feb 21, 2013 - all there arises a central storage requirement of 39.2 MBytes,. Which lies in the same order of magnitude as the storage requirement for ...

Method and device for pictorial representation of space-related data
Feb 21, 2013 - J.D. Foley et al., “Computer Graphics Principles and Practice”, ... Geographic Information System”, pub. Oct. 29, 1995 ...... master section. With a ...

Device and method for detecting object and device and method for ...
Nov 22, 2004 - Primary Examiner * Daniel Mariam. Issued? Aug- 11' 2009. (74) Attorney, Agent, or Firm * Frommer Lawrence &. APP1- NOJ. 10/994,942.

Method and apparatus for pluggable fiber optic modules
Oct 17, 2007 - (SG); Yong Peng Sim, Singapore (SG);. Edwin Dair, Los Angeles, CA (US);. Wenbin .... Card et al. Henson et al. Block et al. Lebby. Chen et al.

Device and method for compensating for phase distortion in base ...
May 13, 2010 - Networks, Part 16: Air Interface for Fixed Broadband Wireless .... It is an advantage of the present invention to provide a device and method for ...

Bonus play method for a gambling device
Mar 14, 2006 - See application ?le for complete search history. (Us). (56) ... Play and/0r apply ..... As shoWn, there are numerous variations on the theme that.

RFID device and method of forming
May 23, 2007 - Thomas Craig Weakley, Simpsonville,. SC (US); David ..... example communications electronics, data memory, and con trol logic. RFID tags ...

Method and apparatus for driving the display device, display system ...
Feb 5, 1998 - 345/100. AND DATA PROCESSING DEVICE. 5,604,511 A ... Foreign Application Priority Data. It is an object to .... DATA DRIVER. I l. 'IIII'IIIII'I IJ.

Method and apparatus for driving the display device, display system ...
Feb 5, 1998 - 345/206. THE DISPLAY DEVICE, DISPLAY SYSTEM,. 5,251,051 A * 10/1993 Fujiiyoshi et a1. .. 345/100. AND DATA PROCESSING DEVICE.

Method of converting audio data for a portable device and reproducing ...
Jun 29, 2009 - network, such as the Internet, are heavily encrypted through. Digital Right ... problems and/or disadvantages and to provide at least the advantages ... Additional advantages, objects, and features of the inven tion will be set forth i

Method for producing a device for direct thermoelectric energy ...
Sep 5, 2002 - Thus an element With a high atomic mass, i.e. a heavy element, ought to be .... band gap, namely about 0.6 electron volt, is adequate for.

Method for organizing and compressing spatial data
Aug 13, 2010 - “Wireless Solutions with SpatialFX, Any Client, Anywhere,” Object/. FX Corporation; Aug. .... segmenting of spatial databases to improve data access times ... Other objects and advantages of the present invention will become ...

Method for producing a device for direct thermoelectric energy ...
Sep 5, 2002 - speci?cally, hoW to best use and apply it for the direct conversion of .... carrier concentration of the order of 1018 carriers per cm3 are considered ..... radiation, nuclear element or cell, combustion of fossil fuels,. Waste heat ...

Release Notes for Cisco Router and Security Device Manager 2.5
Jan 21, 2008 - This section contains Cisco SDM system requirements. ...... Use the CLI to add the ip tcp adjust-mss 1452 command to the VLAN or Token Ring.

Release Notes for Cisco Router and Security Device Manager 2.5
Jan 21, 2008 - of Cisco SDM cannot be installed on PCs, and can be installed in router flash, disk, or slot memory. If you have ..... Cisco SDM can be run on a PC running any of the following operating systems: • Microsoft .... If you want to remov

Release Notes for Cisco Router and Security Device Manager 2.5
Jan 21, 2008 - Table 1 shows how much memory is required to support Cisco SDM and related applications. Table 4 on .... use Cisco SDM to configure the Cisco IOS IPS software, the router must run Release 12.3(8)T4 or a later release. ...... Some IM ap

Security Injections: Modules to Help Students ... - bloghosting
Keywords. Security Education, Computer Science Curriculum, Information .... programming courses required of all CS majors: Computer. Science I (CS1) and ...

Embroidery data creating device
Aug 29, 1996 - embroidery data creating device, an image data, WhlCh consists of a .... hard disk drive, and a CRT (Cathode Ray Tube) display, etc. Recently ...

Ceremonies Design for PKI's Hardware Security Modules
rate devices called Hardware Security Modules (HSMs). An HSM is a ... of the protection mechanism in any security system, their weaknesses, if not correctly.

Embroidery data creating device
Aug 29, 1996 - THINNING OPERATION. PICK uP LOOPS. I ATTHIBUTE SETTING I 85. CONVERT. SEWING DATA. STORE. EMBROIDERY DATA. S2. S3. S4.