System and method for protecting information stored on a computer
First Claim
1. A method for protecting information stored on a computer having a bootup operation, an operating system, at least one input device, and at least one output device, comprising:
- checking for a first authentication during the bootup operation of the computer, the first authentication being associated with an external device connected to the computer; and
locking the at least one input device of the computer if no first authentication is present during the bootup operation of the computer.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention is a method for protecting information processed, transmitted, or stored on a computer having a bootup operation, an operating system, at least one input device, and at least one output device. The computer checks for a first authentication during the bootup operation of the computer, the first authentication being associated with an external device connected to the computer. At least one input device of the computer is locked if no first authentication is present during the bootup operation of the computer. The computer may check for a second authentication when the operating system is operational and lock the at least one input device if no second authentication is present while the operating system is operational. Checking for an authenticated token as an authentication may comprise querying at a Smart Card reader for an authorized Smart Card.
-
Citations
32 Claims
-
1. A method for protecting information stored on a computer having a bootup operation, an operating system, at least one input device, and at least one output device, comprising:
-
checking for a first authentication during the bootup operation of the computer, the first authentication being associated with an external device connected to the computer; and
locking the at least one input device of the computer if no first authentication is present during the bootup operation of the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17, 18, 19, 20, 21)
-
-
16. A system for protecting information stored on a computer having a bootup operation and an operating system, comprising:
-
at least one input device;
an external device connected to the computer;
a checking module for checking for an authentication during the bootup operation of the computer, the authentication being associated with the external device; and
a locking module for locking the at least one input device of the computer if no authentication is present during the bootup operation of the computer.
-
-
22. A system for protecting information in a computer having a memory and at least one input device, the system comprising:
-
at least one token;
a reader for reading the at least one token; and
a first software operational in the memory for disabling the at least one input device of the computer during a bootup operation if the at least one token is not read by the reader. - View Dependent Claims (23, 24, 25, 26, 27, 28, 30, 31, 32)
-
-
29. A computer-readable medium operative in a computer system having a bootup operation, at least one input device, a token reader, and at least one authenticated token, the computer-readable medium containing a program for protecting information within the computer system by carrying out steps comprising:
-
checking for an authenticated token in the token reader during the bootup operation of the computer system; and
locking at least one input device if an authenticated token is not read by the token reader.
-
Specification