Electronic data processing security system and method
First Claim
1. An electronic system for preventing undetected alteration, destruction, removal or reproduction of data available to a central processing unit (CPU) of a computer implementing at least one problem process and an operating process comprising:
- means for monitoring operating statements communicated to the CPU for the operating process and means for monitoring problem steps to be used by the operating process in governing the problem process, both said monitoring means electronically reflecting the nature of the information monitored;
means for comparing the monitored information with predetermined standards comprising representations of operating statements and problem steps; and
means for initiating a predetermined counteraction when the comparing means electronically indicates that the monitored information is outside the limits defined by the predetermined standards.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling the security of data in a central high speed data processing unit (CPU) by electronically sensing and comparing all operating or control statements coming into the CPU from terminal devices with a vocabulary of all statements unacceptable for security reasons which unacceptable statements are stored in a remote secondary computer system. The security of the data is also controlled by electronically sensing and comparing all operating and problem steps loaded into the CPU from library devices with a collection of identifiers known to identify all correct versions. The reaction to security dangers found in either sensing and comparing method is to exert predetermined counteraction to preclude unauthorized removal, alteration, destruction or inspection of problem data and/or procedures.
The system includes a plurality of sensors which monitor operating control statements, operating and problem steps or procedures and physical switches on the CPU control panel. The remote secondary computer analyzes the sensor output and responds by a predetermined counteraction which includes initiating an alarm and descriptive printout at a remote location and indicating the source and severity of any security violation. Further, the secondary computer may interrupt the CPU and drain any illegal control statements and prevent the loading of the operating process and problem steps.
256 Citations
20 Claims
-
1. An electronic system for preventing undetected alteration, destruction, removal or reproduction of data available to a central processing unit (CPU) of a computer implementing at least one problem process and an operating process comprising:
-
means for monitoring operating statements communicated to the CPU for the operating process and means for monitoring problem steps to be used by the operating process in governing the problem process, both said monitoring means electronically reflecting the nature of the information monitored; means for comparing the monitored information with predetermined standards comprising representations of operating statements and problem steps; and means for initiating a predetermined counteraction when the comparing means electronically indicates that the monitored information is outside the limits defined by the predetermined standards. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for preventing undetected alteration, removal, destruction or inspection of data available to a central processing unit (CPU) comprising the steps of:
-
establishing a problem process in the CPU for processing problem data to problem results; governing the problem process with an operating process, which operating process responds to operating statements and implements program steps; sensing first electric pulse representations of the operating statements to develop a corresponding electric pulse sequence which represents the actual operating statements used; sensing second electric pulse representations of the problem steps to develop a corresponding electric pulse sequence which represents the actual problem steps used; comparing at least one of the corresponding electric pulse sequences with a predetermined standard comprising electric pulse representations of corresponding standard operating statements and standard problem steps; and electronically initiating predetermined counteraction when any part of the pulse sequence is found outside the limits defined by the predetermined standard. - View Dependent Claims (8, 9, 10)
-
-
11. A method for electronically monitoring operating statements to prevent undetected alteration, removal, destruction, or inspection of data available to a central processing unit (CPU), the steps of:
-
preparing a vocabulary of operating statements which are permitted only by special authority; developing a collection of authority codes which is associated with the prepared vocabulary of operating statements and electronically storing the collection; accompanying each authorized operating statement communicated to the CPU with an authority code; scanning all operating statements submitted to the CPU to detect the existence and identity of the authority code; comparing the data bit representation of the authority code with the data bit representation of the collection of codes to determine if the authority code is found accompanying the operating statement; and initiating a predetermined electronically responsive counteraction where the operating statement is not accompanied by an authority code which is found in the collection of codes. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system for electronically monitoring operating statements in a digital computer to prevent undetected alteration, removal, destruction or inspection of data available to a central processing unit (CPU) comprising:
-
means compiling a vocabulary of data bit representations of operating statements permitted only by special authority; means identifying each of the data bit representations of the operating statements in the vocabulary with an authority code; means storing the vocabulary of data bit representations of operating statements and associated authority codes in an electronically retrievable form; means scanning all data bit representations of operating statements submitted to the CPU to detect the existence and identity of any authority code associated with the operating statements submitted; means comparing authority codes associated with the submitted representations of operating statements with the authority code associated with the corresponding stored representations of operating statements; and means initiating a predetermined electronically responsive counteraction when the scanned authority code does not match the stored authority code for corresponding operating statements. - View Dependent Claims (19, 20)
-
Specification