Hard drive security system
First Claim
1. A security system for controlling access to a personal computer, said computer containing a hard drive, a random access memory, and at least one expansion slot, comprising:
- an expansion card for insertion into said expansion slot;
a file residing on said hard drive containing the established passwords of the security system;
said expansion card containing a read only memory for storing a first program having a first portion for altering the interrupt table of the personal computer so as to establish said first program as a part of the disk drive management interrupt of said computer, and further operative to write into a new location in said random access memory the initial values of the interrupt table altered by said first portion of said first program;
said first program having a second portion operative to store in said random access memory one or more flags indicative of the status of the security system;
said first program having a third portion responsive to said one or more flags and the disk drive management interrupt of said computer, operative to deny access to any floppy disk drives while said flags indicate that the security system is active by returning an error code to said computer;
a second program existing upon, and executed from, said hard drive, operative to read said file existing upon said hard drive containing the established passwords of the security system, and operative to request and verify a password against said file, and operative to deny access to the computer system until a valid password is entered, and further operative to modify said one or more flags in said random access memory so as to reflect the current status of the security system.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system to prevent un-authorized access to the hard drive of a personal computer system. The security system consists of a plug-in expansion card containing a program on an EPROM, a device driver program which requests the password for access, and other programs to establish the valid passwords for the security system, provide an audit trail of computer access, and other functions. The program on the EPROM disables the floppy drives until a valid password has been entered, forcing the booting process to be controlled and forcing the computer to boot off of the hard drive and request a password via the device driver. A skilled programmer, even with a complete knowledge of the security system'"'"'s details of operation, can not write a program which can be booted off of a diskette in order to bypass the security system. The passwords and user IDs for the security system are stored on the hard drive of the computer inside the device driver program. The elimination of the need to provide any random access memory, EEROM or other non-volatile memory in which to store the passwords contributes to the low manufacturing cost for the security system.
-
Citations
16 Claims
-
1. A security system for controlling access to a personal computer, said computer containing a hard drive, a random access memory, and at least one expansion slot, comprising:
-
an expansion card for insertion into said expansion slot; a file residing on said hard drive containing the established passwords of the security system; said expansion card containing a read only memory for storing a first program having a first portion for altering the interrupt table of the personal computer so as to establish said first program as a part of the disk drive management interrupt of said computer, and further operative to write into a new location in said random access memory the initial values of the interrupt table altered by said first portion of said first program; said first program having a second portion operative to store in said random access memory one or more flags indicative of the status of the security system; said first program having a third portion responsive to said one or more flags and the disk drive management interrupt of said computer, operative to deny access to any floppy disk drives while said flags indicate that the security system is active by returning an error code to said computer; a second program existing upon, and executed from, said hard drive, operative to read said file existing upon said hard drive containing the established passwords of the security system, and operative to request and verify a password against said file, and operative to deny access to the computer system until a valid password is entered, and further operative to modify said one or more flags in said random access memory so as to reflect the current status of the security system. - View Dependent Claims (5, 6, 7, 8, 11)
-
- 2. A security system as recited in claim, where the second program is a device driver.
-
12. A method of providing a security system and denying authorized access to a personal computer, said computer containing a hard drive, a random access memory, and at least one expansion slot, said method comprising:
-
establishing a file on said hard drive which contains the established passwords for the security system; temporarily disabling the operation of any floppy drives of the computer with an expansion card inserted into said expansion slot, said expansion card containing a first program which alters the disk drive management interrupt of said personal computer, operative to establish said first program as a part of the disk drive management interrupt of said computer, so as to force the personal computer to boot the operating system from said storing in said random access memory one or more flags indicative of the status of the security system; collecting and verifying the validity of a password with a second program existing upon and executed from said hard drive, where said second program establishes the validity of a password by comparison with said file on said hard drive containing the established passwords of the security system; denying access to the computer system until a valid password is entered; modifying the one or more flags in said random access memory to indicate the new status of the security system; re-enabling the operation of any floppy drives of the computer once a valid password has been entered. - View Dependent Claims (13, 14, 15, 16)
-
Specification