Trusted personal computer system with identification
First Claim
1. A personal computer system for receiving and retaining data and for enabling data retained within the system to be secured against unauthorized access, the system comprising:
- a normally closed enclosure,an enclosure lock for normally maintaining said enclosure in a securely locked condition denying access to the interior of the enclosure apart form possession of a key for said enclosure lock,an erasable memory element mounted within said enclosure for selective activation to one of an active state and an inactive state,an option switch mounted and accessible solely from within said enclosure and connected with said erasable memory element for setting said erasable memory element to a selected one of the active and inactive states, anda system processor mounted within said enclosure and connected with said erasable memory element for controlling access to at least certain levels of data and programs stored within the system by distinguishing between the active and inactive states of said memory element.
3 Assignments
0 Petitions
Accused Products
Abstract
This invention relates to personal computer systems and, more particularly, to such a system having security features enabling control over access to data retained in such a system. This invention contemplates protecting a personal computer system which has the capability of becoming a secure system from being placed into that condition by an attack on an unsecured machine. Additionally, in a network environment, it is important to maintaining network security that any given particular system be uniquely identified to the network, in order to guard against the substitution of an insecure "alternate" which would open the network to attack through an insecure system. This invention contemplates provision for such identification in a secure manner.
-
Citations
5 Claims
-
1. A personal computer system for receiving and retaining data and for enabling data retained within the system to be secured against unauthorized access, the system comprising:
-
a normally closed enclosure, an enclosure lock for normally maintaining said enclosure in a securely locked condition denying access to the interior of the enclosure apart form possession of a key for said enclosure lock, an erasable memory element mounted within said enclosure for selective activation to one of an active state and an inactive state, an option switch mounted and accessible solely from within said enclosure and connected with said erasable memory element for setting said erasable memory element to a selected one of the active and inactive states, and a system processor mounted within said enclosure and connected with said erasable memory element for controlling access to at least certain levels of data and programs stored within the system by distinguishing between the active and inactive states of said memory element. - View Dependent Claims (2, 3, 4, 5)
-
Specification