Method and apparatus for controlled access to a computer system
First Claim
1. A security device for a computer system having a keyboard entry device and a floppy disc drive, comprising:
- (a) means for transferring control of said computer system to a security system interposed between an operating system and all peripheral devices and application programs and data stored in said computer system;
(b) means under control of said security system for changing the computer system'"'"'s keyboard address to an address in the security system;
(c) means under control of said security system for changing the computer system'"'"'s floppy disc drive address to an address in the security system;
(d) means at said address in said security system for said floppy disc drive for blocking any input to the computer system from said floppy disc drive which would place the operation of the computer system outside the control of said security system;
(e) means at said address in said security system for blocking any keyboard input to the computer system which would place the operation of the computer system outside the control of said security system;
(f) identifying means for identifying all operators of said computer system;
(g) means for validating the operator'"'"'s identification;
(h) means responsive to validation by said validation means for restoring the address for said keyboard to said computer system'"'"'s keyboard address;
(i) means responsive to validation by said validation means for restoring the address for said floppy disc drive to said computer system'"'"'s floppy disc drive address; and
(j) means for allowing said validated operator access to only one or more of said programs and data and operating system for which said validated operator has been pre-authorized.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer security system protects the computer software from unauthorized access and the computer hardware from unauthorized intrusion. At the start up of the computer system, the computer'"'"'s keyboard and diskette drive are disabled. The user is required to identify himself through the use of a non-keyboard device such as a magnetic card reader. As a means of further validation, the user enters a PIN via the keyboard which has now been restored to function. A valid user will be allowed access to those programs for which he has been preauthorized. Attempts to gain access to the operating system or to programs for which the user is not authorized will be filtered by the security system to prevent unauthorized access to certain programs or to preclude efforts to thwart the security system. An alarm circuit provides security to the computer hardware.
-
Citations
27 Claims
-
1. A security device for a computer system having a keyboard entry device and a floppy disc drive, comprising:
-
(a) means for transferring control of said computer system to a security system interposed between an operating system and all peripheral devices and application programs and data stored in said computer system; (b) means under control of said security system for changing the computer system'"'"'s keyboard address to an address in the security system; (c) means under control of said security system for changing the computer system'"'"'s floppy disc drive address to an address in the security system; (d) means at said address in said security system for said floppy disc drive for blocking any input to the computer system from said floppy disc drive which would place the operation of the computer system outside the control of said security system; (e) means at said address in said security system for blocking any keyboard input to the computer system which would place the operation of the computer system outside the control of said security system; (f) identifying means for identifying all operators of said computer system; (g) means for validating the operator'"'"'s identification; (h) means responsive to validation by said validation means for restoring the address for said keyboard to said computer system'"'"'s keyboard address; (i) means responsive to validation by said validation means for restoring the address for said floppy disc drive to said computer system'"'"'s floppy disc drive address; and (j) means for allowing said validated operator access to only one or more of said programs and data and operating system for which said validated operator has been pre-authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for securing a computer system having a keyboard entry device and a floppy disc drive, comprising the steps of:
-
(a) transferring control of said computer system to a security system interposed between an operating system and all peripheral devices and application programs and data stored in said computer system, said security system performing the following steps; (b) changing the computer system'"'"'s keyboard address to an address in the security system; (c) providing at said security system address a routine for blocking any keyboard input which would place the operation of the computer outside the control of said security system; (d) changing the computer systems address for said floppy disc drive to an address in the security system; (e) providing at said security system address for said floppy disc drive a routine for blocking any input from said floppy disc drive which would place the computer outside the control of said security system; and (f) requiring all operators to identify themselves; (g) validating the operator'"'"'s identification; (h) in response to validation, restoring the address for said keyboard to said computer system'"'"'s keyboard address; (i) in response to validation, restoring the address for said floppy disc drive to said computer system'"'"'s address for said floppy disc drive; and (j) allowing a valid user access only to one or more of said programs and data and operating system for which the user has been pre-authorized. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A security device for a computer system having a keyboard entry device, comprising:
-
(a) means for transferring control of said computer system to a security system interposed between an operating system and all peripheral devices and application programs and data stored in said computer system; (b) means under control of said security system for changing the computer system'"'"'s keyboard address to an address in the security system; (c) means at said address in said security system for blocking any keyboard input to the computer system which would place the operation of the computer system outside the control of said security system; (d) identifying means for identifying all operators of said computer system; (e) means for validating the operator'"'"'s identification; (f) means responsive to validation by said validation means for restoring the address for said keyboard to said computer system'"'"'s keyboard address; (g) means for allowing said validated operator access to only one or more of said programs and data and operating system for which said validated operator has been pre-authorized; (h) means under control of said security system for changing the computer system'"'"'s address for the critical error routine to an address in the security system; and (i) means at said address in said security system for said critical errors for blocking access to the operating system. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method for securing a computer system having a keyboard entry device, comprising the steps of:
-
(a) transferring control of said computer system to a security system interposed between an operating system and all peripheral devices and application progress and data stored in said computer system, said security system performing the following steps; (b) changing the computer system'"'"'s keyboard address to an address in the security system; (c) providing at said security system address a routine for blocking any keyboard input which would place the operation of the computer outside the control of said security system; (d) requiring all operators to identify themselves; (e) validating the operator'"'"'s identification; (f) in response to validation, restoring the address for said keyboard to said computer system'"'"'s keyboard address; (g) allowing a valid user access only to one or more of said programs and data and operating system for which the user has been pre-authorized; (h) changing the computer system'"'"'s address for the critical error routine to an address in the security system; and (i) providing at said security system address for said critical errors a routine for blocking access to said operating system. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
Specification