Methods and arrangements for limiting access to computer controlled functions and devices
First Claim
1. A method comprising:
- verifying that a first application is authorized to set an initial range for a controlled parameter setting;
if authorized, allowing the first application to set an initial range for the controlled parameter setting; and
subsequently, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and arrangements are provided to verify if a requesting computer application is authorized to change a controlled parameter associated with a computer controlled device and/or function. To accomplish this, one or verification functions are employed to analyze a security code or absence thereof, as identified by a requesting application. If the security code, which may be encrypted, matches a known or calculated valid security code, then the requesting application is deemed to be authorized to change the controlled parameter and/or modify certain limitations associated with an acceptable range for the controlled parameter. If the security code does not match a known or calculated valid security code, then the requesting application is deemed to be unauthorized to change the controlled parameter outside of a previously established acceptable range for the controlled parameter. The verification function can be implemented in a ROM to increase the security and to thwart attempts to circumvent the authorization scheme. Several independent verification functions can be arranged to support the verification of a plurality of authorized applications.
26 Citations
63 Claims
-
1. A method comprising:
-
verifying that a first application is authorized to set an initial range for a controlled parameter setting;
if authorized, allowing the first application to set an initial range for the controlled parameter setting; and
subsequently, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17)
-
-
12. A method as recited in claim 111, wherein the memory location information associated with the verifying function defines memory location within a read only memory (ROM).
-
18. A computer-readable medium having computer-executable instructions for performing steps comprising:
-
verifying that a first application is authorized to set an initial range for a controlled parameter setting;
if authorized, allowing the first application to set an initial range for the controlled parameter setting; and
subsequently, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method comprising:
-
setting an authorized range and a current value for a controlled parameter;
receiving a request to change the current value of the controlled parameter from an application;
changing the current value of the controlled parameter if a requested value of the controlled parameter is within the authorized range;
otherwise, verifying that the application is authorized to modify the authorized range for the controlled parameter, prior to changing the current value of the controlled parameter to the requested value. - View Dependent Claims (36, 37, 38, 39)
-
-
40. A computer-readable medium having computer-executable instructions for performing steps comprising:
-
setting an authorized range and a current value for a controlled parameter;
receiving a request to change the current value of the controlled parameter from an application;
changing the current value of the controlled parameter if a requested value of the controlled parameter is within the authorized range;
otherwise, verifying that the application is authorized to modify the authorized range for the controlled parameter, prior to changing the current value is of the controlled parameter to the requested value. - View Dependent Claims (41, 42, 43, 44)
-
-
45. A system comprising:
-
at least one processor operatively configured to respond to computer instructions associated with a plurality of applications, including a first application;
memory coupled to the processor and configured to store data associated with at least the first application, and a program operatively configured within the processor and memory and arranged to set a parameter value and a range associated with at least one controlled parameter, determine if the first application is authorized to modify the range, modify the parameter value within the range when requested by the first application, and modify the parameter value outside the range and modify the range when requested by the first application if the first application is authorized to modify the range. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
-
56. An arrangement for use in a computer system, the arrangement comprising:
-
a parameter manager configurable to receive a parameter change request from one or more computer applications and selectively output a corresponding parameter value;
at least one verifier function accessible by the parameter manager and configured to determine if the parameter change request is from a computer application that is authorized to exceed a parameter limitation; and
a device driver coupled to the parameter manager and configured to receive the parameter value from the parameter manager and output a corresponding control parameter suitable for use by at least one device. - View Dependent Claims (57, 58, 59, 60, 61, 62, 63)
-
Specification